www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www graphics/graphics.es.html graphics/philosop...


From: GNUN
Subject: www graphics/graphics.es.html graphics/philosop...
Date: Wed, 13 Mar 2019 07:01:02 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/03/13 07:01:00

Modified files:
        graphics       : graphics.es.html philosophicalgnu.es.html 
                         reiss-gnuhead.es.html usegnu.es.html 
        graphics/po    : graphics.es-en.html philosophicalgnu.es-en.html 
                         reiss-gnuhead.es-en.html usegnu.es-en.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.fr.po malware-cars.pot 
                         malware-cars.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/graphics.es.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/philosophicalgnu.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/reiss-gnuhead.es.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/usegnu.es.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/graphics.es-en.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/philosophicalgnu.es-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/reiss-gnuhead.es-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/usegnu.es-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.268&r2=1.269
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.390&r2=1.391
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.281&r2=1.282
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.254&r2=1.255
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.202&r2=1.203
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.487&r2=1.488
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.48&r2=1.49

Patches:
Index: graphics/graphics.es.html
===================================================================
RCS file: /web/www/www/graphics/graphics.es.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- graphics/graphics.es.html   15 Dec 2018 14:46:11 -0000      1.70
+++ graphics/graphics.es.html   13 Mar 2019 11:00:58 -0000      1.71
@@ -37,16 +37,11 @@
 tr {
     display: inline-block;
     width: 18.5em;
-    margin: .5em 0;
 }
 table td {
-    padding: 0;
+    padding: 0 .5em;
     border: none;
 }
-table img {
-    margin-right: 1em;
-}
-
 @media (min-width: 22em) {
     table {
         width: 20.5em;
@@ -255,7 +250,7 @@
 <tr><td><a href="/graphics/arantxa.html">
     <img src="/graphics/icons/arantxa-glitch.80.png"
          alt="&nbsp;[Glitch]&nbsp;" /></a></td>
-    <td>Julio de 2018: Diseños GNU<br />
+    <td>Julio de 2018: Diseños GNU luminosos<br />
     <small>de Arantxa Serantes</small></td></tr>
 <!--#endif
 -->
@@ -329,8 +324,8 @@
                && $TYPE  = /^$/" -->
 <tr><td><a href="/graphics/3dgnuhead.html">
     <img src="/graphics/icons/3dgnuhead.80.png"
-         alt="&nbsp;[3D GNU Head]&nbsp;" /></a></td>
-    <td>Cabeza GNU en 3D<br />
+         alt="&nbsp;[Retrato de GNU]&nbsp;" /></a></td>
+    <td>Retrato de GNU<br />
     <small>de Dale Mellor</small></td></tr>
 <!--#endif
 -->
@@ -338,13 +333,13 @@
                && $TYPE  = /^$/" -->
 <tr><td><a href="/graphics/agnubody.html">
     <img src="/graphics/icons/agnubody.80.png"
-         alt="&nbsp;[A GNU Body]&nbsp;" /></a></td>
+         alt="&nbsp;[Un GNU con cuerpo]&nbsp;" /></a></td>
     <td>Un cuerpo Gnu<br />
     <small>de Graham Wilson</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^$/" -->
+               && $TYPE  = /^(svg|ascii|logo|)$/" -->
 <tr><td><a href="/graphics/agnuhead.html">
     <img src="/graphics/icons/gnu-head.80.png"
          alt="&nbsp;[Image of the head of a GNU]&nbsp;" /></a></td>
@@ -354,11 +349,11 @@
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^(ascii|)$/" -->
+               && $TYPE  = /^(ascii|logo|)$/" -->
 <tr><td><a href="/graphics/agnuheadterm.html">
     <img src="/graphics/icons/agnuheadterm.80.png"
-         alt="&nbsp;[GNU Head]&nbsp;" /></a></td>
-    <td>Una cabeza GNU para terminales<br />
+         alt="&nbsp;[Cabeza de GNU para terminal]&nbsp;" /></a></td>
+    <td>Una cabeza GNU en terminales<br />
     <small>de Mattias Andrée</small></td></tr>
 <!--#endif
 -->
@@ -366,17 +361,17 @@
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/ahurdlogo.html">
     <img src="/graphics/icons/hurd-logo.80.png"
-         alt="&nbsp;[image of a Spherical Hurd Logo]&nbsp;" /></a></td>
-    <td>Logos de Hurd<br />
-    <small>de Teddy Hogeborn y Stephen McCamant, 
respectivamente</small></td></tr>
+         alt="&nbsp;[Logo de Hurd esférico]&nbsp;" /></a></td>
+    <td>Logo de Hurd esférico<br />
+    <small>de Teddy Hogeborn</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/anfsflogo.html">
-    <img src="/graphics/icons/fsf-logo.80.png"
-         alt="&nbsp;[image of an FSF Logo on black]&nbsp;" /></a></td>
-    <td>Un logo de la FSF<br />
+    <img src="/graphics/icons/fsf-bk.80.png"
+         alt="&nbsp;[Logo de la FSF en negro]&nbsp;" /></a></td>
+    <td>Logos de la FSF<br />
     <small>de Shawn Ewald</small></td></tr>
 <!--#endif
 -->
@@ -384,26 +379,26 @@
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/anlpflogo.html">
     <img src="/graphics/icons/liberty.80.png"
-         alt="&nbsp;[image of the Statue of Liberty Protecting Software 
Freedoms]&nbsp;" /></a></td>
+         alt="&nbsp;[Estatua de la libertad protegiendo las libertades del 
software]&nbsp;" /></a></td>
     <td>Un logo de LPF<br />
     <small>de Etienne Suvasa</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|)$/
-               && $TYPE  = /^(badge|)$/" -->
+               && $TYPE  = /^(svg|banner|logo|)$/" -->
 <tr><td><a href="/graphics/atypinggnu.html">
     <img src="/graphics/icons/gnu-type.80.png"
-         alt="&nbsp;[image of a Typing GNU Hacker]&nbsp;" /></a></td>
-    <td>Un hacker Gnu tecleando<br />
+         alt="&nbsp;[Hacker GNU tecleando]&nbsp;" /></a></td>
+    <td>Un hacker GNU tecleando<br />
     <small>de Jamal Hannah</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|)$/
-               && $TYPE  = /^(badge|)$/" -->
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/anothertypinggnu.html">
     <img src="/graphics/icons/another-gnu-type.80.png"
-         alt="&nbsp;[image of Another GNU Hacker]&nbsp;" /></a></td>
-    <td>Otro hacker Gnu tecleando<br />
+         alt="&nbsp;[Otro hacker GNU tecleando]&nbsp;" /></a></td>
+    <td>Otro hacker GNU tecleando<br />
     <small>de Peter McLachlan</small></td></tr>
 <!--#endif
 -->
@@ -412,16 +407,16 @@
 <tr><td><a href="/graphics/arantxa.html">
     <img src="/graphics/icons/arantxa-glitch.80.png"
          alt="&nbsp;[Glitch]&nbsp;" /></a></td>
-    <td>Diseños GNU<br />
+    <td>Diseños GNU luminosos<br />
     <small>de Arantxa Serantes</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|)$/
