www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 28 Feb 2019 04:30:41 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/28 04:30:40

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.264&r2=1.265
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.383&r2=1.384
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.250&r2=1.251
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.478&r2=1.479
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.37&r2=1.38

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- de.po       28 Feb 2019 09:00:38 -0000      1.37
+++ de.po       28 Feb 2019 09:30:38 -0000      1.38
@@ -7244,6 +7244,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- es.po       28 Feb 2019 09:00:38 -0000      1.47
+++ es.po       28 Feb 2019 09:30:38 -0000      1.48
@@ -5289,6 +5289,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- fr.po       28 Feb 2019 09:00:38 -0000      1.65
+++ fr.po       28 Feb 2019 09:30:38 -0000      1.66
@@ -5750,6 +5750,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- it.po       28 Feb 2019 09:00:38 -0000      1.37
+++ it.po       28 Feb 2019 09:30:38 -0000      1.38
@@ -6817,6 +6817,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- ja.po       28 Feb 2019 09:00:38 -0000      1.37
+++ ja.po       28 Feb 2019 09:30:38 -0000      1.38
@@ -5792,6 +5792,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-mobiles.de-diff.html        20 Feb 2019 15:30:47 -0000      1.42
+++ malware-mobiles.de-diff.html        28 Feb 2019 09:30:38 -0000      1.43
@@ -494,6 +494,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
@@ -857,38 +869,38 @@
        to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
        tens of thousands</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
+    
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this 
point,</strong></del></span> <span class="inserted"><ins><em>make sure they 
can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
+    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point,</strong></del></span> <span 
class="inserted"><ins><em>500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not</em></ins></span> have
 <span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
@@ -1264,7 +1276,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/02/28 09:30:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-mobiles.de.po       20 Feb 2019 15:30:47 -0000      1.99
+++ malware-mobiles.de.po       28 Feb 2019 09:30:38 -0000      1.100
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -798,6 +798,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- malware-mobiles.es.po       21 Feb 2019 12:21:09 -0000      1.105
+++ malware-mobiles.es.po       28 Feb 2019 09:30:38 -0000      1.106
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 09:26+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -687,6 +688,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- malware-mobiles.fr.po       21 Feb 2019 11:13:30 -0000      1.125
+++ malware-mobiles.fr.po       28 Feb 2019 09:30:38 -0000      1.126
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2019-02-21 12:12+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 09:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -688,6 +689,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- malware-mobiles.it-diff.html        20 Feb 2019 15:30:47 -0000      1.47
+++ malware-mobiles.it-diff.html        28 Feb 2019 09:30:38 -0000      1.48
@@ -522,6 +522,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
@@ -810,8 +822,7 @@
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
-      <span class="removed"><del><strong>and may turn them over to the UK 
government if
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and 
<span class="removed"><del><strong>may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -864,8 +875,8 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>and
-      may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+      <span class="inserted"><ins><em>may turn them over to</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
@@ -1293,7 +1304,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/02/28 09:30:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- malware-mobiles.it.po       20 Feb 2019 15:30:47 -0000      1.99
+++ malware-mobiles.it.po       28 Feb 2019 09:30:39 -0000      1.100
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -767,6 +767,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.ja-diff.html        20 Feb 2019 15:30:47 -0000      1.61
+++ malware-mobiles.ja-diff.html        28 Feb 2019 09:30:39 -0000      1.62
@@ -486,6 +486,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
@@ -1136,7 +1148,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-mobiles.ja.po       20 Feb 2019 15:30:47 -0000      1.87
+++ malware-mobiles.ja.po       28 Feb 2019 09:30:39 -0000      1.88
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -636,6 +636,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.pot 20 Feb 2019 15:30:47 -0000      1.65
+++ malware-mobiles.pot 28 Feb 2019 09:30:39 -0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -467,6 +467,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a "
+"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\";> "
+"sent personal data to Facebook</a>. Lots of companies built apps that way "
+"and released them, apparently not realizing that all the personal data they "
+"collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a "
 
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";> 
"
 "recording all the users' actions</a> in interacting with the app."

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- malware-mobiles.ru.po       25 Feb 2019 10:00:30 -0000      1.159
+++ malware-mobiles.ru.po       28 Feb 2019 09:30:39 -0000      1.160
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-28 09:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -678,6 +679,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- nl.po       28 Feb 2019 09:00:38 -0000      1.37
+++ nl.po       28 Feb 2019 09:30:39 -0000      1.38
@@ -4574,6 +4574,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- pl.po       28 Feb 2019 09:00:38 -0000      1.37
+++ pl.po       28 Feb 2019 09:30:39 -0000      1.38
@@ -4018,6 +4018,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- pot 28 Feb 2019 09:00:38 -0000      1.37
+++ pot 28 Feb 2019 09:30:39 -0000      1.38
@@ -3841,6 +3841,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary-surveillance.de-diff.html       28 Feb 2019 09:00:39 -0000      
1.49
+++ proprietary-surveillance.de-diff.html       28 Feb 2019 09:30:39 -0000      
1.50
@@ -656,63 +656,38 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages returned 
to</strong></del></span> <span class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated purpose 
of</strong></del></span> <span class="inserted"><ins><em>latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>JS injection is</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span> 
<span class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use</em></ins></span> it <span class="removed"><del><strong>redirects 
the
-      user's traffic through valueclick.com (an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers of this 
app</strong></del></span> <span class="inserted"><ins><em>without having your 
fingerprints taken. Users would</em></ins></span> have
-      <span class="removed"><del><strong>confirmed that the non-premium 
version of</strong></del></span>
-    <span class="inserted"><ins><em>no way to tell whether</em></ins></span> 
the <span class="removed"><del><strong>app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>phone is 
snooping on them.&lt;/p&gt;</em></ins></span>
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
+  &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="inserted"><ins><em>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can get
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>photos
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -721,13 +696,13 @@
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>paid proprietary 
apps,</strong></del></span>
-    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
     &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>still counts as a
+    iCloud&lt;/a&gt;, but it's active by default so it still counts as a
     surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
@@ -772,8 +747,8 @@
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201308080"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>iThing also &lt;a
+  &lt;li id="M201308080"&gt;
+    &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
     turned off.&lt;/p&gt;
@@ -782,7 +757,7 @@
   &lt;li id="M201210170"&gt;
     &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That</em></ins></span> article <span 
class="removed"><del><strong>confusingly describes gratis apps as 
&ldquo;free&rdquo;,</strong></del></span> <span class="inserted"><ins><em>talks 
about iOS 6,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>it is
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
@@ -819,94 +794,90 @@
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact</strong></del></span> <span 
class="inserted"><ins><em>data to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  
This</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending to obey the user,
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>tracking.  
