www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 4 Mar 2019 04:00:13 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/03/04 04:00:11

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-amazon.de-diff.html 
                         malware-amazon.de.po malware-amazon.es.po 
                         malware-amazon.fr.po 
                         malware-amazon.it-diff.html 
                         malware-amazon.it.po 
                         malware-amazon.ja-diff.html 
                         malware-amazon.ja.po malware-amazon.pot 
                         malware-amazon.ru.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.40&r2=1.41

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- de.po       4 Mar 2019 08:00:36 -0000       1.40
+++ de.po       4 Mar 2019 09:00:09 -0000       1.41
@@ -550,6 +550,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -2138,27 +2175,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- es.po       4 Mar 2019 08:00:36 -0000       1.50
+++ es.po       4 Mar 2019 09:00:09 -0000       1.51
@@ -443,6 +443,52 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www.";
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+"\">envían la señal de vídeo que capturan a los servidores de Amazon</a>, 
que "
+"la guardan de forma permanente."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1690,36 +1736,6 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#| "the video they capture to Amazon servers</a> which save it permanently."
-msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www.";
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
-"\">envían la señal de vídeo que capturan a los servidores de Amazon</a>, 
que "
-"la guardan de forma permanente."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
 msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- fr.po       4 Mar 2019 08:00:36 -0000       1.69
+++ fr.po       4 Mar 2019 09:00:09 -0000       1.70
@@ -453,6 +453,53 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
+"leurs enregistrements vidéo aux serveurs d'Amazon</a>, qui les sauvegardent "
+"sur le long terme."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Très souvent, la vidéo montre tous les gens qui s'approchent de la porte "
+"d'entrée, ou même de simples passants."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+"L'article s'intéresse surtout à la manière dont Ring laissait certains "
+"employés regarder librement les vidéos. Il semble qu'Amazon ait essayé "
+"d'empêcher cet abus secondaire. Quant à l'abus primaire (le fait qu'elle "
+"obtienne les vidéos), Amazon compte bien que la société s'y soumettra."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1698,37 +1745,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
-"leurs enregistrements vidéo aux serveurs d'Amazon</a>, qui les sauvegardent "
-"sur le long terme."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-"Très souvent, la vidéo montre tous les gens qui s'approchent de la porte "
-"d'entrée, ou même de simples passants."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-"L'article s'intéresse surtout à la manière dont Ring laissait certains "
-"employés regarder librement les vidéos. Il semble qu'Amazon ait essayé "
-"d'empêcher cet abus secondaire. Quant à l'abus primaire (le fait qu'elle "
-"obtienne les vidéos), Amazon compte bien que la société s'y soumettra."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- it.po       4 Mar 2019 08:00:36 -0000       1.40
+++ it.po       4 Mar 2019 09:00:09 -0000       1.41
@@ -521,6 +521,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -2082,27 +2119,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- ja.po       4 Mar 2019 08:00:36 -0000       1.40
+++ ja.po       4 Mar 2019 09:00:09 -0000       1.41
@@ -466,6 +466,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1760,27 +1797,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-amazon.de-diff.html 4 Feb 2019 07:31:22 -0000       1.18
+++ malware-amazon.de-diff.html 4 Mar 2019 09:00:09 -0000       1.19
@@ -228,6 +228,34 @@
 &lt;h3 id="misc"&gt; Malware in other products&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201711200"&gt;
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
@@ -301,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/04 09:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-amazon.de.po        14 Jan 2019 07:59:32 -0000      1.22
+++ malware-amazon.de.po        4 Mar 2019 09:00:09 -0000       1.23
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2017-09-26 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -309,6 +309,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "

Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-amazon.es.po        12 Feb 2019 10:59:31 -0000      1.27
+++ malware-amazon.es.po        4 Mar 2019 09:00:09 -0000       1.28
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-02-12 11:22+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -250,6 +251,56 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | Amazon Ring &ldquo;security&rdquo; devices <a
+# | 
href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\";>
+# | send the video they capture to Amazon servers</a>{+,+} which save it
+# | [-permanently.-] {+long-term.+}
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www.";
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+"\">envían la señal de vídeo que capturan a los servidores de Amazon</a>, 
que "
+"la guardan de forma permanente."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "

Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-amazon.fr.po        14 Jan 2019 09:33:11 -0000      1.32
+++ malware-amazon.fr.po        4 Mar 2019 09:00:10 -0000       1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-01-13 10:54+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -245,6 +246,53 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
+"leurs enregistrements vidéo aux serveurs d'Amazon</a>, qui les sauvegardent "
+"sur le long terme."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Très souvent, la vidéo montre tous les gens qui s'approchent de la porte "
+"d'entrée, ou même de simples passants."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+"L'article s'intéresse surtout à la manière dont Ring laissait certains "
+"employés regarder librement les vidéos. Il semble qu'Amazon ait essayé "
+"d'empêcher cet abus secondaire. Quant à l'abus primaire (le fait qu'elle "
+"obtienne les vidéos), Amazon compte bien que la société s'y soumettra."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "

Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-amazon.it-diff.html 8 Feb 2019 09:30:03 -0000       1.32
+++ malware-amazon.it-diff.html 4 Mar 2019 09:00:10 -0000       1.33
@@ -228,6 +228,34 @@
 &lt;h3 id="misc"&gt; Malware in other products&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201711200"&gt;
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
@@ -301,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:03 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-amazon.it.po        8 Feb 2019 08:59:35 -0000       1.25
+++ malware-amazon.it.po        4 Mar 2019 09:00:10 -0000       1.26
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2017-09-30 22:48+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -287,6 +287,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "

Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-amazon.ja-diff.html 4 Feb 2019 07:31:22 -0000       1.29
+++ malware-amazon.ja-diff.html 4 Mar 2019 09:00:10 -0000       1.30
@@ -217,6 +217,34 @@
 &lt;h3 id="misc"&gt; Malware in other products&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201711200"&gt;
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
@@ -290,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-amazon.ja.po        14 Jan 2019 07:59:32 -0000      1.16
+++ malware-amazon.ja.po        4 Mar 2019 09:00:10 -0000       1.17
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2016-10-31 11:24+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -255,6 +255,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "

Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-amazon.pot  14 Jan 2019 07:59:32 -0000      1.15
+++ malware-amazon.pot  4 Mar 2019 09:00:10 -0000       1.16
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -180,6 +180,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a "
+"href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\";>
 "
+"send the video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a "
 
"href=\"https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo\";>
 "
 "allow delivery staff to open their front doors</a>. Wouldn't you know it, "

Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-amazon.ru.po        25 Feb 2019 10:00:30 -0000      1.37
+++ malware-amazon.ru.po        4 Mar 2019 09:00:10 -0000       1.38
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-10-08 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -245,6 +246,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Устройства &ldquo;безопасности&rdquo; Amazon Ring <a 
href=\"https://www.";
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
+"отсылают видеозаписи, которые они 
собирают, на серверы Amazon</a>, где они "
+"сохраняются на длительное время."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Во многих случаях видеозаписи показывают 
всех, кто оказался вблизи или "
+"просто проходит мимо двери пользователя."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+"Основное внимание статья уделяет тому, 
как Ring позволял отдельным "
+"работникам свободно заглядывать в 
видеозаписи. Как оказалось, в Amazon "
+"пытались предотвратить эти вторичные 
злоупотребления, но первичное "
+"злоупотребление, состоящее в том, что Amazon 
получает видеозаписи,&mdash; "
+"Amazon считает, что в этом общество должно 
уступить."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -353,16 +402,6 @@
 #~ msgstr "<a href=\"#surveillance\">Слежка</a>"
 
 #~ msgid ""
-#~ "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#~ "the video they capture to Amazon servers</a> which save it permanently."
-#~ msgstr ""
-#~ "Устройства &ldquo;безопасности&rdquo; Amazon Ring <a 
href=\"https://www.";
-#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
-#~ "\"> отсылают видеозаписи, которые они 
собирают, на серверы Amazon</a>, "
-#~ "где они сохраняются навсегда."
-
-#~ msgid ""
 #~ "We refer to that product as the <a href=\"/philosophy/why-call-it-the-"
 #~ "swindle.html\"> Amazon Swindle</a> because of this and <a href=\"/"
 #~ "philosophy/ebooks.html\"> other malicious functionalities</a>."

Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-appliances.de-diff.html     28 Feb 2019 22:00:38 -0000      1.37
+++ malware-appliances.de-diff.html     4 Mar 2019 09:00:10 -0000       1.38
@@ -71,107 +71,117 @@
 
   &lt;li&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
+      is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>surveillance device. 
&lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+       Canary</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera</strong></del></span>
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell</em></ins></span> camera is <span 
class="removed"><del><strong>an example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact</strong></del></span> <span class="inserted"><ins><em>designed 
so</em></ins></span> that the <span class="removed"><del><strong>device is 
tethered to a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all 
the time. Now</em></ins></span> it <span class="removed"><del><strong>also 
demonstrates</strong></del></span> <span class="inserted"><ins><em>turns 
out</em></ins></span>
+    that <span class="removed"><del><strong>the device gives the company
+      surveillance capability.&lt;/p&gt;
+&lt;/li&gt;
+  
+&lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
+    hospitals</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon</em></ins></span> to <span 
class="inserted"><ins><em>change</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally &lt;a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span> that <span 
class="removed"><del><strong>this article misuses the 
term</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+     referring</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon</em></ins></span> to <span 
class="removed"><del><strong>crackers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet of Stings devices
+    allows</strong></del></span> <span 
class="inserted"><ins><em>HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the 
user</em></ins></span> is <span class="removed"><del><strong>an 
example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
     &lt;p&gt;Even though the ink subscription program may be cheaper in some
     specific cases, it spies</em></ins></span> on <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges</em></ins></span> that <span 
class="inserted"><ins><em>would otherwise be in
+    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>people that</strong></del></span> use <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>of ink 
cartridges that would otherwise</em></ins></span> be <span 
class="removed"><del><strong>a sucker&mdash;reject all</strong></del></span> 
<span class="inserted"><ins><em>in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span class="removed"><del><strong>device is 
tethered</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="removed"><del><strong>a 
server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates that</strong></del></span>
-    <span class="inserted"><ins><em>long-term.&lt;/p&gt;
-
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone that comes near, or merely
-    passes by,</em></ins></span> the <span class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;
-&lt;/li&gt;
-  
-&lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals is connected</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
+    send</em></ins></span> the <span 
class="removed"><del><strong>stings.&lt;/p&gt;
+  &lt;p&gt;It is unfortunate</strong></del></span> <span 
class="inserted"><ins><em>video they capture to Amazon servers&lt;/a&gt;, which 
save it
+    long-term.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="inserted"><ins><em>let individual employees look
-    at</em></ins></span> the <span class="removed"><del><strong>internet. 
Naturally &lt;a
-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its security</strong></del></span> <span class="inserted"><ins><em>videos 
freely.  It appears Amazon</em></ins></span> has <span 
class="removed"><del><strong>been cracked&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>tried to 
prevent</em></ins></span> that <span class="removed"><del><strong>this article 
misuses</strong></del></span>
-    <span class="inserted"><ins><em>secondary abuse, but</em></ins></span> the 
<span class="removed"><del><strong>term &lt;a
-href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring</strong></del></span> <span class="inserted"><ins><em>primary 
abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society</em></ins></span> to <span 
class="removed"><del><strong>crackers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surrender to.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span class="inserted"><ins><em>user's 
front door.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;The bad security in many Internet of Stings devices
-    allows</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>people that use them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't be a sucker&mdash;reject all</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in</em></ins></span> the 
<span class="removed"><del><strong>stings.&lt;/p&gt;
-  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>own words 
of the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to 
him,</em></ins></span>
-    is <span class="removed"><del><strong>unfortunate</strong></del></span> 
that <span class="inserted"><ins><em>it is opt-in in newer models. But 
since</em></ins></span> the <span class="removed"><del><strong>article 
uses</strong></del></span> <span class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind</em></ins></span> 
the
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>uses</strong></del></span> <span 
class="inserted"><ins><em>focuses on how Ring used to let individual employees 
look
+    at</em></ins></span> the
   <span class="removed"><del><strong>term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
   &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
   They have login accounts with hard-coded passwords, which can't be
-  changed,</strong></del></span> <span 
class="inserted"><ins><em>scenes,</em></ins></span>
-    and <span class="removed"><del><strong>&lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there</strong></del></span>
 <span class="inserted"><ins><em>there</em></ins></span> is no <span 
class="removed"><del><strong>way to
-  delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+  changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way</strong></del></span> <span class="inserted"><ins><em>videos freely. 
 It appears Amazon has tried</em></ins></span> to
+  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>guarantee</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>prevent</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
 medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Users are suing Bose for &lt;a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing</strong></del></span> <span class="inserted"><ins><em>all future 
updates will leave the
-    settings unchanged.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose 
for</strong></del></span>
 
-    &lt;p&gt;If you already own</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>Vizio smart TV (or any smart TV,</em></ins></span> 
for <span class="removed"><del><strong>its headphones&lt;/a&gt;.
-Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
+  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing a spyware app for its headphones&lt;/a&gt;.
+Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in</em></ins></span> the 
<span class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>own words</em></ins></span> of the <span 
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>company's
+    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
 &lt;/p&gt;
 
-&lt;p&gt;The suit accuses</strong></del></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
-If the fine print of</strong></del></span>
-    <span class="inserted"><ins><em>matter),</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
-would that</strong></del></span> <span class="inserted"><ins><em>easiest way 
to</em></ins></span> make <span 
class="inserted"><ins><em>sure</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
+&lt;p&gt;The suit accuses that</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
+    lower retail prices.&lt;/p&gt;
+
+    &lt;p&gt;What is supposed to make</em></ins></span> this <span 
class="removed"><del><strong>was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>spying acceptable, 
according to him,
+    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>fine print of</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>app said</strong></del></span> <span 
class="inserted"><ins><em>scenes,
+    and there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>users gave consent</strong></del></span> <span 
class="inserted"><ins><em>all future updates will leave the
+    settings unchanged.&lt;/p&gt;
+
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart 
TV,</em></ins></span> for <span class="removed"><del><strong>this,
+would</strong></del></span> that
+    <span class="inserted"><ins><em>matter), the easiest way 
to</em></ins></span> make <span 
class="inserted"><ins><em>sure</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
 illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on 
you is</em></ins></span>
     to <span class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
@@ -184,7 +194,7 @@
   &lt;p&gt;Anova sabotaged users' cooking devices with</strong></del></span> 
<span class="inserted"><ins><em>get your own router (which can
     be an old computer running completely free software), and set 
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
   tethered them</strong></del></span>
-    <span class="inserted"><ins><em>firewall to block 
connections</em></ins></span> to <span class="inserted"><ins><em>Vizio's 
servers. Or, as</em></ins></span> a <span class="removed"><del><strong>remote 
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
+    <span class="inserted"><ins><em>firewall</em></ins></span> to <span 
class="inserted"><ins><em>block connections to Vizio's servers. Or, 
as</em></ins></span> a <span class="removed"><del><strong>remote 
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -248,71 +258,69 @@
       report everything</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
     hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="removed"><del><strong>is viewed on</strong></del></span> <span 
class="inserted"><ins><em>people cannot hear</em></ins></span>
-    them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and 
<span class="removed"><del><strong>not just broadcasts</strong></del></span> 
<span class="inserted"><ins><em>Siri can.&lt;/p&gt;
+    them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and 
<span class="removed"><del><strong>not just broadcasts
+      and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>Siri can.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807050"&gt;
     &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
-    app.  In 2017, the company shut down</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>app stop working. &lt;a
+    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>company shut down and made</em></ins></span> the 
<span class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>app stop 
working. &lt;a
     
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All</em></ins></span>
-    the <span class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>existing 
trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>TV reports what it is. The 
existence of</strong></del></span> <span class="inserted"><ins><em>existing 
trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on a further nasty fillip, that sales 
of</em></ins></span> the <span class="removed"><del><strong>TV reports 
what</strong></del></span>
+    &lt;p&gt;The article focuses on</em></ins></span> a <span 
class="removed"><del><strong>way to
+    disable</strong></del></span> <span class="inserted"><ins><em>further 
nasty fillip, that sales of</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span>
     <span class="inserted"><ins><em>broken devices continued. But I think that 
is a secondary issue;</em></ins></span>
-    it <span class="removed"><del><strong>is.</strong></del></span> <span 
class="inserted"><ins><em>made the nasty consequences extend to some additional 
people.</em></ins></span>
-    The <span class="removed"><del><strong>existence of a 
way</strong></del></span> <span class="inserted"><ins><em>fundamental wrong 
was</em></ins></span> to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>devices to depend on something
-    else that didn't respect users' freedom.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company &lt;a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    it <span class="inserted"><ins><em>made the nasty consequences extend to 
some additional people.
+    The fundamental wrong</em></ins></span> was <span 
class="removed"><del><strong>in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>to design</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>devices to depend on something
+    else that didn't respect users' freedom.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo;</strong></del></span>
+&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo;</em></ins></span> TVs <span 
class="inserted"><ins><em>automatically</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;The report was as of 2014, but we don't expect this has got
 better.&lt;/p&gt;
 
-&lt;p&gt;This shows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+&lt;p&gt;This shows that laws requiring products to get users' formal
 consent before collecting personal data are totally inadequate.  And
-what happens if</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV will say,
-&ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will not
+what happens if a</strong></del></span> <span 
class="inserted"><ins><em>its</em></ins></span> user <span 
class="removed"><del><strong>declines consent?  Probably the TV will say,
+&ldquo;Without your consent to tracking, the TV will not
 work.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>article for the facts it presents. It
-    is too bad</em></ins></span> that <span class="removed"><del><strong>TVs 
are not allowed to report what</strong></del></span> the
-<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;Some LG
+&lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>by
+    sending usage data back over</em></ins></span> the
+<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;</em></ins></span>
+    &lt;p&gt;Some <span class="removed"><del><strong>LG
 TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
 tyrants&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;a
 