-               && $TYPE  = /^$/" -->
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/babygnu.html">
     <img src="/graphics/icons/baby-gnu.80.png"
-         alt="&nbsp;[image of a Baby GNU]&nbsp;" /></a></td>
-    <td>Bebé Gnu<br />
+         alt="&nbsp;[Bebé GNU chupándose el pulgar]&nbsp;" /></a></td>
+    <td>Bebé GNU<br />
     <small>de Etienne Suvasa</small></td></tr>
 <!--#endif
 -->
@@ -438,7 +433,7 @@
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/bokma-gnu.html">
     <img src="/graphics/icons/bokma-gnu.80.png"
-         alt="&nbsp;[image of a GNU]&nbsp;" /></a></td>
+         alt="&nbsp;[GNU logo]&nbsp;" /></a></td>
     <td>Logos de GNU y Emacs<br />
     <small>de John Bokma</small></td></tr>
 <!--#endif
@@ -447,7 +442,7 @@
                && $TYPE  = /^(svg|)$/" -->
 <tr><td><a href="/graphics/bold-initiative-GNU-head.html">
     <img src="/graphics/icons/bold-initiative-GNU-head.80.png"
-         alt="&nbsp;[Bold Initiative GNU Head]&nbsp;" /></a></td>
+         alt="&nbsp;[Cabeza de GNU guiñando un ojo]&nbsp;" /></a></td>
     <td>GNU guiñando<br />
     <small>de Bravo Edison</small></td></tr>
 <!--#endif
@@ -457,16 +452,17 @@
 <tr><td><a href="/graphics/BVBN.html">
     <img src="/graphics/icons/bvbn-logo-small.80.png"
          alt="&nbsp;[GNU Head logo]&nbsp;" /></a></td>
-    <td>Dibujos GNU útiles<br />
+    <td>Teclas GNU/Linux<br />
     <small>de Vladimir Tsarkov</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|tux|)$/
                && $TYPE  = /^(poster|)$/" -->
 <tr><td><a href="/graphics/bwcartoon.html">
-    <img src="/graphics/icons/bwcartoon.80.png"
-         alt="&nbsp;[B &amp; W Cartoon]&nbsp;" /></a></td>
-    <td>El dúo dinámico: El Gnu y el pinguino volando</td></tr>
+    <img src="/graphics/icons/gnu-and-penguin-color.80.png"
+         alt="&nbsp;[El Gnu y el pinguino volando]&nbsp;" /></a></td>
+    <td>El dúo dinámico: El Gnu y el pinguino volando<br />
+    <small>de un artista anónimo</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(license|)$/
@@ -482,8 +478,8 @@
                && $TYPE  = /^(banner|svg|)$/" -->
 <tr><td><a href="/graphics/digital-restrictions-management.html">
     <img src="/graphics/icons/ichain.80.png"
-         alt="&nbsp;[iChains]&nbsp;" /></a></td>
-    <td>Gestión Digital de Restricciones<br />
+         alt="&nbsp;[Las cadenas de la Gestión de Restricciones 
Digitales]&nbsp;" /></a></td>
+    <td>Arte GNU: Gestión de Restricciones Digitales<br />
     <small>de Chris Hayes</small></td></tr>
 <!--#endif
 -->
@@ -495,6 +491,15 @@
     <td>Logo de Dragora<br /></td></tr>
 <!--#endif
 -->
+<!--#if expr="$THEME = /^(gnu|)$/
+               && $TYPE  = /^(wallpaper|)$/" -->
+<tr><td><a href="/graphics/dittberner-gnu.html">
+    <img src="/graphics/icons/dittberner_gnu.80.png"
+         alt="&nbsp;[gnu a la carrera]&nbsp;" /></a></td>
+    <td>Gnu a la carrera<br />
+    <small>de Dorothea y Jan Dittberner</small></td></tr>
+<!--#endif
+-->
 <!--#if expr="$THEME = /^(surveillance|)$/
                && $TYPE  = /^(cartoon|)$/" -->
 <tr><td><a href="/graphics/dog.html">
@@ -509,7 +514,7 @@
 <tr><td><a href="/graphics/emacs-ref.html">
     <img src="/graphics/icons/emacs-ref.80.png"
          alt="&nbsp;[Reference card with GNU face]&nbsp;" /></a></td>
-    <td>Fondo de pantalla guía de GNU Emacs<br />
+    <td>Hoja de referencia de GNU Emacs<br />
     <small>de Loic Duros</small></td></tr>
 <!--#endif
 -->
@@ -517,7 +522,7 @@
                && $TYPE  = /^(poster|svg|wallpaper|)$/" -->
 <tr><td><a href="/graphics/flying-gnu.html">
     <img src="/graphics/icons/flying-gnu.80.png"
-         alt="&nbsp;[Flying GNU Design]&nbsp;" /></a></td>
+         alt="&nbsp;[Diseño de GNU volando]&nbsp;" /></a></td>
     <td>Gnu volante<br />
     <small>de Ernesto Bazzano</small></td></tr>
 <!--#endif
@@ -547,15 +552,15 @@
          alt="&nbsp;[Gnu and Tux as messengers of free software in the 
desolate land of
 proprietary software]&nbsp;" /></a></td>
     <td>Mensajeros del software libre<br />
-    <small>de Péhä</small></td></tr>
+    <small>de P&eacute;h&auml;</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/free-your-soul.html">
     <img src="/graphics/icons/free-your-soul-wallpaper.80.png"
-         alt="&nbsp;[ Free Your Soul Wallpaper ]&nbsp;" /></a></td>
-    <td>Libera tu alma<br />
+         alt="&nbsp;[Fondo de pantalla Libera tu alma]&nbsp;" /></a></td>
+    <td>Fondo de pantalla Libera tu alma<br />
     <small>de Sayem Chaklader</small></td></tr>
 <!--#endif
 -->
@@ -564,12 +569,12 @@
 <tr><td><a href="/graphics/french-motto.html">
     <img src="/graphics/icons/LEF.fr.80.png"
          alt="&nbsp;[liberty, equality, brotherhood button]&nbsp;" /></a></td>
-    <td>Lema francés<br />
-    <small>de Lutz Bürger</small></td></tr>
+    <td>Tecla con lema francés<br />
+    <small>de Lutz B&uuml;rger</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^$/" -->
+               && $TYPE  = /^(button|)$/" -->
 <tr><td><a href="/graphics/fromagnulinux.html">
     <img src="/graphics/icons/fromagnulinux.80.png"
          alt="&nbsp;[Fromagnulinux]&nbsp;" /></a></td>
@@ -581,7 +586,7 @@
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/fsf-logo.html">
     <img src="/graphics/icons/fsf-logo-notext.80.png"
-         alt="&nbsp;[The Official FSF Logo]&nbsp;" /></a></td>
+         alt="&nbsp;[El logo oficial de la FSF]&nbsp;" /></a></td>
     <td>Logo de la Free Software Foundation<br />
     <small>de Li Jiang</small></td></tr>
 <!--#endif
@@ -592,7 +597,8 @@
     <img src="/graphics/icons/FSFS-title2.80.png"
          alt="&nbsp;[The book cover logo for 'Free Software, Free 
Society']&nbsp;" /></a></td>
     <td>Logotipo de la portada del libro <i>Software libre para una sociedad
-libre</i></td></tr>
+libre</i><br />
+    <small>de Jonathan Richard</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
@@ -608,7 +614,7 @@
                && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/gleesons.html">
     <img src="/graphics/icons/gleeson_head.80.png"
-         alt="&nbsp;[colorful rounded image of the Head of a GNU]&nbsp;" 
/></a></td>
+         alt="&nbsp;[Colorful rounded image of the head of a GNU]&nbsp;" 
/></a></td>
     <td>Arte GNU<br />
     <small>de Brendon Gleeson</small></td></tr>
 <!--#endif
@@ -631,26 +637,28 @@
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^(wallpaper|)$/" -->
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/gnu-alternative.html">
     <img src="/graphics/icons/gnu-alternative.80.png"
-         alt="&nbsp;[image of the Head of a GNU]&nbsp;" /></a></td>
-    <td>Cabeza GNU alternativa</td></tr>
+         alt="&nbsp;[Stylized gnu mask]&nbsp;" /></a></td>
+    <td>GNU alternativo<br />