This is
+    yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</em></ins></span>
+    unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</em></ins></span>
-    that <span class="inserted"><ins><em>users can't delete&lt;/a&gt;, 
and</em></ins></span> they <span class="removed"><del><strong>don't 
snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their
+  &lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;</em></ins></span>
+    of some kind.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
     Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps that track users</strong></del></span> <span 
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us</em></ins></span> by <span 
class="inserted"><ins><em>a paywall) reports that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone</em></ins></span> in 
<span class="removed"><del><strong>stores or played by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android phones
+    &lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
     and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+  &lt;li id="M201307280"&gt;
     &lt;p&gt;Spyware is present in some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version</em></ins></span> of Android <span 
class="removed"><del><strong>apps can collude to transmit 
users'</strong></del></span> <span class="inserted"><ins><em>that &lt;a
+    by Google, use a modified version of Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends</em></ins></span> personal data to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>read logs</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens</em></ins></span> for <span class="removed"><del><strong>other 
apps and also core system logs. TigerVPN</strong></del></span> <span 
class="inserted"><ins><em>voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app</em></ins></span> developers
+      <span class="removed"><del><strong>have confirmed this.&lt;/dd&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;</em></ins></span>
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      and may turn them over to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
 
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>install the app&lt;/a&gt;.&lt;/p&gt;
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into</strong></del></span> <span 
class="inserted"><ins><em>personal details of users that 
install</em></ins></span> the <span class="removed"><del><strong>HTML pages 
returned to</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
+    &lt;p&gt;Merely asking</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>the JS injection</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> is <span 
class="inserted"><ins><em>not enough</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
+    honestly identify the information</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>collects on users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    and other companies from getting this personal information 
in</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
@@ -924,9 +895,11 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    &lt;p&gt;E-books can contain</em></ins></span> JavaScript <span 
class="removed"><del><strong>code into HTML pages,</strong></del></span> <span 
class="inserted"><ins><em>code,</em></ins></span> and <span 
class="removed"><del><strong>also uses
+      roughly 5 tracking libraries. Developers of</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    sometimes</em></ins></span> this <span class="removed"><del><strong>app 
have
+      confirmed that</strong></del></span> <span 
class="inserted"><ins><em>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
@@ -938,16 +911,20 @@
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>non-premium version of</strong></del></span> 
<span class="inserted"><ins><em>Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    report even which page</em></ins></span> the <span 
class="removed"><del><strong>app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>user reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -964,15 +941,28 @@
     reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact that this is used for repression of forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>nonfree software</em></ins></span>
-    is not <span class="removed"><del><strong>enough
-to legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>a cure for the 
injustice of nonfree software. It may avoid
-    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>this is used for repression</em></ins></span> of 
<span class="removed"><del><strong>the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>forbidden sharing
+    makes</em></ins></span> it <span class="removed"><del><strong>was only 
60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>even more 
vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>them 
are</strong></del></span> <span class="inserted"><ins><em>nonfree software
+    is</em></ins></span> not <span class="removed"><del><strong>in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span class="inserted"><ins><em>a cure 
for</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>that word 
is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -980,6 +970,38 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary
+    <span class="inserted"><ins><em>library for building 
mobile</em></ins></span> apps, <span class="removed"><del><strong>one can only 
hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span> <span class="inserted"><ins><em>which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit 
users'</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent</em></ins></span> personal data to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>companies built apps</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span class="inserted"><ins><em>way and released them, apparently not 
realizing that all</em></ins></span> the personal <span 
class="removed"><del><strong>details of users</strong></del></span>
+    <span class="inserted"><ins><em>data they collected would go to Facebook 
as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>no one can trust a nonfree program, not 
even</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>users is not enough
+to legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>other nonfree 
programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps</em></ins></span> have
 <span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>a surveillance feature for &lt;a
@@ -1948,8 +1970,8 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The 
other day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
+&lt;p&gt;Emo Phillips made a joke: The other day</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>woman came 
up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see</em></ins></span> out
       <span class="removed"><del><strong>who</strong></del></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
@@ -2639,9 +2661,9 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would then 
have</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="inserted"><ins><em>normal that companies
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it and would then have to
+      give</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="inserted"><ins><em>normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3255,7 +3277,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.264
retrieving revision 1.265
diff -u -b -r1.264 -r1.265
--- proprietary-surveillance.de.po      28 Feb 2019 09:00:39 -0000      1.264
+++ proprietary-surveillance.de.po      28 Feb 2019 09:30:39 -0000      1.265
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1849,6 +1849,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.383
retrieving revision 1.384
diff -u -b -r1.383 -r1.384
--- proprietary-surveillance.fr.po      28 Feb 2019 09:00:39 -0000      1.383
+++ proprietary-surveillance.fr.po      28 Feb 2019 09:30:39 -0000      1.384
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2019-02-25 13:03+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -1408,6 +1408,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary-surveillance.it-diff.html       28 Feb 2019 09:00:39 -0000      
1.116
+++ proprietary-surveillance.it-diff.html       28 Feb 2019 09:30:39 -0000      
1.117
@@ -1132,7 +1132,7 @@
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
proprietary</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