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
-Samsung &ldquo;Smart&rdquo; TVs have turned Linux into</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the <span class="removed"><del><strong>base
-for a tyrant system&lt;/a&gt; so as to impose DRM.
-What enables Samsung</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness of 
surrendering</em></ins></span> to <span class="removed"><del><strong>do this is 
that Linux is released under
-GNU GPL version 2,</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> &lt;a 
<span class="removed"><del><strong>href="/licenses/rms-why-gplv3.html"&gt;not 
version 3&lt;/a&gt;,
-together with a weak interpretation of GPL version 2.</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+Samsung</strong></del></span> &ldquo;Smart&rdquo; TVs <span 
class="removed"><del><strong>have turned Linux into the base
+for</strong></del></span> <span class="inserted"><ins><em>automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>tyrant system&lt;/a&gt; so as to impose DRM.
+What enables Samsung</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>do this</strong></del></span> <span 
class="inserted"><ins><em>the article for the facts it presents. 
It</em></ins></span>
+    is <span class="inserted"><ins><em>too bad</em></ins></span> that <span 
class="removed"><del><strong>Linux is released under
+GNU GPL version 2, &lt;a href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
+together with a weak interpretation</strong></del></span> <span 
class="inserted"><ins><em>the article finishes by advocating the
+    moral weakness</em></ins></span> of <span class="removed"><del><strong>GPL 
version 2.</strong></del></span> <span class="inserted"><ins><em>surrendering 
to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -340,50 +348,35 @@
 <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
 intentionally broke Revolv home automatic</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose</em></ins></span> control <span class="removed"><del><strong>products 
that depended on</strong></del></span> <span class="inserted"><ins><em>of your 
house and appliances&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;For your safety, don't use any appliance with</em></ins></span> a 
<span class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>connection</em></ins></span> to <span 
class="removed"><del><strong>function.  The lesson is, don't stand for that! 
Insist
-on self-contained computers that run free 
software!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the
-    real internet.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;ARRIS cable modem</strong></del></span>
+    lose</em></ins></span> control <span class="removed"><del><strong>products 
that depended on
+a server&lt;/a&gt; to function.  The lesson is,</strong></del></span> <span 
class="inserted"><ins><em>of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system</em></ins></span> has a <span 
class="inserted"><ins><em>grave security flaw.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;For your safety,</em></ins></span> don't <span 
class="removed"><del><strong>stand for that! Insist
+on self-contained computers that run free software!&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;
+&lt;p&gt;ARRIS cable modem has</strong></del></span> <span 
class="inserted"><ins><em>use any appliance with</em></ins></span> a <span 
class="removed"><del><strong>&lt;a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor in</strong></del></span> <span class="inserted"><ins><em>connection 
to</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>real internet.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711080"&gt;
-    &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+&ldquo;Left Hand&rdquo; operating system have back doors that give HP
+&lt;a
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
 remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>server through which</em></ins></span> the 
<span class="removed"><del><strong>back door allows
-installation of software changes,</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
-    communicate with them&lt;/a&gt;.&lt;/p&gt;
+access</strong></del></span>
 
-    &lt;p&gt;The owners suspect this is to pressure them to 
buy</em></ins></span> a <span class="removed"><del><strong>change could be 
installed</strong></del></span> <span class="inserted"><ins><em>newer model. If
-    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that
-<span class="removed"><del><strong>would give access</strong></del></span>
-    <span class="inserted"><ins><em>requires users</em></ins></span> to <span 
class="removed"><del><strong>the customer's data.
+  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers</em></ins></span> to <span 
class="removed"><del><strong>the customer's data, but if the back door allows
+installation of software changes, a change could</strong></del></span> be 
<span class="removed"><del><strong>installed that
+would give access</strong></del></span> <span 
class="inserted"><ins><em>suckers and &lt;a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff</em></ins></span> to <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. Wouldn't you know
+    it,</em></ins></span> the <span class="removed"><del><strong>customer's 
data.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -395,75 +388,78 @@
 
 &lt;p&gt;
 &lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of routers
-have back doors&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>talk with them through some specialized 
service.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router has</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is</em></ins></span> a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+have back doors&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>surveillance device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera</em></ins></span> is <span class="inserted"><ins><em>an 
example&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
+The TP-Link router</strong></del></span> <span 
class="inserted"><ins><em>system</em></ins></span> has a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it is
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>designed with DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is the Keurig</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it is
 being discontinued, which means that eventually authorized materials won't
-be available and</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
-    the <span class="removed"><del><strong>printers may become 
unusable.&lt;/p&gt;
+be available and</strong></del></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
 
-&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer</strong></del></span> <span 
class="inserted"><ins><em>fact</em></ins></span> that <span 
class="removed"><del><strong>gets</strong></del></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
-even be</strong></del></span> <span class="inserted"><ins><em>device is 
tethered to</em></ins></span> a <span class="removed"><del><strong>remote 
possibility.&lt;/p&gt;
+&lt;p&gt;With a</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;p&gt;How pitiful that the author of that article 
says</strong></del></span> <span class="inserted"><ins><em>server.&lt;/p&gt;
+  &lt;li id="M201711080"&gt;
+    &lt;p&gt;Logitech will sabotage
+    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off</em></ins></span> the <span 
class="removed"><del><strong>Respects Your 
Freedom&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>server 
through which the products' supposed owners
+    communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
-    proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The owners suspect</em></ins></span> this <span 
class="removed"><del><strong>problem would not
+even be</strong></del></span> <span class="inserted"><ins><em>is to pressure 
them to buy</em></ins></span> a <span class="removed"><del><strong>remote 
possibility.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>there was
-&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the device 
<span class="removed"><del><strong>to restrict users in</strong></del></span> 
<span class="inserted"><ins><em>gives</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like putting a &ldquo;cheat 
me and mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all companies
-that take advantage of people like him.  Indeed, it</strong></del></span> 
<span class="inserted"><ins><em>company
-    surveillance capability.&lt;/p&gt;
+&lt;p&gt;How pitiful that the author of</strong></del></span> <span 
class="inserted"><ins><em>newer model. If
+    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that
+    <span class="inserted"><ins><em>requires users to talk with them through 
some specialized service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709200"&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
-    designed for hospitals</em></ins></span> is <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>acceptance of
-their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>internet. Naturally &lt;a
-    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201710040"&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
+    manufacturer can communicate with it, is a surveillance device. &lt;a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>says</strong></del></span> <span 
class="inserted"><ins><em>describes wrongdoing by the manufacturer, based on
+    the fact</em></ins></span> that <span class="removed"><del><strong>there 
was
+&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the device 
<span class="inserted"><ins><em>is tethered</em></ins></span> to <span 
class="removed"><del><strong>restrict users in
+the first place.  This is like putting</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;cheat me and mistreat me&rdquo;
+sign on your chest.  We should know better: we should condemn all companies
+that take advantage of people like him.  Indeed,</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>teaches people</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span class="removed"><del><strong>be 
doormats.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
+    proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;But</em></ins></span> it <span class="removed"><del><strong>is 
the acceptance of
+their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>teaches people to be 
doormats.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
device gives the company
+    surveillance capability.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span>
+&lt;p&gt;Philips</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have been designed not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>interact with other companies' smart
+  <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
+    &lt;p&gt;A</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>lightbulbs &lt;a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been</strong></del></span> <span class="inserted"><ins><em>intravenous 
pump</em></ins></span>
+    designed <span class="removed"><del><strong>not to interact with other 
companies' smart
 lightbulbs&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>snoop on the 
people that use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>product is &ldquo;smart&rdquo;, and you didn't 
build it, it</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is
-<span class="removed"><del><strong>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
+&lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it, it is
+cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -472,46 +468,73 @@
 DVDs and Bluray disks have DRM&lt;/a&gt;.
 &lt;/p&gt;
 
-&lt;p&gt;That page uses spin terms</strong></del></span> <span 
class="inserted"><ins><em>unfortunate</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>the article 
uses the term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+&lt;p&gt;That page uses spin terms that favor DRM,
+including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
 digital &ldquo;rights&rdquo; management&lt;/a&gt;
-and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+and &lt;a 
href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
+and it claims that &ldquo;artists&rdquo; (rather than companies) are
+primarily responsible</strong></del></span> for <span 
class="removed"><del><strong>putting digital restrictions management into
+these disks.  Nonetheless, it</strong></del></span> <span 
class="inserted"><ins><em>hospitals</em></ins></span> is <span 
class="removed"><del><strong>a reference for</strong></del></span> <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>facts.
+&lt;/p&gt;
+
+&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>internet. 
Naturally</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+    its</em></ins></span> security <span 
class="removed"><del><strong>bugs</strong></del></span> <span 
class="inserted"><ins><em>has been cracked&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>allow anyone</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
+    referring</em></ins></span> to <span class="removed"><del><strong>watch 
through them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad</em></ins></span> security <span 
class="removed"><del><strong>hole;</strong></del></span> <span 
class="inserted"><ins><em>in many Internet of Stings devices 
allows</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the</em></ins></span> people <span 
class="removed"><del><strong>can remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims</strong></del></span> that <span 
class="removed"><del><strong>this is an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>use 
them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the
+<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that the article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708230"&gt;
-    &lt;p&gt;Sonos</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    &lt;p&gt;Sonos &lt;a
+    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
     told all its customers, &ldquo;Agree&rdquo;
     to snooping or the product will stop working&lt;/a&gt;.  &lt;a
     