+    <small>de un artista anónimo</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(ascii|)$/" -->
 <tr><td><a href="/graphics/gnu-ascii.html">
     <img src="/graphics/icons/gnu-ascii.80.png"
-         alt="&nbsp;[ASCII Gnu]&nbsp;" /></a></td>
-    <td>Un GNU en ASCII</td></tr>
+         alt="&nbsp;[ASCII Gnu head]&nbsp;" /></a></td>
+    <td>GNU en ASCII<br />
+    <small>de Przemys&#322;aw Borys</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(ascii|button|icon|)$/" -->
 <tr><td><a href="/graphics/gnu-ascii2.html">
     <img src="/graphics/icons/gnu-ascii2.80.png"
-         alt="&nbsp;[ASCII Gnu]&nbsp;" /></a></td>
+         alt="&nbsp;[Small ASCII Gnu head]&nbsp;" /></a></td>
     <td>Otro GNU en ASCII (para firmas de email)<br />
     <small>de Martin Dickopp</small></td></tr>
 <!--#endif
@@ -660,7 +668,7 @@
 <tr><td><a href="/graphics/gnu-ascii-liberty.html">
     <img src="/graphics/icons/gnu-ascii-liberty.80.png"
          alt="&nbsp;[ASCII Gnu is liberty]&nbsp;" /></a></td>
-    <td>Un &ldquo;GNU is Liberty&rdquo; en ASCII<br />
+    <td>»GNU is Liberty» en ASCII<br />
     <small>de Carlos Contreras A.</small></td></tr>
 <!--#endif
 -->
@@ -668,7 +676,7 @@
                && $TYPE  = /^(badge|wallpaper|)$/" -->
 <tr><td><a href="/graphics/gnu-born-free-run-free.html">
     <img src="/graphics/icons/gnu-born-free-run-free.80.png"
-         alt="&nbsp;[A gnu running]&nbsp;" /></a></td>
+         alt="&nbsp;[GNU Born Free Runs Free]&nbsp;" /></a></td>
     <td>GNU Born Free Runs Free<br />
     <small>de Alicia Lapekas</small></td></tr>
 <!--#endif
@@ -678,7 +686,7 @@
 <tr><td><a href="/graphics/gnu-head-luk.html">
     <img src="/graphics/icons/gnu-head-luk.80.png"
          alt="&nbsp;[Luk's GNU head]&nbsp;" /></a></td>
-    <td>Cabeza GNU<br />
+    <td>Cabeza GNU estilizada<br />
     <small>de Luk</small></td></tr>
 <!--#endif
 -->
@@ -687,7 +695,7 @@
 <tr><td><a href="/graphics/gnu-head-shadow.html">
     <img src="/graphics/icons/gnu_headshadow.80.png"
          alt="&nbsp;[GNU banner saying: run free run gnu]&nbsp;" /></a></td>
-    <td>Una cabeza GNU en sombra<br />
+    <td>Cabeza GNU en sombra<br />
     <small>de Vladimir Zúñiga</small></td></tr>
 <!--#endif
 -->
@@ -722,7 +730,7 @@
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/gnu-slash-linux.html">
     <img src="/graphics/icons/gnu-linux-on-black.80.png"
-         alt="&nbsp;[GNU/Linux on black]&nbsp;" /></a></td>
+         alt="&nbsp;[Gnu and Tux on black]&nbsp;" /></a></td>
     <td>Ilustraciones GNU/Linux<br />
     <small>de Rui Damas</small></td></tr>
 <!--#endif
@@ -732,8 +740,8 @@
 <tr><td><a href="/graphics/gnubanner.html">
     <img src="/graphics/icons/gnubanner-2.80.png"
          alt="&nbsp;[Come and see what GNU creates for YOU]&nbsp;" /></a></td>
-    <td>Anuncios GNU<br />
-    <small>de Stefan Rieken, Lalo Martins y SpAwN, 
respectivamente</small></td></tr>
+    <td>Anuncios GNU y enlace<br />
+    <small>de Stefan Rieken, John M. Wooten y SpAwN, 
respectivamente</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnuhead|)$/
@@ -741,7 +749,7 @@
 <tr><td><a href="/graphics/gnuhornedlogo.html">
     <img src="/graphics/icons/gnu_hornedword.80.png"
          alt="&nbsp;[GNU Horned Word Logo]&nbsp;" /></a></td>
-    <td>Un logo de GNU con cuernos<br />
+    <td>Logo de GNU con cuernos<br />
     <small>de Vladimir Zúñiga</small></td></tr>
 <!--#endif
 -->
@@ -750,7 +758,7 @@
 <tr><td><a href="/graphics/gnulove.html">
     <img src="/graphics/icons/Gnulove.80.png"
          alt="&nbsp;[GNU Love]&nbsp;" /></a></td>
-    <td>Un pingüino abrazando a un Gnu<br />
+    <td>Amor GNU<br />
     <small>de Alison Upton</small></td></tr>
 <!--#endif
 -->
@@ -767,8 +775,8 @@
                && $TYPE  = /^(badge|logo|)$/" -->
 <tr><td><a href="/graphics/gnupascal.html">
     <img src="/graphics/icons/Gnu+Pascal.80.png"
-         alt="&nbsp;[image of a Gnu and Blaise Pascal]&nbsp;" /></a></td>
-    <td>Gnu y Blaise Pascal<br />
+         alt="&nbsp;[A Gnu and Blaise Pascal]&nbsp;" /></a></td>
+    <td>GNU y Blaise Pascal<br />
     <small>de Markus Gerwinski</small></td></tr>
 <!--#endif
 -->
@@ -785,8 +793,8 @@
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/groff-head.html">
     <img src="/graphics/icons/groff-head.80.png"
-         alt="&nbsp;[image of the Head of a GNU with a printing press]&nbsp;" 
/></a></td>
-    <td>Cabeza de Groff<br />
+         alt="&nbsp;[Head of a GNU with a printing press]&nbsp;" /></a></td>
+    <td>Cabeza de GNU con prensa de impresión<br />
     <small>de Imogen Mulley</small></td></tr>
 <!--#endif
 -->
@@ -795,7 +803,7 @@
 <tr><td><a href="/graphics/heckert_gnu.html">
     <img src="/graphics/icons/heckert_gnu.80.png"
          alt="&nbsp;[Bold image of the head of a GNU]&nbsp;" /></a></td>
-    <td>Cabeza GNU alternativa con contraste<br />
+    <td>Una cabeza GNU resaltada<br />
     <small>de Aurelio A. Heckert</small></td></tr>
 <!--#endif
 -->
@@ -803,7 +811,7 @@
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/hitflip-gnu.html">
     <img src="/graphics/icons/hitflip-gnu.80.png"
-         alt="&nbsp;[Hitflip 1 small]&nbsp;" /></a></td>
+         alt="&nbsp;[GNU coin]&nbsp;" /></a></td>
     <td>Moneda GNU y manada<br />
     <small>de the Hitflip Team</small></td></tr>
 <!--#endif
@@ -812,8 +820,8 @@
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/httptunnel-logo.html">
     <img src="/graphics/icons/httptunnel-w.80.png"
-         alt="&nbsp;[httptunnel logo]&nbsp;" /></a></td>
-    <td>Logo de HTTP-Tunnel<br />
+         alt="&nbsp;[HTTPTunnel logo]&nbsp;" /></a></td>
+    <td>Logo de HTTPTunnel<br />
     <small>de Harri Manni</small></td></tr>
 <!--#endif
 -->
@@ -821,7 +829,7 @@
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/hurd_mf.html">
     <img src="/graphics/icons/hurd_mf.80.png"
-         alt="&nbsp;[small image of a Hurd Metafont Logo]&nbsp;" /></a></td>
+         alt="&nbsp;[Hurd Metafont logo]&nbsp;" /></a></td>
     <td>Logos de Hurd en Metafont<br />
     <small>de Stephen McCamant</small></td></tr>
 <!--#endif
@@ -875,7 +883,7 @@
                && $TYPE  = /^(icon|)$/" -->
 <tr><td><a href="/graphics/gnu-and-tux-icon.html">
     <img src="/graphics/icons/gnu-and-tux-icon.80.png"
-         alt="&nbsp;[GNU and Tux]&nbsp;" /></a></td>
+         alt="&nbsp;[Gnu and Tux icon]&nbsp;" /></a></td>
     <td>Icono Gnu y Tux<br />
     <small>de Sventsitskaya Nadezda</small></td></tr>
 <!--#endif
@@ -885,7 +893,7 @@
 <tr><td><a href="/graphics/nandakumar-gnu.html">
     <img src="/graphics/icons/gnu-gives-freedom.80.png"
          alt="&nbsp;[GNU liberating a computer]&nbsp;" /></a></td>
-    <td>GNU da libertad<br />
+    <td>Póster GNU da libertad<br />
     <small>de Nandakumar</small></td></tr>
 <!--#endif