@@ -1141,296 +1141,376 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo;</em></ins></span> apps 
<span class="inserted"><ins><em>that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
+    apps the user has
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps 
that</em></ins></span> used <span class="inserted"><ins><em>to
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
+    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>the user&lt;/a&gt;. This is in addition to
+      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>redirecting
     them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the user <span class="removed"><del><strong>has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was designed to make 
uninstallation
+    the <span class="removed"><del><strong>question</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>most of them 
was designed</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree 
apps</em></ins></span> in
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at 
least</strong></del></span> <span class="inserted"><ins><em>potential risk 
because
-    there</em></ins></span> is <span class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as</strong></del></span> <span 
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span 
class="removed"><del><strong>the others</strong></del></span> <span 
class="inserted"><ins><em>they really</em></ins></span> do.&lt;/p&gt;
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there</em></ins></span> is no <span class="removed"><del><strong>excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC 
says</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending personal data to the app developer but did not
+      ask about sending it to other companies.  This shows the
+      weakness</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150</em></ins></span> most <span 
class="removed"><del><strong>mobile</strong></del></span> <span 
class="inserted"><ins><em>popular
-    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for 
children don't respect privacy:</strong></del></span> <span 
class="inserted"><ins><em>in Google Play found that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>150 most popular
+    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>Google Play 
found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    25% fail</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span> <span class="inserted"><ins><em>protect 
their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often</em></ins></span> used <span 
class="removed"><del><strong>&lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span> <span 
class="inserted"><ins><em>for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>companies, and the NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
+    potentially also be used</em></ins></span> to spy <span 
class="removed"><del><strong>through it too&lt;/a&gt;.
+      Here's information</strong></del></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half
 of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>in 
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that 
these articles talk about &ldquo;free
+    &lt;p&gt;It is unfortunate that these articles talk</em></ins></span> 
about <span class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps by 
the OS in</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>what it will do
-    with</em></ins></span> the <span class="removed"><del><strong>app 
developers get
-      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>about 
a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>toys</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do</em></ins></span>
+    with <span class="inserted"><ins><em>the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen in on a child's speech, and even speak
+      into</strong></del></span> <span class="inserted"><ins><em>side issue. 
What</em></ins></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>data 
is</em></ins></span> a <span class="removed"><del><strong>person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is 
that</em></ins></span>
+    the <span class="removed"><del><strong>totally inadequate proposed 
response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The</strong></del></span> company <span 
class="inserted"><ins><em>gets</em></ins></span> that <span 
class="removed"><del><strong>made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>it was 
anonymizing</strong></del></span>
+    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the data <span class="removed"><del><strong>may be
+      true, but it doesn't really matter. If</strong></del></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>data to a
+      data broker,</strong></del></span> <span class="inserted"><ins><em>same 
machine via
+    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>data broker would have been able to 
figure out
+      who</strong></del></span> <span class="inserted"><ins><em>user's 
activities in the app; others only say that</em></ins></span> the user <span 
class="removed"><del><strong>was.&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>user's actions</em></ins></span> to
-      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>it obtains from</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask</strong></del></span> <span class="inserted"><ins><em>same machine 
via
-    various apps. Some of them send Facebook detailed 
information</em></ins></span> about <span class="removed"><del><strong>sending 
it to other companies.  This shows</strong></del></span>
-    the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's activities in the app; others only say that 
the user is
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>user has</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> has <span 
class="removed"><del><strong>been ordered to pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
     account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends personal data 
about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>phones of users 
that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span>
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
+    tracking, but most users will be tricked</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="removed"><del><strong>the FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>listens 
through the microphone&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
-    a <span class="removed"><del><strong>speech recognition company based in 
the U.S.&lt;/p&gt;
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span> 
the <span class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span class="removed"><del><strong>on a child's 
speech, and even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one 
more.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about</em></ins></span> its <span 
class="removed"><del><strong>users through</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="inserted"><ins><em>apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>apps whose
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need to get rid</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android</em></ins></span> by <span class="removed"><del><strong>a person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>&lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free software <span 
class="removed"><del><strong>which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span>
-    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt;</em></ins></span> that 
<span class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on 
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary 
apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>vibrator</strong></del></span> 
<span class="inserted"><ins><em>user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal</strong></del></span>
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much</em></ins></span> information 
about <span class="removed"><del><strong>how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have so much information 
about</em></ins></span> its <span class="removed"><del><strong>own 
malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>users.
+    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was anonymizing the data 
may</strong></del></span> <span class="inserted"><ins><em>its users.