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
     Another article&lt;/a&gt; says they won't forcibly change the software, but
-    people won't be able to get any upgrades</em></ins></span> and <span 
class="inserted"><ins><em>eventually</em></ins></span> it <span 
class="removed"><del><strong>claims that &ldquo;artists&rdquo; (rather than 
companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it is</strong></del></span> <span 
class="inserted"><ins><em>will
+    people won't be able to get any upgrades and eventually it will
     stop working.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>reference for the facts.
-&lt;/p&gt;
-
-&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
-don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
+    &lt;p&gt;While you're using a DJI drone
     to snoop on other people, DJI is in many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>id="M201706200"&gt;
-    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>network-connected 
surveillance</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
-    <span class="inserted"><ins><em>are tremendously insecure.  
They</em></ins></span> have <span class="inserted"><ins><em>login
-    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-security bugs that allow anyone</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way</em></ins></span> to <span class="removed"><del><strong>watch 
through them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201706200"&gt;
+    &lt;p&gt;Many models of Internet-connected cameras
+    are tremendously insecure.  They have login
+    accounts with hard-coded passwords, which can't be changed, and &lt;a
+    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
+    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705250"&gt;
@@ -730,13 +753,10 @@
     mistreat me&rdquo; sign on your chest.  We should know better: we
     should condemn all companies that take advantage of people like him. 
     Indeed, it is the acceptance of their unjust practice that teaches
-    people to be doormats.&lt;/p&gt;</em></ins></span>
+    people to be doormats.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201512140"&gt;
+  &lt;li id="M201512140"&gt;
     &lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs had initially been
     designed to interact with other companies' smart light bulbs, but &lt;a
     
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
@@ -754,17 +774,15 @@
     dlink of an eye.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
-    router</em></ins></span> has a <span class="removed"><del><strong>big 
security hole;</strong></del></span> <span class="inserted"><ins><em>back 
door&lt;/a&gt;.&lt;/p&gt;
+    router has a back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
     routers have back doors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
@@ -782,9 +800,7 @@
     sounds to be picked up by proprietary malware running
     on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely control it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims</strong></del></span> <span 
class="inserted"><ins><em>correlate ads with Web activity, and other &lt;a
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -794,12 +810,11 @@
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="inserted"><ins><em>advertisers can track you
+    link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="inserted"><ins><em>off, but having it enabled by 
default</em></ins></span>
-    is an <span class="removed"><del><strong>&ldquo;open&rdquo; platform so the
-problem is partly</strong></del></span> <span 
class="inserted"><ins><em>injustice already.&lt;/p&gt;
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
@@ -1284,7 +1299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:38 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-appliances.de.po    28 Feb 2019 22:00:38 -0000      1.71
+++ malware-appliances.de.po    4 Mar 2019 09:00:10 -0000       1.72
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -108,6 +108,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-appliances.fr.po    28 Feb 2019 22:17:16 -0000      1.113
+++ malware-appliances.fr.po    4 Mar 2019 09:00:10 -0000       1.114
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-02-28 23:15+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-appliances.pot      28 Feb 2019 22:00:38 -0000      1.56
+++ malware-appliances.pot      4 Mar 2019 09:00:10 -0000       1.57
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-appliances.ru.po    1 Mar 2019 05:29:26 -0000       1.147
+++ malware-appliances.ru.po    4 Mar 2019 09:00:10 -0000       1.148
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- nl.po       4 Mar 2019 08:00:37 -0000       1.40
+++ nl.po       4 Mar 2019 09:00:10 -0000       1.41
@@ -411,6 +411,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1733,27 +1770,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- pl.po       4 Mar 2019 08:00:37 -0000       1.40
+++ pl.po       4 Mar 2019 09:00:10 -0000       1.41
@@ -365,6 +365,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1300,27 +1337,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- pot 4 Mar 2019 08:00:37 -0000       1.40
+++ pot 4 Mar 2019 09:00:10 -0000       1.41
@@ -322,6 +322,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1170,27 +1207,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "

Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-insecurity.de-diff.html 4 Feb 2019 07:31:23 -0000       1.22
+++ proprietary-insecurity.de-diff.html 4 Mar 2019 09:00:10 -0000       1.23
@@ -69,6 +69,19 @@
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
@@ -196,35 +209,10 @@
 
 <span class="removed"><del><strong>&lt;li&gt;
   &lt;p&gt;
-    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28 models of HP laptops logged the user's
-    keystroke to a file in the filesystem. Any process with access to
-    the filesystem or the MapViewOfFile API could gain access to the
-    log. Furthermore, &lt;a 
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
-    to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage
-    Channel enables malware authors to capture keystrokes without
-    taking the risk of being classified as malicious task by AV
-    heuristics&rdquo;.
-  &lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+    Conexant</strong></del></span>
 
-
-&lt;li&gt;
-  &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
-       and then leaked by the Shadowbrokers group, are now being used to
-       &lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
-       of Windows computers with ransomware&lt;/a&gt;.
-       &lt;/p&gt;
-&lt;/li&gt;</strong></del></span>
-
-  &lt;li  <span 
class="removed"><del><strong>id="intel-me-10-year-vulnerability"&gt;
-  &lt;p&gt;Intel's</strong></del></span> <span 
class="inserted"><ins><em>id="M201706050"&gt;
-    &lt;p id="intel-me-10-year-vulnerability"&gt;Intel's</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201706050"&gt;
+    &lt;p id="intel-me-10-year-vulnerability"&gt;Intel's
     CPU backdoor&mdash;the Intel Management Engine&mdash;had a &lt;a
     
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
     security vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
@@ -242,9 +230,7 @@
     besides using machines that don't come with the backdoor.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
+  &lt;li id="M201705250"&gt;
     &lt;p&gt;The proprietary code that runs pacemakers,
     insulin pumps, and other medical devices is &lt;a
     href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
@@ -252,50 +238,87 @@
   &lt;/li&gt;
 
   &lt;li id="M201705160"&gt;
-    &lt;p&gt;Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    &lt;p&gt;Conexant</em></ins></span> HD Audio Driver Package (version 
1.0.0.46 and earlier)
     pre-installed on 28 models of HP laptops logged the user's keystroke
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, &lt;a
     
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
     to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage Channel
     enables malware authors to capture keystrokes without taking the risk
-    of being classified as malicious task by AV heuristics&rdquo;.&lt;/p&gt;
+    of being classified as malicious task by AV
+    <span class="removed"><del><strong>heuristics&rdquo;.
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>heuristics&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705120"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705120"&gt;</em></ins></span>
     &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to &lt;a
     
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
-    a great number of Windows computers with ransomware&lt;/a&gt;.&lt;/p&gt;
+    a great number of Windows computers with <span 
class="removed"><del><strong>ransomware&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704050"&gt;</em></ins></span>
+  &lt;li  <span 
class="removed"><del><strong>id="intel-me-10-year-vulnerability"&gt;
+  &lt;p&gt;Intel's CPU backdoor&mdash;the Intel Management 
Engine&mdash;had</strong></del></span> <span 
class="inserted"><ins><em>id="M201704050"&gt;
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-    can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+    can be hijacked through their Wi-Fi chips&lt;/a&gt; because 
of</em></ins></span> a <span class="inserted"><ins><em>bug in
     Broadcom's non-free firmware.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703270"&gt;</em></ins></span>
+  &lt;li id="M201703270"&gt;
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;For example, a cracker can gain access to the dishwasher's
-    filesystem, infect it with malware, and force the dishwasher to launch
-    attacks on other devices in the network. Since these dishwashers are
+    Stings hospital disinfectant dishwasher is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to the Internet, its</em></ins></span> security
+       <span class="removed"><del><strong>vulnerability for 10 
years&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The vulnerability allowed</strong></del></span> <span 
class="inserted"><ins><em>is crap&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;For example,</em></ins></span> a cracker <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>can gain</em></ins></span> access <span 
class="inserted"><ins><em>to</em></ins></span> the <span 
class="removed"><del><strong>computer's Intel Active
+      Management Technology
+      (AMT) &lt;a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
+      web interface</strong></del></span> <span 
class="inserted"><ins><em>dishwasher's
+    filesystem, infect it</em></ins></span> with <span 
class="removed"><del><strong>an empty password</strong></del></span> <span 
class="inserted"><ins><em>malware,</em></ins></span> and <span 
class="removed"><del><strong>gave administrative
+      access&lt;/a&gt; to access</strong></del></span> <span 
class="inserted"><ins><em>force</em></ins></span> the <span 
class="removed"><del><strong>computer's keyboard, mouse, monitor
+      among other privileges.&lt;/p&gt;
+
+       &lt;p&gt;It does not help that in newer Intel processors, it is 
impossible
+       to turn off the Intel Management Engine. Thus, even users who are 
+       proactive about their security can do nothing to protect themselves 
+       besides using machines that don't come with the backdoor.&lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is 
&lt;a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;For example, a cracker can gain access to the dishwasher's 
filesystem, 
+infect it with malware, and force the dishwasher to launch attacks 
on</strong></del></span> <span class="inserted"><ins><em>dishwasher to launch
+    attacks on</em></ins></span> other devices in the network. Since these 
dishwashers are
     used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;WhatsApp 
has</strong></del></span>
+<span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;WhatsApp</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201702200"&gt;
-    &lt;p&gt;If you buy</em></ins></span> a <span 
class="removed"><del><strong>feature that 
-    &lt;a 
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
-      has been described as</strong></del></span> <span 
class="inserted"><ins><em>used &ldquo;smart&rdquo;
+    &lt;p&gt;If you buy a used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually &lt;a
     
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
     previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
@@ -320,9 +343,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201701130"&gt;
-    &lt;p&gt;WhatsApp has a feature that &lt;a
+    &lt;p&gt;WhatsApp</em></ins></span> has a feature that &lt;a
     