 -->
@@ -894,7 +902,7 @@
 <tr><td><a href="/graphics/navaneeth-gnu.html">
     <img src="/graphics/icons/give-me-freedom.80.png"
          alt="&nbsp;[A computer dreaming about GNU for freedom]&nbsp;" 
/></a></td>
-    <td>Dame libertad<br />
+    <td>Póster Dame libertad<br />
     <small>de Navaneeth</small></td></tr>
 <!--#endif
 -->
@@ -922,7 +930,7 @@
     <img src="/graphics/icons/plant-onion.80.png"
          alt="&nbsp;[Gnu and Tux plant onions]&nbsp;" /></a></td>
     <td>¡Planta cebollas!<br />
-    <small>de Péhä</small></td></tr>
+    <small>de P&eacute;h&auml;</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|)$/
@@ -938,7 +946,7 @@
                && $TYPE  = /^$/" -->
 <tr><td><a href="/graphics/reiss-gnuhead.html">
     <img src="/graphics/icons/reiss-head.80.png"
-         alt="&nbsp;[Head of a GNU]&nbsp;" /></a></td>
+         alt="&nbsp;[Colored GNU head]&nbsp;" /></a></td>
     <td>Cabeza GNU a color<br />
     <small>de Joseph W. Reiss</small></td></tr>
 <!--#endif
@@ -948,7 +956,7 @@
 <tr><td><a href="/graphics/runfreegnu.html">
     <img src="/graphics/icons/runfreegnu.80.png"
          alt="&nbsp;['Run free run GNU' banner]&nbsp;" /></a></td>
-    <td><cite>Run free run GNU</cite><br />
+    <td>Anuncio <cite>Run free run GNU</cite><br />
     <small>de Vladimir Zúñiga</small></td></tr>
 <!--#endif
 -->
@@ -957,7 +965,7 @@
 <tr><td><a href="/graphics/santa-gnu.html">
     <img src="/graphics/icons/Santa_GNU.80.png"
          alt="&nbsp;[Santa Claus GNU]&nbsp;" /></a></td>
-    <td>Gnu Santa Claus<br />
+    <td>GNU Santa Claus<br />
     <small>de Luciano Lourenço</small></td></tr>
 <!--#endif
 -->
@@ -965,7 +973,7 @@
                && $TYPE  = /^(poster|)$/" -->
 <tr><td><a href="/graphics/scowcroft.html">
     <img src="/graphics/icons/gnu-beast.80.png"
-         alt="&nbsp;[GNU with stars]&nbsp;" /></a></td>
+         alt="&nbsp;[GNU beast poster]&nbsp;" /></a></td>
     <td>Caricaturas Gnu<br />
     <small>de Carol Anne Scowcroft</small></td></tr>
 <!--#endif
@@ -975,7 +983,7 @@
 <tr><td><a href="/graphics/skwetu-gnu-logo.html">
     <img src="/graphics/icons/skwetu-gnu-logo.80.png"
          alt="&nbsp;[Skwetu's GNU Logo]&nbsp;" /></a></td>
-    <td>Un logo GNU sechelt<br />
+    <td>Logo GNU sechelt<br />
     <small>de Skwetu</small></td></tr>
 <!--#endif
 -->
@@ -992,7 +1000,7 @@
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/slickgnu.html">
     <img src="/graphics/icons/slickgnu.80.png"
-         alt="&nbsp;[The Spirit of Freedom]&nbsp;" /></a></td>
+         alt="&nbsp;[A slick GNU logo]&nbsp;" /></a></td>
     <td>Un logo de GNU estilizado<br />
     <small>de Brian Bush</small></td></tr>
 <!--#endif
@@ -1002,7 +1010,7 @@
 <tr><td><a href="/graphics/social.html">
     <img src="/graphics/icons/gnu-social-logo.80.png"
          alt="&nbsp;[GNU social Logo]&nbsp;" /></a></td>
-    <td>El logo de GNU Social<br />
+    <td>Logo de GNU Social<br />
     <small>de Jonas Laugs y Steven DuBois</small></td></tr>
 <!--#endif
 -->
@@ -1029,8 +1037,17 @@
 <tr><td><a href="/graphics/stark-gnuherd.html">
     <img src="/graphics/icons/gnu_herd_banner.80.png"
          alt="&nbsp;[GNU banner]&nbsp;" /></a></td>
-    <td>Anuncio manada<br />
-    <small>de Jochen Stärk</small></td></tr>
+    <td>Anuncio manada GNU<br />
+    <small>de Stephan Baumann, grupo de usuarios</small></td></tr>
+<!--#endif
+-->
+<!--#if expr="$THEME = /^(gnuhead|)$/
+               && $TYPE  = /^(logo|svg|)$/" -->
+<tr><td><a href="/graphics/sven-gnuhead.html">
+    <img src="/graphics/icons/nu-gnu.80.png"
+         alt="&nbsp;[Simplified GNU Head]&nbsp;" /></a></td>
+    <td>Cabeza GNU simplificada<br />
+    <small>de Sven H.</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|)$/
@@ -1038,7 +1055,7 @@
 <tr><td><a href="/graphics/supergnu-ascii.html">
     <img src="/graphics/icons/supergnu-ascii.80.png"
          alt="&nbsp;[ASCII Super Gnu]&nbsp;" /></a></td>
-    <td>un súper GNU en ASCII<br />
+    <td>Súper GNU en ASCII<br />
     <small>de Vijay Kumar</small></td></tr>
 <!--#endif
 -->
@@ -1047,7 +1064,7 @@
 <tr><td><a href="/graphics/alternative-ascii.html">
     <img src="/graphics/icons/alternative-ascii.80.png"
          alt="&nbsp;[ASCII GNU head]&nbsp;" /></a></td>
-    <td>Otro GNU en ASCII<br />
+    <td>Un GNU en ASCII alternativo<br />
     <small>de Vijay Kumar</small></td></tr>
 <!--#endif
 -->
@@ -1055,8 +1072,8 @@
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/this-is-freedom-wallpaper.html">
     <img src="/graphics/icons/this-is-freedom-wallpaper.80.png"
-         alt="&nbsp;['this is freedom' wallpaper]&nbsp;" /></a></td>
-    <td>Esto es libertad<br />
+         alt="&nbsp;['This is freedom' wallpaper]&nbsp;" /></a></td>
+    <td>Fondo de pantalla Esto es libertad<br />
     <small>de Vadim Gush</small></td></tr>
 <!--#endif
 -->
@@ -1127,7 +1144,8 @@
 <tr><td><a href="/graphics/fsfsociety/fsfsociety.html">
     <img src="/graphics/icons/party.80.png"
          alt="&nbsp;[GNU party]&nbsp;" /></a></td>
-    <td>Graphics from <i>Free Software, Free Society</i></td></tr>
+    <td>Fiesta GNU<br />
+    <small>de Etienne Suvasa</small></td></tr>
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|tux|emacs|fs|)$/
@@ -1143,8 +1161,8 @@
                && $TYPE  = /^(button|cartoon|icon|svg|)$/" -->
 <tr><td><a href="/graphics/gnu-and-freedo/gnu-and-freedo.html">
     <img src="/graphics/icons/freedo-logo.80.png"
-         alt="&nbsp;[GNU + Freedo]&nbsp;" /></a></td>
-    <td>Caricaturas Gnu + Freedo<br />
+         alt="&nbsp;[Freedo]&nbsp;" /></a></td>
+    <td>GNU y Freedo<br />
     <small>de José Miguel Silva Lara y Márcio Alexandre Silva 
Delgado</small></td></tr>
 <!--#endif
 -->
@@ -1152,7 +1170,7 @@
                && $TYPE  = /^(poster|svg|)$/" -->
 <tr><td><a href="/graphics/umsa/umsa.html">
     <img src="/graphics/icons/gnu-tux.80.png"
-         alt="&nbsp;[Tux riding GNU]&nbsp;" /></a></td>
+         alt="&nbsp;[Tux riding a strong GNU]&nbsp;" /></a></td>
     <td>Diseños para el curso del UMSA «Núcleo GNU/Linux»<br />
     <small>de Ruth García</small></td></tr>
 <!--#endif
@@ -1172,14 +1190,6 @@
     <td>Avatares</td></tr>
 <!--#endif
 -->
-<!--#if expr="$THEME = /^(gnuhead|gnu|)$/
-               && $TYPE  = /^(svg|)$/" -->
-<tr><td><a href="/graphics/gnusvgart.html">
-    <img src="/graphics/icons/dittberner_gnu.80.png"
-         alt="&nbsp;[Running GNU]&nbsp;" /></a></td>
-    <td>Imágenes GNU en formato SVG</td></tr>
-<!--#endif
--->
 <!--#if expr="$THEME = /^(gnuhead|gnu|emacs|fs|)$/
                && $TYPE  = /^(banner|button|plastic|poster|)$/" -->
 <tr><td><a href="/graphics/historic-gnu-press.html">
@@ -1217,6 +1227,8 @@
 <h3 id="other-sites">Arte gráfico de GNU en otros sitios</h3>
 