-    It could</em></ins></span> be
-      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold the data</strong></del></span> <span 
class="inserted"><ins><em>designed so that users communicate such 
info</em></ins></span> to <span class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span> 
<span class="inserted"><ins><em>each
-    other but not</em></ins></span> to <span 
class="removed"><del><strong>figure out
-      who</strong></del></span> the <span class="removed"><del><strong>user 
was.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span class="inserted"><ins><em>other but not to</em></ins></span> the 
<span class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
     
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span>
+    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>way to 
access the data&lt;/a&gt;
-      collected</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store</em></ins></span> by <span 
class="removed"><del><strong>the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>noticing WiFi
+    follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>words
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span class="removed"><del><strong>these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>zero price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>sent them and text messages and 
emails</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>top under each subsection --&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the contrary, it
-    worked</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>various ways to prevent that,</em></ins></span> and 
<span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note that the specific sabotage method Lenovo</strong></del></span> <span 
class="inserted"><ins><em>deleted these apps after
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span>
+    <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
@@ -1439,7 +1519,7 @@
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
+    cheating? There</em></ins></span> is <span 
class="removed"><del><strong>using it</strong></del></span> <span 
class="inserted"><ins><em>no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
@@ -1958,10 +2038,9 @@
 
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
-    used <span class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to 
make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs</em></ins></span> did not <span 
class="removed"><del><strong>affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>do that 
when first sold.&lt;/p&gt;
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
@@ -1996,91 +2075,26 @@
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install 
is</strong></del></span> <span class="inserted"><ins><em>user declines consent? 
Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV 
will</em></ins></span> not <span class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span class="inserted"><ins><em>work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>had 
installed a patch to stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
@@ -2091,9 +2105,9 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a</em></ins></span> 
&ldquo;smart&rdquo; <span class="removed"><del><strong>device means the 
manufacturer is using it</strong></del></span> <span 
class="inserted"><ins><em>TV&lt;/a&gt;
-    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>break security on a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2182,9 +2196,9 @@
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
     to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2321,10 +2335,11 @@
 &lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that</strong></del></span> <span 
class="inserted"><ins><em>people, DJI</em></ins></span> is <span 
class="removed"><del><strong>viewed</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2337,8 +2352,7 @@
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>constantly
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
     communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
     paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
     computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
@@ -2446,35 +2460,33 @@
     &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
     monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
       Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;</em></ins></span>
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>back door, but that could be a
+    &lt;p&gt;The article says this is a back door, but that could be a
     misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
+    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and</strong></del></span> <span 
class="inserted"><ins><em>watch is designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to transmit conversations
+    to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -2485,13 +2497,17 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    tracked</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
 <span class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+    &lt;p&gt;GM did not get</em></ins></span> users' <span 
class="removed"><del><strong>voice on the internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
       give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
     sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
       &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
@@ -2598,27 +2614,27 @@
   &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
       &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
       collect a wide range of</strong></del></span> <span 
class="inserted"><ins><em>company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+    data <span class="removed"><del><strong>about their users and their users' 
+      friends</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span 
class="inserted"><ins><em>determine</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected by various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
+      companies.&lt;/p&gt;
 
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+      &lt;p&gt;They use</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
-    information, but if the state orders it to get</em></ins></span> the data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>data to 
manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>information, but if the state orders 
it</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>get the 
data</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
-      companies.&lt;/p&gt;
-
-      &lt;p&gt;They use this data to manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which is made
+    available</em></ins></span> to <span class="removed"><del><strong>spend a 
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers, 
insurance companies, and others.&lt;/p&gt;
 
     &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
       also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -3019,7 +3035,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- proprietary-surveillance.it.po      28 Feb 2019 09:00:39 -0000      1.277
+++ proprietary-surveillance.it.po      28 Feb 2019 09:30:39 -0000      1.278
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1799,6 +1799,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary-surveillance.ja-diff.html       28 Feb 2019 09:00:39 -0000      
1.126
+++ proprietary-surveillance.ja-diff.html       28 Feb 2019 09:30:39 -0000      
1.127
@@ -1026,7 +1026,7 @@
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
proprietary</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
@@ -1035,25 +1035,35 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>mobile devices report which other
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
     apps the user has
-    installed.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>a way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>interacting with</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;</em></ins></span>
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo;</em></ins></span> apps 
<span class="removed"><del><strong>for children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> used <span 
class="inserted"><ins><em>to
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps 
that</em></ins></span> used <span class="inserted"><ins><em>to
     be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
       QR-code scanner apps snoop</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
@@ -1147,18 +1157,12 @@
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the</em></ins></span> company's <span 
class="removed"><del><strong>statement</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;. The company is
     being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>anonymizes</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>data may be
-        true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span class="removed"><del><strong>data 
to</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a
-        <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>side issue. What the company does
-    with</em></ins></span> the data <span class="removed"><del><strong>broker 
can figure out who</strong></del></span> <span class="inserted"><ins><em>is a 
secondary issue. The principal wrong here is that</em></ins></span>
-    the <span class="removed"><del><strong>user is.&lt;/p&gt;
-  &lt;/li&gt;
+        true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>sells the data to</strong></del></span> <span 
class="inserted"><ins><em>will do
+    with the data.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="inserted"><ins><em>side issue. What the company does
+    with the</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue. The principal wrong here is 
that</em></ins></span>
+    the <span class="inserted"><ins><em>company gets that</em></ins></span> 
data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1169,48 +1173,71 @@
   &lt;li id="M201812290"&gt;
     &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>is surrounded by a person's
-      body), and</strong></del></span> <span class="inserted"><ins><em>obtains 
from</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>same 
machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>user's 
activities in the app; others only say that the user is
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook</em></ins></span> can <span class="removed"><del><strong>figure 
out who</strong></del></span> <span class="inserted"><ins><em>correlate the 
data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user 
has</em></ins></span> a <span class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which</strong></del></span> 
<span class="inserted"><ins><em>Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of</em></ins></span> users <span 
class="removed"><del><strong>can check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>spy on children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  &lt;li id="M201806110"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Spanish football 
streaming</em></ins></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>temperature 
of</strong></del></span> <span class="inserted"><ins><em>user's movements and 
listens through</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>surrounded 
by</strong></del></span> <span class="inserted"><ins><em>no way to 
save</em></ins></span>
+    a <span class="removed"><del><strong>person's
+      body), and the vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span> 
the <span class="removed"><del><strong>totally inadequate proposed response: a 
labeling
+      standard with which manufacturers would make 
statements</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less</em></ins></span> about
+      <span class="removed"><del><strong>their products, rather than free 
software which users can check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1220,31 +1247,44 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> <span class="inserted"><ins><em>listens 
through</em></ins></span> the <span class="removed"><del><strong>specific 
sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on 
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary 
apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
+    &lt;p&gt;Grindr should not have so much information 
about</em></ins></span> its <span class="removed"><del><strong>own 
malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>users.