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
-    has been described as</em></ins></span> a &ldquo;back 
door&rdquo;&lt;/a&gt; because it would
+    has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
     enable governments to nullify its encryption.&lt;/p&gt;
 
     &lt;p&gt;The developers say that it wasn't intended as a back door, and 
that
@@ -345,8 +368,13 @@
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The mobile apps for
-communicating &lt;a 
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
+&lt;p&gt;The mobile apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201610230"&gt;
+    &lt;p&gt;4G LTE phone networks are drastically insecure. They can be &lt;a
+    
href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
+    taken over by third parties and used</em></ins></span> for
+<span class="removed"><del><strong>communicating &lt;a 
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
 a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;This is in addition to the fact that the car contains a cellular
@@ -369,19 +397,20 @@
 ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;4G LTE phone networks are drastically insecure. They can be
+&lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
+taken
+over by third parties and used for man-in-the-middle 
attacks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201610230"&gt;</em></ins></span>
-    &lt;p&gt;4G LTE phone networks are drastically insecure. They can be &lt;a 
<span 
class="removed"><del><strong>href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;</em></ins></span>
-    taken over by third parties and used for man-in-the-middle
+&lt;li&gt;
+&lt;p&gt;Due to weak security,</strong></del></span> <span 
class="inserted"><ins><em>man-in-the-middle
     attacks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201608110"&gt;</em></ins></span>
-    &lt;p&gt;Due to weak security, &lt;a
+  &lt;li id="M201608110"&gt;
+    &lt;p&gt;Due to weak security,</em></ins></span> &lt;a
     
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
     is easy to open the doors of 100 million cars built by
     Volkswagen&lt;/a&gt;.&lt;/p&gt;
@@ -468,12 +497,12 @@
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
-The Nissan Leaf has</strong></del></span>
+The</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201604120"&gt;
     &lt;p&gt;A bug in the iThings Messages app &lt;a
-    
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</em></ins></span>
-    a <span class="removed"><del><strong>built-in</strong></del></span> <span 
class="inserted"><ins><em>malicious web site to extract all the user's messaging
+    
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+    a malicious web site to extract all the user's messaging
     history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -504,7 +533,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in</em></ins></span>
+    &lt;p id="nissan-modem"&gt;The</em></ins></span> Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone <span 
class="inserted"><ins><em>to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;</em></ins></span>
     access its computers remotely and make changes in various
@@ -624,10 +653,10 @@
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
-Hospira infusion pumps, which are used</strong></del></span>
+Hospira</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;
-    &lt;p&gt;Due</em></ins></span> to <span 
class="removed"><del><strong>administer drugs</strong></del></span> <span 
class="inserted"><ins><em>bad security in a drug pump, crackers could use it to 
&lt;a
+    &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -643,8 +672,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201505050"&gt;
-    &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs</em></ins></span> to a patient, were rated &ldquo;&lt;a
+    &lt;p&gt;Hospira</em></ins></span> infusion pumps, which are used
+    to administer drugs to a patient, were rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
     secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security <span 
class="removed"><del><strong>researcher.
 &lt;/p&gt;
@@ -654,26 +683,28 @@
 
     &lt;p&gt;Depending</em></ins></span> on what drug is being infused, the 
insecurity could open
     the door to <span class="removed"><del><strong>murder.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Due to bad security in a drug pump, crackers could use it to
-&lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;</strong></del></span>
+&lt;p&gt;
+Due to bad security in a drug pump, crackers</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201504090"&gt;
-    &lt;p&gt;Mac OS X had an</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+    &lt;p&gt;Mac OS X had an &lt;a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+    intentional local back door for 4 years&lt;/a&gt;, which</em></ins></span> 
could <span class="removed"><del><strong>use it</strong></del></span> <span 
class="inserted"><ins><em>be exploited
+    by attackers</em></ins></span> to
+<span class="removed"><del><strong>&lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>gain root 
privileges.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
 The NSA can tap data in smart phones, including iPhones, Android, and
 BlackBerry&lt;/a&gt;.  While there is not much detail here, it seems that
-this does not operate via the universal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-    intentional local</em></ins></span> back door <span 
class="removed"><del><strong>that we know nearly
+this does not operate via the universal back door that we know nearly
 all portable phones have.  It may involve exploiting various bugs.
 There
 are &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
@@ -696,7 +727,7 @@
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
 The FTC punished a company for making webcams with bad security so
-that it was easy</strong></del></span> for <span 
class="removed"><del><strong>anyone to watch them&lt;/a&gt;.
+that it was easy for anyone to watch them&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -721,7 +752,7 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Lots of &lt;a 
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;hospital 
equipment has lousy security&lt;/a&gt;, and it can</strong></del></span> <span 
class="inserted"><ins><em>4 years&lt;/a&gt;, which could</em></ins></span> be 
<span class="removed"><del><strong>fatal.
+&lt;p&gt;Lots of &lt;a 
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;hospital 
equipment has lousy security&lt;/a&gt;, and it can be fatal.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -730,11 +761,10 @@
 Point-of-sale terminals running Windows were taken over and turned
 into a botnet for the purpose of collecting customers' credit card
 numbers&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>exploited
-    by attackers to gain root privileges.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;</em></ins></span>
     &lt;p&gt;An app to prevent &ldquo;identity theft&rdquo;
@@ -933,7 +963,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-insecurity.de.po        5 Jan 2019 11:31:34 -0000       1.125
+++ proprietary-insecurity.de.po        4 Mar 2019 09:00:10 -0000       1.126
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -139,6 +139,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary-insecurity.fr.po        5 Jan 2019 16:13:44 -0000       1.157
+++ proprietary-insecurity.fr.po        4 Mar 2019 09:00:10 -0000       1.158
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-01-05 17:13+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -110,6 +111,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-insecurity.it-diff.html 8 Feb 2019 09:30:04 -0000       1.37
+++ proprietary-insecurity.it-diff.html 4 Mar 2019 09:00:10 -0000       1.38
@@ -54,39 +54,51 @@
 &lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;.  
Keeping the
 users helpless is what's culpable about proprietary software.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li id="break-security-smarttv"&gt;
+  &lt;p&gt;&lt;a
+       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers found a way</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy.&lt;/p&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to be in this page but isn't
+&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>break security on</strong></del></span> <span 
class="inserted"><ins><em>be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
+to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TV&lt;/a&gt; and use its 
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
+to <span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
-  &lt;p&gt;&lt;a
-       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers</strong></del></span> <span 
class="inserted"><ins><em>id="M201809240"&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can</em></ins></span> watch <span 
class="inserted"><ins><em>all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change</em></ins></span> the <span 
class="inserted"><ins><em>design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
+    hide voice commands in other audio&lt;/a&gt;, so that</em></ins></span> 
people <span class="removed"><del><strong>who are watching 
TV.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Many models</strong></del></span>
 
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers</em></ins></span> found a way to break <span 
class="removed"><del><strong>security on a &ldquo;smart&rdquo; TV&lt;/a&gt; and 
use its camera
-      to watch</strong></del></span> the <span 
class="removed"><del><strong>people who are watching TV.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras</strong></del></span> 
<span class="inserted"><ins><em>an Amazon device,
+  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way to break the security</em></ins></span> of 
<span class="removed"><del><strong>Internet-connected 
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
     and</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
   have backdoors&lt;/a&gt;.&lt;/p&gt;
@@ -230,19 +242,14 @@
   <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
     &lt;p&gt;The proprietary code that runs pacemakers,
     insulin pumps, and other medical</em></ins></span> devices <span 
class="inserted"><ins><em>is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-       can be hijacked through their Wi-Fi chips&lt;/a&gt; 
because</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full</em></ins></span> of <span class="removed"><del><strong>a bug in
-       Broadcom's non-free firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>gross
-    security faults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+       can be</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross
+    security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;When Miele's Internet</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705160"&gt;
+  &lt;li id="M201705160"&gt;
     &lt;p&gt;Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28 models</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>HP laptops logged the user's keystroke
+    pre-installed on 28 models of HP laptops logged the user's keystroke
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, &lt;a
     
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
@@ -261,14 +268,16 @@
   &lt;li id="M201704050"&gt;
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-    can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+    can be</em></ins></span> hijacked through their Wi-Fi chips&lt;/a&gt; 
because of a bug in
     Broadcom's non-free firmware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201703270"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201703270"&gt;</em></ins></span>
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    Stings hospital disinfectant dishwasher is &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
     connected</em></ins></span> to the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
@@ -723,11 +732,13 @@
 &lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;An app to prevent &ldquo;identity theft&rdquo; (access to personal 
data)
+by storing users'</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;
     &lt;p&gt;An app to prevent &ldquo;identity theft&rdquo;
-    (access to personal data) by storing users' data on a special server &lt;a
+    (access to personal data) by storing users'</em></ins></span> data on a 
special server &lt;a
     
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
     deactivated by its developer&lt;/a&gt; which had discovered a security 
<span class="removed"><del><strong>flaw.
 &lt;/p&gt;
@@ -923,7 +934,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-insecurity.it.po        8 Feb 2019 08:59:36 -0000       1.142
+++ proprietary-insecurity.it.po        4 Mar 2019 09:00:10 -0000       1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-insecurity.ja-diff.html 4 Feb 2019 07:31:23 -0000       1.54
+++ proprietary-insecurity.ja-diff.html 4 Mar 2019 09:00:10 -0000       1.55
@@ -80,59 +80,78 @@
 