 <table>
+
+<!-- RT #1297904 -->
 <tr style="display:none"><td></td></tr>
 <!-- Dummy entry for xhtml validation.
 -->
@@ -1228,10 +1240,12 @@
     <td><em>Pepper y Carrot</em> episodio 24</a>, una historieta diseñada con
 software libre<br />
     <small>de Librefan</small></td></tr>
+
 <!--#endif
 -->
 <!--#if expr="$THEME = /^(gnu|emacs|)$/
                && $TYPE  = /^(wallpaper|)$/" -->
+<!-- RT #1242119 -->
 <tr><td><a
 
href="https://goblinrefuge.com/mediagoblin/u/emacsomancer/m/my-god-it-s-full-of-car-s-png";>
     <img src="/graphics/icons/lisp-meditate.80.png"
@@ -1300,14 +1314,15 @@
 
href="https://web.archive.org/web/20110513011151/http://graphics.rootmode.com/";>
     <img src="/graphics/icons/button-powered-by-gnu.80.png"
          alt="&nbsp;['Powered by GNU' button]&nbsp;" /></a></td>
-    <td>Favicon y teclas (archivado)<br />
-    <small>de Edward Alfert</small></td></tr>
+    <td>Favicon y teclas <small>(archivado)<br />
+    de Edward Alfert</small></td></tr>
 <!--#endif
 -->
 </table>
 
 <p class="button"><a href="#select">Back to selection form</a></p>
 
+<!-- RT #902381 -->
 <p id="openclipart">También puede encontrar imágenes de dominio público 
relativas a GNU en <a
 href="https://openclipart.org/search/?query=GNU";>openclipart.org</a>.</p>
 
@@ -1370,7 +1385,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 1996-2007, 2010, 2012-2018 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 1996-2007, 2010, 2012-2019 Free Software Foundation, 
Inc.</p>
 
 <p>Esta página está bajo licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
@@ -1385,7 +1400,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/12/15 14:46:11 $
+$Date: 2019/03/13 11:00:58 $
 
 <!-- timestamp end -->
 </p>

Index: graphics/philosophicalgnu.es.html
===================================================================
RCS file: /web/www/www/graphics/philosophicalgnu.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- graphics/philosophicalgnu.es.html   14 Feb 2019 11:31:11 -0000      1.25
+++ graphics/philosophicalgnu.es.html   13 Mar 2019 11:00:58 -0000      1.26
@@ -59,8 +59,8 @@
 
https://web.archive.org/web/20090224214409/http://ngc224.gerwinski.de/~anja/gnuart/markus/index.html
 -->
 <p>Esta imagen está disponible bajo la <a rel="license"
-href="/licenses/gpl.html">Licencia Pública General de GNU</a>, versión 2 o
-posterior.</p>
+href="/licenses/old-licenses/gpl-2.0.html">Licencia Pública General de
+GNU</a>, versión 2 o posterior.</p>
 </div>
 </div>
 
@@ -123,7 +123,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/02/14 11:31:11 $
+$Date: 2019/03/13 11:00:58 $
 
 <!-- timestamp end -->
 </p>

Index: graphics/reiss-gnuhead.es.html
===================================================================
RCS file: /web/www/www/graphics/reiss-gnuhead.es.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- graphics/reiss-gnuhead.es.html      26 Feb 2019 11:30:01 -0000      1.25
+++ graphics/reiss-gnuhead.es.html      13 Mar 2019 11:00:58 -0000      1.26
@@ -43,8 +43,8 @@
 <p>Copyright &copy; 2000 Free Software Foundation, Inc.</p>
 
 <p>Esta imagen está disponible bajo la <a rel="license"
-href="/licenses/gpl.html">Licencia Pública general de GNU</a>, versión 2 o
-posterior, o la <a rel="license"
+href="/licenses/old-licenses/gpl-2.0.html">Licencia Pública general de
+GNU</a>, versión 2 o posterior, o la <a rel="license"
 href="https://directory.fsf.org/wiki/License:Free-Art-L-v1.3";>Licencia de
 Arte Libre</a>.</p>
 
@@ -117,7 +117,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/02/26 11:30:01 $
+$Date: 2019/03/13 11:00:58 $
 
 <!-- timestamp end -->
 </p>

Index: graphics/usegnu.es.html
===================================================================
RCS file: /web/www/www/graphics/usegnu.es.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- graphics/usegnu.es.html     15 Dec 2018 14:46:11 -0000      1.23
+++ graphics/usegnu.es.html     13 Mar 2019 11:00:58 -0000      1.24
@@ -1,50 +1,64 @@
 <!--#set var="ENGLISH_PAGE" value="/graphics/usegnu.en.html" -->
 
 <!--#include virtual="/server/header.es.html" -->
-<!-- Parent-Version: 1.86 -->
+<!-- Parent-version: 1.87 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
-<title>Use 'GNU - Proyecto GNU - Free Software Foundation</title>
+<title>Use 'GNU, de Etienne Suvasa y el equipo de la FSF - Proyecto GNU - Free
+Software Foundation</title>
+<link rel="stylesheet" type="text/css" href="/graphics/graphics.css" 
media="print,screen" />
+<style type="text/css" media="print,screen"><!--
+.reduced-width { width: 55em; }
address@hidden (min-width: 43em) {
+   #navigation li#more-links, #back-to-top { display: none; }
+}
+-->
+</style>
 
 <!--#include virtual="/graphics/po/usegnu.translist" -->
 <!--#include virtual="/server/banner.es.html" -->
 <h2>Use 'GNU</h2>
 
-<p>
-<a href="/graphics/use-gnu-sm.jpg"><img src="/graphics/use-gnu-sm.jpg"
-   alt="&nbsp;[Pseudo-Lisp (Use 'GNU)]&nbsp;"
-   width="139" height="111" /></a>
-</p>
+<p class="byline">de Etienne Suvasa y el equipo de la FSF</p>
 