+    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1254,107 +1294,50 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
       &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop
-    and collect information about its users&lt;/a&gt;.  40%</em></ins></span> 
of <span class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>snooping, in these proprietary apps whose
-    source code</em></ins></span> they <span class="removed"><del><strong>pass 
it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>cannot look at.  The other apps might be 
snooping</em></ins></span>
-    in <span class="removed"><del><strong>Cisco TNP IP 
phones:</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
-
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
-    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>other but not to the server's 
database.&lt;/p&gt;
+    <span class="inserted"><ins><em>other but not to</em></ins></span> the 
<span class="removed"><del><strong>emails of members of Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. It &lt;a
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    where</em></ins></span> they <span class="removed"><del><strong>pass it 
through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>travel before and after going to a 
movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
 
-  &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
     book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
@@ -1362,14 +1345,21 @@
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded &lt;a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
     worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    discovering what they did. So we cannot blame Google</em></ins></span> 
specifically
+    for <span class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
@@ -1378,8 +1368,8 @@
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>inspect executable 
proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
@@ -1389,13 +1379,22 @@
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
     &lt;p&gt;Apps for BART &lt;a
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on users&lt;/a&gt;.&lt;/p&gt;
+    snoop</em></ins></span> on <span class="removed"><del><strong>The 
Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
@@ -1406,7 +1405,13 @@
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1840,7 +1845,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
@@ -1919,11 +1924,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1959,8 +1961,11 @@
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2845,7 +2850,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.250
retrieving revision 1.251
diff -u -b -r1.250 -r1.251
--- proprietary-surveillance.ja.po      28 Feb 2019 09:00:39 -0000      1.250
+++ proprietary-surveillance.ja.po      28 Feb 2019 09:30:39 -0000      1.251
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1492,6 +1492,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary-surveillance.pot        28 Feb 2019 09:00:39 -0000      1.198
+++ proprietary-surveillance.pot        28 Feb 2019 09:30:39 -0000      1.199
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -997,6 +997,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a "
+"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\";> "
+"sent personal data to Facebook</a>. Lots of companies built apps that way "
+"and released them, apparently not realizing that all the personal data they "
+"collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a "
 
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";> 
"
 "recording all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.478
retrieving revision 1.479
diff -u -b -r1.478 -r1.479
--- proprietary-surveillance.ru.po      28 Feb 2019 09:00:39 -0000      1.478
+++ proprietary-surveillance.ru.po      28 Feb 2019 09:30:39 -0000      1.479
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -1395,6 +1395,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary.de-diff.html    28 Feb 2019 09:00:39 -0000      1.52
+++ proprietary.de-diff.html    28 Feb 2019 09:30:39 -0000      1.53
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -125,17 +125,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -248,22 +260,6 @@
     fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
     take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902041"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
-    on Google Play had one or more malicious functionalities, such
-    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;pushing
-    unwanted and often malicious ads on users, and redirecting them
-    to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
-    user interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -324,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.de.po   28 Feb 2019 09:00:39 -0000      1.94
+++ proprietary.de.po   28 Feb 2019 09:30:39 -0000      1.95
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -507,26 +522,6 @@
 "of anyone who operates the touch screen?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.es.po   28 Feb 2019 09:00:39 -0000      1.107
+++ proprietary.es.po   28 Feb 2019 09:30:39 -0000      1.108
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2019-02-25 11:08+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -413,40 +428,6 @@