 &lt;li&gt;
 &lt;p&gt;Ransomware &lt;a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
-been developed for</strong></del></span> a <span 
class="removed"><del><strong>thermostat that uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
+been developed for</strong></del></span> a <span 
class="removed"><del><strong>thermostat</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands</em></ins></span> in
-<span class="removed"><del><strong>Internet Explorer</strong></del></span> 
<span class="inserted"><ins><em>other audio&lt;/a&gt;, so that people cannot 
hear
-    them, but Alexa</em></ins></span> and <span 
class="removed"><del><strong>Edge&lt;/a&gt; allows an 
attacker</strong></del></span> <span class="inserted"><ins><em>Siri 
can.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns 
out</em></ins></span>
+    that <span class="removed"><del><strong>uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>user is tricked</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it</em></ins></span> into <span 
class="removed"><del><strong>visiting</strong></del></span> a
-<span class="removed"><del><strong>malicious link.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;A</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
+Internet Explorer</strong></del></span> <span 
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch,</em></ins></span> and <span 
class="removed"><del><strong>Edge&lt;/a&gt; allows an attacker to retrieve
+Microsoft account credentials, if the user</strong></del></span> <span 
class="inserted"><ins><em>fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>tricked into visiting a
+malicious link.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-WhatsApp messages</strong></del></span> <span 
class="inserted"><ins><em>listening device&lt;/a&gt; for them.&lt;/p&gt;
+WhatsApp messages are</strong></del></span> <span 
class="inserted"><ins><em>presumably
+    unintentional and I suppose Amazon will fix it. I
+    do</em></ins></span> not <span class="removed"><del><strong>entirely 
deleted&lt;/a&gt;. They can be recovered
+in various ways.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>expect 
Amazon</em></ins></span> to <span class="inserted"><ins><em>change the design 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+  malacious code from any application which uses this API</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon</em></ins></span> to <span class="removed"><del><strong>render a
+  certain kind of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
+    &lt;p&gt;Researchers have discovered how to &lt;a
+    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+    hide voice commands</em></ins></span> in <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>other audio&lt;/a&gt;, so that people cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
     told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not entirely deleted&lt;/a&gt;. 
They</strong></del></span> <span class="inserted"><ins><em>probably hackers 
too, but please &lt;a
+    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
     &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</em></ins></span> can be <span 
class="removed"><del><strong>recovered</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked by programs that play commands</em></ins></span> in <span 
class="removed"><del><strong>various ways.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>ultrasound 
that humans
-    can't hear&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    hijacked by programs that play commands in ultrasound that humans
+    can't hear&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;A vulnerability in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201807020"&gt;
+  &lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
     photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
@@ -349,16 +368,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201607220"&gt;
-    &lt;p&gt;A vulnerability in</em></ins></span> Apple's Image I/O API 
allowed an attacker to &lt;a
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  <span class="removed"><del><strong>malacious</strong></del></span>
-    <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
+    malicious code from any application which uses this API to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;</em></ins></span>
-    &lt;p&gt;A bug in a proprietary ASN.1 library, used
+  &lt;li id="M201607190"&gt;
+    &lt;p&gt;A bug in a</em></ins></span> proprietary ASN.1 library, used
     in cell phone towers as well as cell phones and routers, &lt;a
     
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
@@ -867,7 +884,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary-insecurity.ja.po        5 Jan 2019 11:31:34 -0000       1.112
+++ proprietary-insecurity.ja.po        4 Mar 2019 09:00:10 -0000       1.113
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -102,6 +102,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-insecurity.pot  5 Jan 2019 11:31:34 -0000       1.81
+++ proprietary-insecurity.pot  4 Mar 2019 09:00:10 -0000       1.82
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Researchers have discovered how to <a "
 
"href=\"http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\";>
 "
 "hide voice commands in other audio</a>, so that people cannot hear them, but "