-<p>
-En esta declaración sobre GNU al estilo Lisp, en el borde superior curvado
+<div class="reduced-width">
+<div class="pict narrow">
+  <a href="/graphics/use-gnu.jpg"><img
+     src="/graphics/use-gnu.jpg"
+     alt="&nbsp;[Pseudo-Lisp (Use 'GNU)]&nbsp;" /></a>
+</div>
+
+<p>En esta declaración sobre GNU al estilo Lisp, en el borde superior curvado
 se lee la frase «<cite>GNU's Not Unix</cite>» (GNU No es Unix) y en el borde
 inferior,  «<cite>Free Software Foundation</cite>». Dos «paréntesis» con
 forma de GNU curvados y danzantes forman un programa seudo Lisp: (USE
-'GNU). 
-</p>
+'GNU). </p>
 
-<p>
-Los paréntesis con forma de GNU danzantes fueron diseñados por Etienne
-Suvasa. Figuran en la portada del <a href="/manual/manual.html#emacs">Manual
-de referencia de Emacs Lisp</a>.
-</p>
+<p>Los paréntesis con forma de GNU danzantes fueron diseñados por Etienne
+Suvasa; fFiguran en la portada del <a
+href="https://shop.fsf.org/collection/books-docs";>Manual de referencia de
+Emacs Lisp</a>. El resto fue diseñado por el equipo de la FSF para la <a
+href="https://shop.fsf.org/collection/gnu-gear#Tshirts";>camiseta GNU</a> de
+1996.</p>
 
-<p>
-El resto de la imagen fue diseñado por personal de la FSF para las <a
-href="/order/t-shirts.html">camisetas de GNU</a> de 1996.
-</p>
-
-<p>
-Esta imagen está disponible en los siguientes formatos:
-</p>
 <ul>
-       <li>jpeg <a href="/graphics/use-gnu-sm.jpg">6k</a>, <a
-href="/graphics/use-gnu.jpg">17k</a></li>
-       <li>png <a href="/graphics/use-gnu-sm.png">2k</a>, <a
-href="/graphics/use-gnu.png">5k</a></li>
+  <li>JPEG&nbsp; <a href="/graphics/use-gnu-sm.jpg">4kB</a> (139x111),&nbsp; <a
+href="/graphics/use-gnu.jpg">16kB</a>&nbsp;(331x264)</li>
+  <li>PNG&nbsp; <a href="/graphics/use-gnu-sm.png">1.3kB</a> (139x111),&nbsp; 
<a
+href="/graphics/use-gnu.png">4kB</a>&nbsp;(331x264)</li>
 </ul>
 
+<div id="license" class="infobox">
+<hr />
+<p>Copyright &copy; 1998 Etienne Suvasa (paréntesis danzantes)<br />
+   Copyright &copy; 1998 Free Software Foundation, Inc. (text)</p>
+
+<p>Esta página está bajo la licencia <a rel="license"
+href="http://creativecommons.org/licenses/by-sa/4.0/deed.es_ES";>Creative
+Commons Reconocimiento-CompartirIgual 4.0 Internacional</a>.</p>
+</div>
+</div>
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -88,25 +102,10 @@
 el envío de traducciones de las páginas de este sitio web.</p>
 </div>
 
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 4.0.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015, 2018 Free Software Foundation, Inc.</p>
-
-<p>Esta página está bajo licencia <a rel="license"
+<!-- Please only list the latest year the page was modified. -->
+<p><em>Texto de la página:</em>&nbsp; Copyright &copy; 2019 Free Software
+Foundation, Inc.<br />
+Disponible bajo la licencia <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES";>Creative
 Commons Reconocimiento-SinObraDerivada 4.0 Internacional</a>.</p>
 
@@ -119,7 +118,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/12/15 14:46:11 $
+$Date: 2019/03/13 11:00:58 $
 