 "huella dactilar en la pantalla</a>. ¿Supone esto que podrían registrar la "
 "huella dactilar de cualquiera que opere en la pantalla táctil?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"Ventinueve aplicaciones de retoque de fotos <cite>(beauty camera apps)</"
-"cite> que solían estar en Google Play tenían una o más funcionalidades "
-"maliciosas, tales como robar las fotos de los usuarios en lugar de "
-"«embellecerlas», <a href=\"https://www.teleanalysis.com/news/national/";
-"these-29-beauty-camera-apps-steal-private-photo-29923\">enviar a los "
-"usuarios anuncios no deseados y a menudo maliciosos, y redirigirlos a webs "
-"que suplantan otra identidad</a> para así robar sus credenciales. Además, 
la "
-"interfaz de usuario de la mayoría de ellas está diseñada para dificultar 
su "
-"desinstalación."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"Por supuesto, los usuarios deberían desinstalar estas peligrosas "
-"aplicaciones si no lo han hecho ya, pero deberían también mantenerse "
-"alejados de las aplicaciones que no sean libres en general. <em>Todas</em> "
-"las aplicaciones que no son libres entrañan un riesgo potencial, ya que no "
-"es fácil saber qué hacen realmente."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -526,6 +507,38 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "Ventinueve aplicaciones de retoque de fotos <cite>(beauty camera apps)</"
+#~ "cite> que solían estar en Google Play tenían una o más funcionalidades "
+#~ "maliciosas, tales como robar las fotos de los usuarios en lugar de "
+#~ "«embellecerlas», <a href=\"https://www.teleanalysis.com/news/national/";
+#~ "these-29-beauty-camera-apps-steal-private-photo-29923\">enviar a los "
+#~ "usuarios anuncios no deseados y a menudo maliciosos, y redirigirlos a "
+#~ "webs que suplantan otra identidad</a> para así robar sus credenciales. "
+#~ "Además, la interfaz de usuario de la mayoría de ellas está diseñada 
para "
+#~ "dificultar su desinstalación."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "Por supuesto, los usuarios deberían desinstalar estas peligrosas "
+#~ "aplicaciones si no lo han hecho ya, pero deberían también mantenerse "
+#~ "alejados de las aplicaciones que no sean libres en general. <em>Todas</"
+#~ "em> las aplicaciones que no son libres entrañan un riesgo potencial, ya "
+#~ "que no es fácil saber qué hacen realmente."
+
+#~ msgid ""
 #~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
 #~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 #~ "all the users' actions</a> in interacting with the app."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary.fr.po   28 Feb 2019 09:00:39 -0000      1.131
+++ proprietary.fr.po   28 Feb 2019 09:30:39 -0000      1.132
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2019-02-23 20:39+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -295,6 +295,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -410,40 +425,6 @@
 "Cela signifie-t-il qu'ils pourraient prendre l'empreinte digitale de toute "
 "personne se servant de l'écran tactile?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"Vingt-neuf applis d'amélioration de photos <cite>[beauty camera apps]</cite> 
"
-"qui se trouvaient sur Google Play avaient une ou plusieurs fonctionnalités "
-"malveillantes, parmi lesquelles le vol des photos, tandis qu'aucune "
-"amélioration n'était effectuée, <a 
href=\"https://www.teleanalysis.com/news/";
-"national/these-29-beauty-camera-apps-steal-private-photo-29923\">l'envoi de "
-"pubs non désirées et souvent malveillantes aux utilisateurs et la "
-"redirection vers des sites de phishing</a> qui volaient leurs données "
-"personnelles. De plus, l'interface utilisateurs de la plupart d'entre elles "
-"était conçue de telle sorte qu'elles soient difficiles à désinstaller."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"Bien entendu, les utilisateurs doivent désinstaller ces applis dangereuses "
-"s'ils ne l'ont déjà fait, mais plus généralement ils doivent éviter les "
-"applis non libres. <em>Toutes</em> les applis non libres comportent un "
-"risque potentiel parce qu'on ne peut pas vérifier facilement ce qu'elles "
-"font en réalité."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -519,6 +500,39 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "Vingt-neuf applis d'amélioration de photos <cite>[beauty camera apps]</"
+#~ "cite> qui se trouvaient sur Google Play avaient une ou plusieurs "
+#~ "fonctionnalités malveillantes, parmi lesquelles le vol des photos, tandis 
"
+#~ "qu'aucune amélioration n'était effectuée, <a href=\"https://www.";
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">l'envoi de pubs non désirées et souvent malveillantes aux "
+#~ "utilisateurs et la redirection vers des sites de phishing</a> qui "
+#~ "volaient leurs données personnelles. De plus, l'interface utilisateurs de 
"
+#~ "la plupart d'entre elles était conçue de telle sorte qu'elles soient "
+#~ "difficiles à désinstaller."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "Bien entendu, les utilisateurs doivent désinstaller ces applis "
+#~ "dangereuses s'ils ne l'ont déjà fait, mais plus généralement ils 
doivent "
+#~ "éviter les applis non libres. <em>Toutes</em> les applis non libres "
+#~ "comportent un risque potentiel parce qu'on ne peut pas vérifier "
+#~ "facilement ce qu'elles font en réalité."