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary-insecurity.ru.po        25 Feb 2019 09:37:05 -0000      1.208
+++ proprietary-insecurity.ru.po        4 Mar 2019 09:00:10 -0000       1.209
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-12-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
 "voice commands in other audio</a>, so that people cannot hear them, but "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.de-diff.html    4 Mar 2019 08:00:38 -0000       1.55
+++ proprietary.de-diff.html    4 Mar 2019 09:00:10 -0000       1.56
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -102,17 +102,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -125,9 +125,9 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
@@ -247,30 +260,6 @@
     &lt;p&gt;However, modification of the client program could cover up some
     addictive behaviors without losing the user anything.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -331,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.de.po   4 Mar 2019 08:00:38 -0000       1.97
+++ proprietary.de.po   4 Mar 2019 09:00:10 -0000       1.98
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -505,35 +521,6 @@
 "behaviors without losing the user anything."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.es.po   4 Mar 2019 08:00:38 -0000       1.110
+++ proprietary.es.po   4 Mar 2019 09:00:10 -0000       1.111
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-02-25 11:08+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -387,54 +403,6 @@
 "No obstante, la modificación del programa cliente podría impedir algunos "
 "comportamientos adictivos sin que eso supusiera pérdidas para el usuario."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"Los televisores Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/";
-"airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-"
-"ces-2019\">registran «todo lo que se ve en el aparato»</a>, en palabras de "
-"la compañía CTO, y estos se venden a terceros. Esto se hace a cambio de un "
-"«mejor servicio» (¿más anuncios intrusivos, quizás?) y ligeras rebajas 
de "
-"precios."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"Lo que se supone que hace este espionaje aceptable, según ellos, es que es "
-"una opción en los nuevos modelos. Pero dado que el software de Vizio no es "
-"libre, no sabemos qué sucede exactamente por detrás, y no hay garantía de "
-"que en las actualizaciones futuras no modifiquen la configuración del "
-"usuario."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"Si ya posee una <cite>smart»</cite> TV Vizio (o cualquier <cite>smart»</"
-"cite> TV, por cierto), la manera más sencilla de asegurarse de que no le "
-"están espiando consiste en desconectarla de Internet y utilizar una antena "
-"terrestre en su lugar. Otra opción, si tiene algunos conocimientos 
técnicos, "
-"es utilizar un enrutador propio (que podría ser un viejo ordenador que "
-"utilizara únicamente software libre) y activar un cortafuegos que bloqueara "
-"las conexiones a los servidores de Vizio. O, como último recurso, sustituir "
-"su televisor por otro modelo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -514,6 +482,53 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "&ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for &ldquo;"
+#~ "better service&rdquo; (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "Los televisores Vizio <a href=\"https://www.theverge.";
+#~ "com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-"
+#~ "vergecast-ces-2019\">registran «todo lo que se ve en el aparato»</a>, en 
"
+#~ "palabras de la compañía CTO, y estos se venden a terceros. Esto se hace 
a "
+#~ "cambio de un «mejor servicio» (¿más anuncios intrusivos, quizás?) y "
+#~ "ligeras rebajas de precios."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "Lo que se supone que hace este espionaje aceptable, según ellos, es que "
+#~ "es una opción en los nuevos modelos. Pero dado que el software de Vizio "
+#~ "no es libre, no sabemos qué sucede exactamente por detrás, y no hay "
+#~ "garantía de que en las actualizaciones futuras no modifiquen la "
+#~ "configuración del usuario."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "Si ya posee una <cite>smart»</cite> TV Vizio (o cualquier <cite>smart»</"
+#~ "cite> TV, por cierto), la manera más sencilla de asegurarse de que no le "
+#~ "están espiando consiste en desconectarla de Internet y utilizar una "
+#~ "antena terrestre en su lugar. Otra opción, si tiene algunos conocimientos 
"
+#~ "técnicos, es utilizar un enrutador propio (que podría ser un viejo "
+#~ "ordenador que utilizara únicamente software libre) y activar un "
+#~ "cortafuegos que bloqueara las conexiones a los servidores de Vizio. O, "
+#~ "como último recurso, sustituir su televisor por otro modelo."
+
+#~ msgid ""
 #~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
 #~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
 #~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.fr.po   4 Mar 2019 08:00:38 -0000       1.135
+++ proprietary.fr.po   4 Mar 2019 09:00:10 -0000       1.136
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-02-28 23:15+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -295,6 +295,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -399,54 +415,6 @@
 "Cependant, la modification du programme client pourrait masquer certains "
 "comportements addictifs sans rien faire perdre à l'utilisateur."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"Les téléviseurs Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/";
-"airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-"
-"ces-2019\">collectent « tout ce que voit le téléviseur »</a> – ce 
sont les "
-"termes employés par le directeur technique de cette société – et ces 
données "
-"sont vendues à des tiers. La contrepartie est un « meilleur service » 
(c'est-"
-"à-dire plus de pubs intrusives ?) et un prix de vente légèrement plus 
bas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"Ce qui est censé rendre cet espionnage acceptable, selon lui, c'est qu'il "
-"est désactivé par défaut dans les modèles récents. Mais puisque le 
logiciel "
-"de ces téléviseurs est non libre, nous ne savons pas ce qui se passe "
-"vraiment en coulisses et il n'y a aucune garantie que les mises à jour à "
-"venir ne changeront jamais la configuration."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"Si vous possédez déjà un téléviseur Vizio intelligent (ou n'importe quel 
"
-"autre téléviseur intelligent, d'ailleurs), le moyen le plus simple d'être "
-"sûr qu'il ne vous espionne pas est de le déconnecter d'Internet et "
-"d'utiliser une antenne hertzienne. Malheureusement, ce n'est pas toujours "
-"possible. Une autre option, si la technique ne vous rebute pas, est "
-"d'installer votre propre routeur avec un pare-feu qui bloque les connexions "
-"aux serveurs de Vizio. Et en dernier ressort, vous pouvez toujours remplacer "
-"votre téléviseur par un autre modèle. "
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -522,6 +490,54 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "&ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for &ldquo;"
+#~ "better service&rdquo; (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "Les téléviseurs Vizio <a href=\"https://www.theverge.";
+#~ "com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-"
+#~ "vergecast-ces-2019\">collectent « tout ce que voit le téléviseur 
»</a> – "
+#~ "ce sont les termes employés par le directeur technique de cette société 
– "
+#~ "et ces données sont vendues à des tiers. La contrepartie est un "
+#~ "« meilleur service » (c'est-à-dire plus de pubs intrusives ?) et un 
prix "
+#~ "de vente légèrement plus bas."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "Ce qui est censé rendre cet espionnage acceptable, selon lui, c'est qu'il 
"
+#~ "est désactivé par défaut dans les modèles récents. Mais puisque le "
+#~ "logiciel de ces téléviseurs est non libre, nous ne savons pas ce qui se "
+#~ "passe vraiment en coulisses et il n'y a aucune garantie que les mises à "
+#~ "jour à venir ne changeront jamais la configuration."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "Si vous possédez déjà un téléviseur Vizio intelligent (ou n'importe 
quel "
+#~ "autre téléviseur intelligent, d'ailleurs), le moyen le plus simple 
d'être "
+#~ "sûr qu'il ne vous espionne pas est de le déconnecter d'Internet et "
+#~ "d'utiliser une antenne hertzienne. Malheureusement, ce n'est pas toujours "
+#~ "possible. Une autre option, si la technique ne vous rebute pas, est "
+#~ "d'installer votre propre routeur avec un pare-feu qui bloque les "
+#~ "connexions aux serveurs de Vizio. Et en dernier ressort, vous pouvez "
+#~ "toujours remplacer votre téléviseur par un autre modèle. "
+
+#~ msgid ""
 #~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
 #~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
 #~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.it-diff.html    4 Mar 2019 08:00:38 -0000       1.67
+++ proprietary.it-diff.html    4 Mar 2019 09:00:10 -0000       1.68
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
@@ -246,30 +259,6 @@
     &lt;p&gt;However, modification of the client program could cover up some
     addictive behaviors without losing the user anything.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -330,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.it.po   4 Mar 2019 08:00:38 -0000       1.106
+++ proprietary.it.po   4 Mar 2019 09:00:10 -0000       1.107
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -509,35 +525,6 @@
 "behaviors without losing the user anything."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary.ja-diff.html    4 Mar 2019 08:00:38 -0000       1.68
+++ proprietary.ja-diff.html    4 Mar 2019 09:00:10 -0000       1.69
@@ -181,6 +181,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
@@ -243,30 +256,6 @@
     &lt;p&gt;However, modification of the client program could cover up some
     addictive behaviors without losing the user anything.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -327,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.ja.po   4 Mar 2019 08:00:38 -0000       1.89
+++ proprietary.ja.po   4 Mar 2019 09:00:10 -0000       1.90
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -429,35 +445,6 @@
 "behaviors without losing the user anything."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.nl-diff.html    4 Mar 2019 08:00:38 -0000       1.67
+++ proprietary.nl-diff.html    4 Mar 2019 09:00:10 -0000       1.68
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
@@ -246,30 +259,6 @@
     &lt;p&gt;However, modification of the client program could cover up some
     addictive behaviors without losing the user anything.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -330,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.nl.po   4 Mar 2019 08:00:38 -0000       1.78
+++ proprietary.nl.po   4 Mar 2019 09:00:10 -0000       1.79
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -502,35 +518,6 @@
 "behaviors without losing the user anything."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.pl-diff.html    4 Mar 2019 08:00:38 -0000       1.85
+++ proprietary.pl-diff.html    4 Mar 2019 09:00:10 -0000       1.86
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
+instances of malicious functionalities (with more than 400 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -127,17 +127,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
@@ -244,30 +257,6 @@
     &lt;p&gt;However, modification of the client program could cover up some
     addictive behaviors without losing the user anything.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -328,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary.pl.po   4 Mar 2019 08:00:38 -0000       1.73
+++ proprietary.pl.po   4 Mar 2019 09:00:10 -0000       1.74
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -584,35 +600,6 @@
 "behaviors without losing the user anything."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary.pot     4 Mar 2019 08:00:38 -0000       1.70
+++ proprietary.pot     4 Mar 2019 09:00:10 -0000       1.71
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a "
 "href=\"https://www.appcensus.mobi\";> how Android apps use and misuse users' "
 "personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
@@ -320,35 +336,6 @@
 "behaviors without losing the user anything."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a "
-"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\";>
 "
-"collect &ldquo;whatever the TV sees,&rdquo;</a> in the own words of the "
-"company's CTO, and this data is sold to third parties. This is in return for "
-"&ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly "
-"lower retail prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's "
-"servers. Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary.pt-br.po        4 Mar 2019 08:00:38 -0000       1.99
+++ proprietary.pt-br.po        4 Mar 2019 09:00:10 -0000       1.100
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-02-24 15:49-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -380,52 +396,6 @@
 "No entanto, a modificação do programa cliente pode encobrir alguns "
 "comportamentos aditivos sem perder nada do usuário."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"TVs Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> colecionam “o "
-"que quer que a TV veja”</a>, nas próprias palavras do CTO da empresa, e "
-"esses dados são vendidos a terceiros. Isso é em troca de um “serviço "
-"melhor” (significando anúncios mais intrusivos?) e preços de varejo "
-"ligeiramente inferiores."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"O que supostamente torna essa espionagem aceitável, segundo ele, é que ela "
-"está optando por modelos mais novos. Mas como o software da Vizio é não "
-"livre, não sabemos o que está acontecendo nos bastidores, e não há 
garantia "
-"de que todas as atualizações futuras deixarão as configurações 
inalteradas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"Se você já possui uma smart TV da Vizio (ou qualquer smart TV, a 
propósito), "
-"a maneira mais fácil de garantir que não está espionando você é 
desconectá-"