 <!-- timestamp end -->
 </p>

Index: graphics/po/graphics.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/graphics.es-en.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- graphics/po/graphics.es-en.html     15 Dec 2018 14:46:13 -0000      1.47
+++ graphics/po/graphics.es-en.html     13 Mar 2019 11:00:58 -0000      1.48
@@ -29,16 +29,11 @@
 tr {
     display: inline-block;
     width: 18.5em;
-    margin: .5em 0;
 }
 table td {
-    padding: 0;
+    padding: 0 .5em;
     border: none;
 }
-table img {
-    margin-right: 1em;
-}
-
 @media (min-width: 22em) {
     table {
         width: 20.5em;
@@ -124,8 +119,8 @@
 --><option value="ascii" selected="selected">ASCII / TTY art</option><!--#else
 --><option value="ascii">ASCII / TTY art</option><!--#endif -->
 <!--#if expr="$TYPE = banner"
---><option value="banner" selected="selected">banner / badge / 
T-shirt</option><!--#else
---><option value="banner">banner / badge / T-shirt</option><!--#endif -->
+--><option value="banner" selected="selected">banner / badge / 
t-shirt</option><!--#else
+--><option value="banner">banner / badge / t-shirt</option><!--#endif -->
 <!--#if expr="$TYPE = button"
 --><option value="button" selected="selected">button / stamp / 
sticker</option><!--#else
 --><option value="button">button / stamp / sticker</option><!--#endif -->
@@ -179,7 +174,7 @@
 <tr><td><a href="/graphics/arantxa.html">
     <img src="/graphics/icons/arantxa-glitch.80.png"
          alt="&nbsp;[Glitch]&nbsp;" /></a></td>
-    <td>July 2018: GNU designs<br />
+    <td>July 2018: Sunny GNU designs<br />
     <small>by Arantxa Serantes</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|tux|rms|)$/
                && $TYPE  = /^(cartoon|)$/" -->
@@ -237,18 +232,18 @@
                && $TYPE  = /^$/" -->
 <tr><td><a href="/graphics/3dgnuhead.html">
     <img src="/graphics/icons/3dgnuhead.80.png"
-         alt="&nbsp;[3D GNU Head]&nbsp;" /></a></td>
-    <td>3D GNU Head<br />
+         alt="&nbsp;[Portrait of GNU]&nbsp;" /></a></td>
+    <td>Portrait of GNU<br />
     <small>by Dale Mellor</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^$/" -->
 <tr><td><a href="/graphics/agnubody.html">
     <img src="/graphics/icons/agnubody.80.png"
-         alt="&nbsp;[A GNU Body]&nbsp;" /></a></td>
+         alt="&nbsp;[A Gnu Body]&nbsp;" /></a></td>
     <td>A Gnu Body<br />
     <small>by Graham Wilson</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^$/" -->
+               && $TYPE  = /^(svg|ascii|logo|)$/" -->
 <tr><td><a href="/graphics/agnuhead.html">
     <img src="/graphics/icons/gnu-head.80.png"
          alt="&nbsp;[Image of the head of a GNU]&nbsp;" /></a></td>
@@ -256,81 +251,80 @@
     <small>by Etienne Suvasa,<br />
     and derived images</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^(ascii|)$/" -->
+               && $TYPE  = /^(ascii|logo|)$/" -->
 <tr><td><a href="/graphics/agnuheadterm.html">
     <img src="/graphics/icons/agnuheadterm.80.png"
-         alt="&nbsp;[GNU Head]&nbsp;" /></a></td>
-    <td>A GNU Head for terminals<br />
+         alt="&nbsp;[GNU Head for terminal]&nbsp;" /></a></td>
+    <td>A GNU Head in terminals<br />
     <small>by Mattias Andrée</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/ahurdlogo.html">
     <img src="/graphics/icons/hurd-logo.80.png"
-         alt="&nbsp;[image of a Spherical Hurd Logo]&nbsp;" /></a></td>
-    <td>Hurd logos<br />
-    <small>resp. by Teddy Hogeborn and
-    Stephen McCamant</small></td></tr><!--#endif
+         alt="&nbsp;[Spherical Hurd Logo]&nbsp;" /></a></td>
+    <td>Spherical Hurd Logo<br />
+    <small>by Teddy Hogeborn</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/anfsflogo.html">
-    <img src="/graphics/icons/fsf-logo.80.png"
-         alt="&nbsp;[image of an FSF Logo on black]&nbsp;" /></a></td>
-    <td>An FSF logo<br />
+    <img src="/graphics/icons/fsf-bk.80.png"
+         alt="&nbsp;[FSF Logo on black]&nbsp;" /></a></td>
+    <td>FSF logos<br />
     <small>by Shawn Ewald</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/anlpflogo.html">
     <img src="/graphics/icons/liberty.80.png"
-         alt="&nbsp;[image of the Statue of Liberty Protecting Software 
Freedoms]&nbsp;" /></a></td>
+         alt="&nbsp;[Statue of Liberty protecting software freedoms]&nbsp;" 
/></a></td>
     <td>An LPF logo<br />
     <small>by Etienne Suvasa</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
-               && $TYPE  = /^(badge|)$/" -->
+               && $TYPE  = /^(svg|banner|logo|)$/" -->
 <tr><td><a href="/graphics/atypinggnu.html">
     <img src="/graphics/icons/gnu-type.80.png"
-         alt="&nbsp;[image of a Typing GNU Hacker]&nbsp;" /></a></td>
-    <td>A typing Gnu hacker<br />
+         alt="&nbsp;[Typing GNU hacker]&nbsp;" /></a></td>
+    <td>A typing GNU hacker<br />
     <small>by Jamal Hannah</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
-               && $TYPE  = /^(badge|)$/" -->
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/anothertypinggnu.html">
     <img src="/graphics/icons/another-gnu-type.80.png"
-         alt="&nbsp;[image of Another GNU Hacker]&nbsp;" /></a></td>
-    <td>Another typing Gnu hacker<br />
+         alt="&nbsp;[Another typing GNU hacker]&nbsp;" /></a></td>
+    <td>Another typing GNU hacker<br />
     <small>by Peter McLachlan</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(banner|logo|)$/" -->
 <tr><td><a href="/graphics/arantxa.html">
     <img src="/graphics/icons/arantxa-glitch.80.png"
          alt="&nbsp;[Glitch]&nbsp;" /></a></td>
-    <td>GNU designs<br />
+    <td>Sunny GNU designs<br />
     <small>by Arantxa Serantes</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
-               && $TYPE  = /^$/" -->
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/babygnu.html">
     <img src="/graphics/icons/baby-gnu.80.png"
-         alt="&nbsp;[image of a Baby GNU]&nbsp;" /></a></td>
-    <td>Baby Gnu<br />
+         alt="&nbsp;[Baby GNU sucking its thumb]&nbsp;" /></a></td>
+    <td>Baby GNU<br />
     <small>by Etienne Suvasa</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/barr-gnu.html">
     <img src="/graphics/icons/barr-gnu.80.png"
          alt="&nbsp;[GNU logo]&nbsp;" /></a></td>
-    <td>GNU logo<br />
+    <td>GNU Logo<br />
     <small>by Paul Barr</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|emacs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/bokma-gnu.html">
     <img src="/graphics/icons/bokma-gnu.80.png"
-         alt="&nbsp;[image of a GNU]&nbsp;" /></a></td>
-    <td>GNU and Emacs logos<br />
+         alt="&nbsp;[GNU logo]&nbsp;" /></a></td>
+    <td>GNU and Emacs Logos<br />
     <small>by John Bokma</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(svg|)$/" -->
 <tr><td><a href="/graphics/bold-initiative-GNU-head.html">
     <img src="/graphics/icons/bold-initiative-GNU-head.80.png"
-         alt="&nbsp;[Bold Initiative GNU Head]&nbsp;" /></a></td>
+         alt="&nbsp;[Winking GNU Head]&nbsp;" /></a></td>
     <td>Winking GNU<br />
     <small>by Bravo Edison</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|gnu|tux|)$/
@@ -338,15 +332,15 @@
 <tr><td><a href="/graphics/BVBN.html">
     <img src="/graphics/icons/bvbn-logo-small.80.png"
          alt="&nbsp;[GNU Head logo]&nbsp;" /></a></td>
-    <td>Useful GNU art<br />
+    <td>GNU/Linux buttons<br />
     <small>by Vladimir Tsarkov</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|tux|)$/
                && $TYPE  = /^(poster|)$/" -->
 <tr><td><a href="/graphics/bwcartoon.html">
-    <img src="/graphics/icons/bwcartoon.80.png"
-         alt="&nbsp;[B &amp; W Cartoon]&nbsp;" /></a></td>
-    <td>The Dynamic Duo: The Gnu and the Penguin
-    in flight</td></tr><!--#endif
+    <img src="/graphics/icons/gnu-and-penguin-color.80.png"
+         alt="&nbsp;[The Gnu and the Penguin in flight]&nbsp;" /></a></td>
+    <td>The Dynamic Duo: The Gnu and the Penguin in flight<br />
+    <small>by an anonymous artist</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(license|)$/
                && $TYPE  = /^(button|)$/" -->
 <tr><td><a href="/graphics/copyleft-sticker.html">
@@ -358,15 +352,23 @@
                && $TYPE  = /^(banner|svg|)$/" -->
 <tr><td><a href="/graphics/digital-restrictions-management.html">
     <img src="/graphics/icons/ichain.80.png"
-         alt="&nbsp;[iChains]&nbsp;" /></a></td>
-    <td>Digital Restrictions Management<br />
+         alt="&nbsp;[The chains of Digital Restrictions
+           Management]&nbsp;" /></a></td>
+    <td>GNU Art &mdash; Digital Restrictions Management<br />
     <small>by Chris Hayes</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/distros-dragora.html">
     <img src="/graphics/icons/distros-dragora.80.png"