+
+#~ msgid ""
 #~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
 #~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 #~ "all the users' actions</a> in interacting with the app."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.it-diff.html    28 Feb 2019 09:00:39 -0000      1.64
+++ proprietary.it-diff.html    28 Feb 2019 09:30:39 -0000      1.65
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -247,22 +259,6 @@
     fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
     take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902041"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
-    on Google Play had one or more malicious functionalities, such
-    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;pushing
-    unwanted and often malicious ads on users, and redirecting them
-    to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
-    user interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -323,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary.it.po   28 Feb 2019 09:00:39 -0000      1.103
+++ proprietary.it.po   28 Feb 2019 09:30:39 -0000      1.104
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -511,26 +526,6 @@
 "of anyone who operates the touch screen?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.ja-diff.html    28 Feb 2019 09:00:39 -0000      1.65
+++ proprietary.ja-diff.html    28 Feb 2019 09:30:39 -0000      1.66
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -181,6 +181,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -244,22 +256,6 @@
     fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
     take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902041"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
-    on Google Play had one or more malicious functionalities, such
-    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;pushing
-    unwanted and often malicious ads on users, and redirecting them
-    to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
-    user interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -320,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.ja.po   28 Feb 2019 09:00:39 -0000      1.86
+++ proprietary.ja.po   28 Feb 2019 09:30:39 -0000      1.87
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -431,26 +446,6 @@
 "of anyone who operates the touch screen?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.nl-diff.html    28 Feb 2019 09:00:39 -0000      1.64
+++ proprietary.nl-diff.html    28 Feb 2019 09:30:39 -0000      1.65
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -247,22 +259,6 @@
     fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
     take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902041"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
-    on Google Play had one or more malicious functionalities, such
-    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;pushing
-    unwanted and often malicious ads on users, and redirecting them
-    to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
-    user interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -323,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary.nl.po   28 Feb 2019 09:00:39 -0000      1.75
+++ proprietary.nl.po   28 Feb 2019 09:30:39 -0000      1.76
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -504,26 +519,6 @@
 "of anyone who operates the touch screen?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.pl-diff.html    28 Feb 2019 09:00:39 -0000      1.82
+++ proprietary.pl-diff.html    28 Feb 2019 09:30:39 -0000      1.83
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -245,22 +257,6 @@
     fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
     take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902041"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
-    on Google Play had one or more malicious functionalities, such
-    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;pushing
-    unwanted and often malicious ads on users, and redirecting them
-    to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
-    user interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -321,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary.pl.po   28 Feb 2019 09:00:39 -0000      1.70
+++ proprietary.pl.po   28 Feb 2019 09:30:39 -0000      1.71
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -586,26 +601,6 @@
 "of anyone who operates the touch screen?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.pot     28 Feb 2019 09:00:39 -0000      1.67
+++ proprietary.pot     28 Feb 2019 09:30:40 -0000      1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a "
+"href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\";> "
+"sent personal data to Facebook</a>. Lots of companies built apps that way "
+"and released them, apparently not realizing that all the personal data they "
+"collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -319,25 +335,6 @@
 "fingerprint of anyone who operates the touch screen?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a "
-"href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\";>pushing
 "
-"unwanted and often malicious ads on users, and redirecting them to phishing "
-"sites</a> that stole their credentials. Furthermore, the user interface of "
-"most of them was designed to make uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.pt-br.po        28 Feb 2019 09:00:39 -0000      1.96
+++ proprietary.pt-br.po        28 Feb 2019 09:30:40 -0000      1.97
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2019-02-24 15:49-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -404,39 +419,6 @@
 "impressão digital na tela</a>. Isso significa que eles poderia coletar a "
 "impressão digital de qualquer um que opera a tela de toque?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"Vinte e nove aplicativos de “câmera de beleza” que costumavam estar no "
-"Google Play tinham uma ou mais funcionalidades maliciosas, como roubar fotos "
-"dos usuários em vez de “embelezá-las”, <a 
href=\"https://www.teleanalysis.";
-"com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\"> "
-"empurrando anúncios indesejados e muitas vezes maliciosos para os usuários, 
"
-"e redirecionando-os para sites de phishing</a> que roubaram suas "
-"credenciais. Além disso, a interface do usuário da maioria deles foi "
-"projetada para dificultar a desinstalação."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"Os usuários devem, é claro, desinstalar esses aplicativos perigosos se 
ainda "
-"não o fizeram, mas eles também devem ficar longe de aplicativos não livres 
"
-"em geral. <em>Todos</em> os aplicativos não livres apresentam um risco "
-"potencial, porque não há uma maneira fácil de saber o que eles realmente "
-"fazem."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,6 +494,37 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "Vinte e nove aplicativos de “câmera de beleza” que costumavam estar 
no "
+#~ "Google Play tinham uma ou mais funcionalidades maliciosas, como roubar "
+#~ "fotos dos usuários em vez de “embelezá-las”, <a href=\"https://www.";
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\"> empurrando anúncios indesejados e muitas vezes maliciosos "
+#~ "para os usuários, e redirecionando-os para sites de phishing</a> que "
+#~ "roubaram suas credenciais. Além disso, a interface do usuário da maioria 
"
+#~ "deles foi projetada para dificultar a desinstalação."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "Os usuários devem, é claro, desinstalar esses aplicativos perigosos se "
+#~ "ainda não o fizeram, mas eles também devem ficar longe de aplicativos 
não "
+#~ "livres em geral. <em>Todos</em> os aplicativos não livres apresentam um "
+#~ "risco potencial, porque não há uma maneira fácil de saber o que eles "
+#~ "realmente fazem."
+
+#~ msgid ""
 #~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
 #~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 #~ "all the users' actions</a> in interacting with the app."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary.ru.po   28 Feb 2019 09:00:39 -0000      1.163
+++ proprietary.ru.po   28 Feb 2019 09:30:40 -0000      1.164
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -299,6 +299,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -411,40 +426,6 @@
 "датчики отпечатков пальцев на экране</a>. 