-"la da Internet e usar uma antena terrestre. Infelizmente, isso nem sempre é "
-"possível. Outra opção, se você for orientado tecnicamente, é ter seu 
próprio "
-"roteador (que pode ser um computador antigo rodando software completamente "
-"livre), e configurar um firewall para bloquear conexões com os servidores da 
"
-"Vizio. Ou, como último recurso, você pode substituir sua TV por outro 
modelo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -501,6 +471,53 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "&ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for &ldquo;"
+#~ "better service&rdquo; (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "TVs Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> colecionam "
+#~ "“o que quer que a TV veja”</a>, nas próprias palavras do CTO da 
empresa, "
+#~ "e esses dados são vendidos a terceiros. Isso é em troca de um 
“serviço "
+#~ "melhor” (significando anúncios mais intrusivos?) e preços de varejo "
+#~ "ligeiramente inferiores."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "O que supostamente torna essa espionagem aceitável, segundo ele, é que "
+#~ "ela está optando por modelos mais novos. Mas como o software da Vizio é "
+#~ "não livre, não sabemos o que está acontecendo nos bastidores, e não 
há "
+#~ "garantia de que todas as atualizações futuras deixarão as 
configurações "
+#~ "inalteradas."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "Se você já possui uma smart TV da Vizio (ou qualquer smart TV, a "
+#~ "propósito), a maneira mais fácil de garantir que não está espionando 
você "
+#~ "é desconectá-la da Internet e usar uma antena terrestre. Infelizmente, "
+#~ "isso nem sempre é possível. Outra opção, se você for orientado "
+#~ "tecnicamente, é ter seu próprio roteador (que pode ser um computador "
+#~ "antigo rodando software completamente livre), e configurar um firewall "
+#~ "para bloquear conexões com os servidores da Vizio. Ou, como último "
+#~ "recurso, você pode substituir sua TV por outro modelo."
+
+#~ msgid ""
 #~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
 #~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
 #~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.ru.po   4 Mar 2019 08:31:54 -0000       1.169
+++ proprietary.ru.po   4 Mar 2019 09:00:10 -0000       1.170
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -416,53 +433,6 @@
 "Однако изменение программы-клиента могло 
бы нейтрализовать некоторые приемы "
 "выработки зависимости так, что 
пользователи ничего бы не теряли."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"Телевизоры Vizio <a 
href=\"https://www.theverge.com/2019/1/7/18172397/";
-"airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> "
-"собирают &ldquo;все, что видит 
телевизор&rdquo;</a>, по словам руководителя "
-"компании, и эти данные продают на сторону. 
Это в обмен на &ldquo;лучшее "
-"обслуживание&rdquo; (что значит более 
навязчивую рекламу?) и слегка "
-"сниженные розничные цены."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"Почему он считает эту слежку примелемой? 
Потому что в более новых моделях "
-"она выключена, пока ее не включат 
пользователи. Но поскольку программы Vizio "
-"не свободны, мы не знаем, что на деле происх
одит за кулисами, и нет никаких "
-"гарантий, что в будущих обновлениях эти 
настройки не изменятся."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"Если у вас уже есть интеллектуальный 
телевизор Vizio (или вообще любой "
-"интеллектуальный телевизор), самый 
простой способ гарантировать, что он за "
-"вами не следит&nbsp;&mdash; отключить его от 
Интернета и пользоваться "
-"антенной. К сожалению, это не всегда 
возможно. Другая возможность, если вы "
-"разбираетесь в технике,&mdash; достать себе 
маршрутизатор (им может стать "
-"старый компьютер, работающий полностью 
под управлением свободных программ), "
-"и настройть брандмауэр, чтобы соединения 
с серверами Vizio блокировались. "
-"Или, в крайнем случае, можно заменить свой 
телевизор на другую модель."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -542,6 +512,53 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "&ldquo;whatever the TV sees,&rdquo;</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for &ldquo;"
+#~ "better service&rdquo; (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "Телевизоры Vizio <a 
href=\"https://www.theverge.com/2019/1/7/18172397/";
+#~ "airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> "
+#~ "собирают &ldquo;все, что видит 
телевизор&rdquo;</a>, по словам "
+#~ "руководителя компании, и эти данные 
продают на сторону. Это в обмен на "
+#~ "&ldquo;лучшее обслуживание&rdquo; (что значит 
более навязчивую рекламу?) "
+#~ "и слегка сниженные розничные цены."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "Почему он считает эту слежку примелемой? 
Потому что в более новых моделях "
+#~ "она выключена, пока ее не включат 
пользователи. Но поскольку программы "
+#~ "Vizio не свободны, мы не знаем, что на деле 
происходит за кулисами, и нет "
+#~ "никаких гарантий, что в будущих 
обновлениях эти настройки не изменятся."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "Если у вас уже есть интеллектуальный 
телевизор Vizio (или вообще любой "
+#~ "интеллектуальный телевизор), самый 
простой способ гарантировать, что он "
+#~ "за вами не следит&nbsp;&mdash; отключить его 
от Интернета и пользоваться "
+#~ "антенной. К сожалению, это не всегда 
возможно. Другая возможность, если "
+#~ "вы разбираетесь в технике,&mdash; достать 
себе маршрутизатор (им может "
+#~ "стать старый компьютер, работающий 
полностью под управлением свободных "
+#~ "программ), и настройть брандмауэр, чтобы 
соединения с серверами Vizio "
+#~ "блокировались. Или, в крайнем случае, 
можно заменить свой телевизор на "
+#~ "другую модель."
+
+#~ msgid ""
 #~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
 #~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
 #~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.zh-tw-diff.html 4 Mar 2019 08:00:38 -0000       1.45
+++ proprietary.zh-tw-diff.html 4 Mar 2019 09:00:10 -0000       1.46
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -102,17 +102,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -125,9 +125,9 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The third party vulnerability is presumably
+    unintentional and I suppose Amazon will fix it. I
+    do not expect Amazon to change the design that &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
     href="https://www.appcensus.mobi"&gt; how Android apps use and
@@ -247,30 +260,6 @@
     &lt;p&gt;However, modification of the client program could cover up some
     addictive behaviors without losing the user anything.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs &lt;a
-    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own words of 
the company's
-    CTO, and this data is sold to third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
-
-    &lt;p&gt;What is supposed to make this spying acceptable, according to him,
-    is that it is opt-in in newer models. But since the Vizio software is
-    nonfree, we don't know what is actually happening behind the scenes,
-    and there is no guarantee that all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
-    to disconnect it from the Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is to get your own router (which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -331,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.zh-tw.po        4 Mar 2019 08:00:38 -0000       1.56
+++ proprietary.zh-tw.po        4 Mar 2019 09:00:10 -0000       1.57
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The AppCensus database gives information on <a href=\"https://www.appcensus.";
 "mobi\"> how Android apps use and misuse users' personal data</a>. As of "
 "March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -418,35 +434,6 @@
 "behaviors without losing the user anything."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
-"whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for &ldquo;better "
-"service&rdquo; (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- pt-br.po    4 Mar 2019 08:00:38 -0000       1.54
+++ pt-br.po    4 Mar 2019 09:00:10 -0000       1.55
@@ -360,6 +360,52 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Os dispositivos de “segurança” Amazon Ring <a 
href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
+"vídeo que eles capturam para os servidores da Amazon</a>, os quais 
armazenam-"
+"o permanentemente."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1266,36 +1312,6 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#| "the video they capture to Amazon servers</a> which save it permanently."
-msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Os dispositivos de “segurança” Amazon Ring <a 
href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
-"vídeo que eles capturam para os servidores da Amazon</a>, os quais 
armazenam-"
-"o permanentemente."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
 msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- ru.po       4 Mar 2019 08:24:01 -0000       1.90
+++ ru.po       4 Mar 2019 09:00:10 -0000       1.91
@@ -460,6 +460,54 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Устройства &ldquo;безопасности&rdquo; Amazon Ring <a 
href=\"https://www.";
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
+"отсылают видеозаписи, которые они 
собирают, на серверы Amazon</a>, где они "
+"сохраняются на длительное время."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Во многих случаях видеозаписи показывают 
всех, кто оказался вблизи или "
+"просто проходит мимо двери пользователя."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+"Основное внимание статья уделяет тому, 
как Ring позволял отдельным "
+"работникам свободно заглядывать в 
видеозаписи. Как оказалось, в Amazon "
+"пытались предотвратить эти вторичные 
злоупотребления, но первичное "
+"злоупотребление, состоящее в том, что Amazon 
получает видеозаписи,&mdash; "
+"Amazon считает, что в этом общество должно 
уступить."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1705,38 +1753,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Устройства &ldquo;безопасности&rdquo; Amazon Ring <a 
href=\"https://www.";
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
-"отсылают видеозаписи, которые они 
собирают, на серверы Amazon</a>, где они "
-"сохраняются на длительное время."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-"Во многих случаях видеозаписи показывают 
всех, кто оказался вблизи или "
-"просто проходит мимо двери пользователя."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-"Основное внимание статья уделяет тому, 
как Ring позволял отдельным "
-"работникам свободно заглядывать в 
видеозаписи. Как оказалось, в Amazon "
-"пытались предотвратить эти вторичные 
злоупотребления, но первичное "
-"злоупотребление, состоящее в том, что Amazon 
получает видеозаписи,&mdash; "
-"Amazon считает, что в этом общество должно 
уступить."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "
@@ -5755,15 +5771,15 @@
 "this ID to hardware identifiers</a>, so that users cannot escape tracking by "
 "resetting it."
 msgstr ""
-"База данных AppCensus содержит информацию о 
том, как <a href=\"https://www.appcensus.";
-"mobi\"> приложения Android используют 
персональные данные пользователей "
-"и злоупотребляют ими</a>. На март 2019&nbsp;года 
проанализировано около 78 тысяч "
-"приложений, из которых 24 тысячи (31%) "
-"<a 
href=\"/proprietary/proprietary-surveillance.html#M201812290\">передают 
рекламный идентификатор"
-"</a> в другие компании, а <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 тысяч (23% всех 
приложений) "
-"связывают этот идентификатор с 
идентификаторами аппаратуры</a>, так что 
сброс "
-"идентификатора не позволяет 
пользователям избежать слежки."
+"База данных AppCensus содержит информацию о 
том, как <a href=\"https://www.";
+"appcensus.mobi\"> приложения Android используют 
персональные данные "
+"пользователей и злоупотребляют ими</a>. На 
март 2019&nbsp;года "
+"проанализировано около 78 тысяч 
приложений, из которых 24 тысячи (31%) <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\">передают
 "
+"рекламный идентификатор</a> в другие 
компании, а <a href=\"https://blog.";
+"appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 тысяч (23% 
всех "
+"приложений) связывают этот идентификатор 
с идентификаторами аппаратуры</a>, "
+"так что сброс идентификатора не позволяет 
пользователям избежать слежки."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -5773,11 +5789,11 @@
 "development platform are ineffective at preventing nonfree software "
 "developers from including malware in their programs."
 msgstr ""
-"Сбор аппаратных идентификаторов явно 
нарушает правила Google. Но в Google "
-"об этом как будто не знали, а когда им 
сообщили, они не спешили с "
-"ответными действиями. Это доказывает, что 
правила платформы разработки "
-"фактически не препятствуют разработчикам 
несвободных программ закладывать "
-"вредоносные функции в их программы."
+"Сбор аппаратных идентификаторов явно 
нарушает правила Google. Но в Google об "
+"этом как будто не знали, а когда им 
сообщили, они не спешили с ответными "
+"действиями. Это доказывает, что правила 
платформы разработки фактически не "
+"препятствуют разработчикам несвободных 
программ закладывать вредоносные "
+"функции в их программы."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- zh-tw.po    4 Mar 2019 08:00:38 -0000       1.40
+++ zh-tw.po    4 Mar 2019 09:00:11 -0000       1.41
@@ -360,6 +360,43 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Amazon recently invited consumers to be suckers and <a href=\"https://www.";
 "techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
 "delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1263,27 +1300,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely.  It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse&mdash;that Amazon gets the video&mdash;Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-";
 "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect &ldquo;"
 "whatever the TV sees,&rdquo;</a> in the own words of the company's CTO, and "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]