Подразумевает ли это, что они "
 "могли бы снимать отпечатки всех, кто 
работает с сенсорным экраном?"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-"В двадцати девяти приложениях 
&ldquo;фоторетуширования&rdquo;, которые были "
-"когда-то на Google Play, имелись вредоносные 
функции, такие как кража "
-"фотографий пользователя вместо 
&ldquo;приукрашивания&rdquo; их, <a href="
-"\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-";
-"steal-private-photo-29923\">навязывание нежелательной 
и часто вредной "
-"рекламы пользователям, а также 
перенаправление их на мошеннические 
сайты</"
-"a>, на которых у них воровали 
удостоверяющую личность информацию. Более "
-"того, пользовательский интерфейс большей 
их части был спроектирован, чтобы "
-"приложение было трудно удалить."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-"Конечно, пользователям следует удалить 
эти опасные приложения, если они еще "
-"этого не сделали, но им следует также 
вообще обходить стороной несвободные "
-"приложения. <em>Все</em> несвободные 
приложения сопряжены с потенциальным "
-"риском, потому что нет простого способа 
узнать, что они в действительности "
-"делают."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -524,6 +505,38 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google "
+#~ "Play had one or more malicious functionalities, such as stealing users' "
+#~ "photos instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
+#~ "teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+#~ "photo-29923\">pushing unwanted and often malicious ads on users, and "
+#~ "redirecting them to phishing sites</a> that stole their credentials. "
+#~ "Furthermore, the user interface of most of them was designed to make "
+#~ "uninstallation difficult."
+#~ msgstr ""
+#~ "В двадцати девяти приложениях 
&ldquo;фоторетуширования&rdquo;, которые "
+#~ "были когда-то на Google Play, имелись 
вредоносные функции, такие как "
+#~ "кража фотографий пользователя вместо 
&ldquo;приукрашивания&rdquo; их, <a "
+#~ "href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-";
+#~ "apps-steal-private-photo-29923\">навязывание 
нежелательной и часто "
+#~ "вредной рекламы пользователям, а также 
перенаправление их на "
+#~ "мошеннические сайты</a>, на которых у них 
воровали удостоверяющую "
+#~ "личность информацию. Более того, 
пользовательский интерфейс большей их "
+#~ "части был спроектирован, чтобы 
приложение было трудно удалить."
+
+#~ msgid ""
+#~ "Users should of course uninstall these dangerous apps if they haven't "
+#~ "yet, but they should also stay away from nonfree apps in general. "
+#~ "<em>All</em> nonfree apps carry a potential risk because there is no easy "
+#~ "way of knowing what they really do."
+#~ msgstr ""
+#~ "Конечно, пользователям следует удалить 
эти опасные приложения, если они "
+#~ "еще этого не сделали, но им следует также 
вообще обходить стороной "
+#~ "несвободные приложения. <em>Все</em> 
несвободные приложения сопряжены с "
+#~ "потенциальным риском, потому что нет 
простого способа узнать, что они в "
+#~ "действительности делают."
+
+#~ msgid ""
 #~ "Many nonfree apps have a surveillance feature for <a href=\"https://";
 #~ "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 #~ "all the users' actions</a> in interacting with the app."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary.zh-tw-diff.html 28 Feb 2019 09:00:39 -0000      1.42
+++ proprietary.zh-tw-diff.html 28 Feb 2019 09:30:40 -0000      1.43
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -125,17 +125,17 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library for building mobile apps, which also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -248,22 +260,6 @@
     fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
     take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902041"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to be
-    on Google Play had one or more malicious functionalities, such
-    as stealing users' photos instead of &ldquo;beautifying&rdquo; them, &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;pushing
-    unwanted and often malicious ads on users, and redirecting them
-    to phishing sites&lt;/a&gt; that stole their credentials. Furthermore, the
-    user interface of most of them was designed to make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -324,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:00:39 $
+$Date: 2019/02/28 09:30:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary.zh-tw.po        28 Feb 2019 09:00:39 -0000      1.53
+++ proprietary.zh-tw.po        28 Feb 2019 09:30:40 -0000      1.54
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 08:56+0000\n"
+"POT-Creation-Date: 2019-02-28 09:26+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "
@@ -420,26 +435,6 @@
 "of anyone who operates the touch screen?"
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google Play "
-"had one or more malicious functionalities, such as stealing users' photos "
-"instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";
-"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
-"photo-29923\">pushing unwanted and often malicious ads on users, and "
-"redirecting them to phishing sites</a> that stole their credentials. "
-"Furthermore, the user interface of most of them was designed to make "
-"uninstallation difficult."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Users should of course uninstall these dangerous apps if they haven't yet, "
-"but they should also stay away from nonfree apps in general. <em>All</em> "
-"nonfree apps carry a potential risk because there is no easy way of knowing "
-"what they really do."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- pt-br.po    28 Feb 2019 09:00:39 -0000      1.51
+++ pt-br.po    28 Feb 2019 09:30:40 -0000      1.52
@@ -4134,6 +4134,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- ru.po       28 Feb 2019 09:00:40 -0000      1.83
+++ ru.po       28 Feb 2019 09:30:40 -0000      1.84
@@ -5710,6 +5710,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- zh-tw.po    28 Feb 2019 09:00:40 -0000      1.37
+++ zh-tw.po    28 Feb 2019 09:30:40 -0000      1.38
@@ -3970,6 +3970,21 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Facebook offered a convenient proprietary library for building mobile apps, "
+"which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
+"zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
+"built apps that way and released them, apparently not realizing that all the "
+"personal data they collected would go to Facebook as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It shows that no one can trust a nonfree program, not even the developers of "
+"other nonfree programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]