          alt="&nbsp;[Dragora Logo]&nbsp;" /></a></td>
-    <td>Dragora logo<br /></td></tr><!--#endif
+    <td>Dragora Logo<br /></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnu|)$/
+               && $TYPE  = /^(wallpaper|)$/" -->
+<tr><td><a href="/graphics/dittberner-gnu.html">
+    <img src="/graphics/icons/dittberner_gnu.80.png"
+         alt="&nbsp;[Running gnu]&nbsp;" /></a></td>
+    <td>Running Gnu<br />
+    <small>by Dorothea and Jan Dittberner</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(surveillance|)$/
                && $TYPE  = /^(cartoon|)$/" -->
 <tr><td><a href="/graphics/dog.html">
@@ -379,13 +381,13 @@
 <tr><td><a href="/graphics/emacs-ref.html">
     <img src="/graphics/icons/emacs-ref.80.png"
          alt="&nbsp;[Reference card with GNU face]&nbsp;" /></a></td>
-    <td>GNU Emacs Reference Wallpaper<br />
+    <td>GNU Emacs Reference Card<br />
     <small>by Loic Duros</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(poster|svg|wallpaper|)$/" -->
 <tr><td><a href="/graphics/flying-gnu.html">
     <img src="/graphics/icons/flying-gnu.80.png"
-         alt="&nbsp;[Flying GNU Design]&nbsp;" /></a></td>
+         alt="&nbsp;[Flying GNU design]&nbsp;" /></a></td>
     <td>Flying Gnu<br />
     <small>by Ernesto Bazzano</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(rms|fs|)$/
@@ -409,23 +411,23 @@
          alt="&nbsp;[Gnu and Tux as messengers of free software in the
            desolate land of proprietary software]&nbsp;" /></a></td>
     <td>Free-Software Dealers<br />
-    <small>by Péhä</small></td></tr><!--#endif
+    <small>by P&eacute;h&auml;</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/free-your-soul.html">
     <img src="/graphics/icons/free-your-soul-wallpaper.80.png"
-         alt="&nbsp;[ Free Your Soul Wallpaper ]&nbsp;" /></a></td>
-    <td>Free Your Soul<br />
+         alt="&nbsp;[Free Your Soul wallpaper]&nbsp;" /></a></td>
+    <td>Free Your Soul wallpaper<br />
     <small>by Sayem Chaklader</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|tux|)$/
                && $TYPE  = /^(button|svg|)$/" -->
 <tr><td><a href="/graphics/french-motto.html">
     <img src="/graphics/icons/LEF.fr.80.png"
          alt="&nbsp;[liberty, equality, brotherhood button]&nbsp;" /></a></td>
-    <td>French motto<br />
-    <small>by Lutz Bürger</small></td></tr><!--#endif
+    <td>French Motto button<br />
+    <small>by Lutz B&uuml;rger</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^$/" -->
+               && $TYPE  = /^(button|)$/" -->
 <tr><td><a href="/graphics/fromagnulinux.html">
     <img src="/graphics/icons/fromagnulinux.80.png"
          alt="&nbsp;[Fromagnulinux]&nbsp;" /></a></td>
@@ -435,15 +437,16 @@
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/fsf-logo.html">
     <img src="/graphics/icons/fsf-logo-notext.80.png"
-         alt="&nbsp;[The Official FSF Logo]&nbsp;" /></a></td>
-    <td>Free Software Foundation logo<br />
+         alt="&nbsp;[The official FSF logo]&nbsp;" /></a></td>
+    <td>Free Software Foundation Logo<br />
     <small>by Li Jiang</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/FSFS-logo.html">
     <img src="/graphics/icons/FSFS-title2.80.png"
          alt="&nbsp;[The book cover logo for 'Free Software, Free 
Society']&nbsp;" /></a></td>
-    <td>Book cover logo for Free Software, Free Society</td></tr><!--#endif
+    <td>Book cover logo for Free Software, Free Society<br />
+    <small>by Jonathan Richard</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/gg3po.html">
@@ -455,15 +458,15 @@
                && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/gleesons.html">
     <img src="/graphics/icons/gleeson_head.80.png"
-         alt="&nbsp;[colorful rounded image of the Head of a GNU]&nbsp;" 
/></a></td>
-    <td>GNU art<br />
+         alt="&nbsp;[Colorful rounded image of the head of a GNU]&nbsp;" 
/></a></td>
+    <td>GNU Art<br />
     <small>by Brendon Gleeson</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/gNewSense.html">
     <img src="/graphics/icons/gnewsense.80.png"
          alt="&nbsp;[gNewSense Logo]&nbsp;" /></a></td>
-    <td>gNewSense logo<br />
+    <td>gNewSense Logo<br />
     <small>by Li Jiang</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(banner|svg|)$/" -->
@@ -472,22 +475,24 @@
          alt="&nbsp;[GNU 30th - Celebrating 30 years]&nbsp;" /></a></td>
     <td>GNU 30th birthday</td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
-               && $TYPE  = /^(wallpaper|)$/" -->
+               && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/gnu-alternative.html">
     <img src="/graphics/icons/gnu-alternative.80.png"
-         alt="&nbsp;[image of the Head of a GNU]&nbsp;" /></a></td>
-    <td>Alternative GNU Head</td></tr><!--#endif
+         alt="&nbsp;[Stylized gnu mask]&nbsp;" /></a></td>
+    <td>GNU Alternative<br />
+    <small>by an anonymous artist</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(ascii|)$/" -->
 <tr><td><a href="/graphics/gnu-ascii.html">
     <img src="/graphics/icons/gnu-ascii.80.png"
-         alt="&nbsp;[ASCII Gnu]&nbsp;" /></a></td>
-    <td>An ASCII GNU</td></tr><!--#endif
+         alt="&nbsp;[ASCII Gnu head]&nbsp;" /></a></td>
+    <td>ASCII GNU<br />
+    <small>by Przemys&#322;aw Borys</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(ascii|button|icon|)$/" -->
 <tr><td><a href="/graphics/gnu-ascii2.html">
     <img src="/graphics/icons/gnu-ascii2.80.png"
-         alt="&nbsp;[ASCII Gnu]&nbsp;" /></a></td>
+         alt="&nbsp;[Small ASCII Gnu head]&nbsp;" /></a></td>
     <td>Another ASCII GNU (for email signatures)<br />
     <small>by Martin Dickopp</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
@@ -495,13 +500,13 @@
 <tr><td><a href="/graphics/gnu-ascii-liberty.html">
     <img src="/graphics/icons/gnu-ascii-liberty.80.png"
          alt="&nbsp;[ASCII Gnu is liberty]&nbsp;" /></a></td>
-    <td>An ASCII &ldquo;GNU is Liberty&rdquo;<br />
+    <td>ASCII &ldquo;GNU is Liberty&rdquo;<br />
     <small>by Carlos Contreras A.</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(badge|wallpaper|)$/" -->
 <tr><td><a href="/graphics/gnu-born-free-run-free.html">
     <img src="/graphics/icons/gnu-born-free-run-free.80.png"
-         alt="&nbsp;[A gnu running]&nbsp;" /></a></td>
+         alt="&nbsp;[GNU Born Free Runs Free]&nbsp;" /></a></td>
     <td>GNU Born Free Runs Free<br />
     <small>by Alicia Lapekas</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
@@ -509,15 +514,15 @@
 <tr><td><a href="/graphics/gnu-head-luk.html">
     <img src="/graphics/icons/gnu-head-luk.80.png"
          alt="&nbsp;[Luk's GNU head]&nbsp;" /></a></td>
-    <td>GNU Head<br />
+    <td>Stylized GNU Head<br />
     <small>by Luk</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(svg|)$/" -->
 <tr><td><a href="/graphics/gnu-head-shadow.html">
     <img src="/graphics/icons/gnu_headshadow.80.png"
          alt="&nbsp;[GNU banner saying: run free run gnu]&nbsp;" /></a></td>
-    <td>A GNU Head shadowed<br />
-    <small>by Vladimir Zúñiga</small></td></tr><!--#endif
+    <td>GNU Head shadowed<br />
+    <small>by Vladimir Z&uacute;&ntilde;iga</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/gnu-inside.html">
@@ -530,7 +535,7 @@
 <tr><td><a href="/graphics/gnu-jacket.html">
     <img src="/graphics/icons/gnu-jacket.80.png"
          alt="&nbsp;[Gnu wearing a jacket]&nbsp;" /></a></td>
-    <td>A Gnu wearing a jacket<br />
+    <td>A Gnu Wearing a Jacket<br />
     <small>by Sarah Katzenell Rabkin</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^$/
                && $TYPE  = /^(logo|svg|)$/" -->
@@ -543,30 +548,30 @@
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/gnu-slash-linux.html">
     <img src="/graphics/icons/gnu-linux-on-black.80.png"
-         alt="&nbsp;[GNU/Linux on black]&nbsp;" /></a></td>
-    <td>GNU/Linux art<br />
+         alt="&nbsp;[Gnu and Tux on black]&nbsp;" /></a></td>
+    <td>GNU/Linux Art<br />
     <small>by Rui Damas</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/gnubanner.html">
     <img src="/graphics/icons/gnubanner-2.80.png"
          alt="&nbsp;[Come and see what GNU creates for YOU]&nbsp;" /></a></td>
-    <td>GNU banners<br />
-    <small>resp. by Stefan Rieken, Lalo Martins,
+    <td>GNU banners and link<br />
+    <small>resp. by Stefan Rieken, John M. Wooten
     and SpAwN</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/gnuhornedlogo.html">
     <img src="/graphics/icons/gnu_hornedword.80.png"
          alt="&nbsp;[GNU Horned Word Logo]&nbsp;" /></a></td>
-    <td>A GNU logo with horns<br />
-    <small>by Vladimir Zúñiga</small></td></tr><!--#endif
+    <td>GNU Horned Logo<br />
+    <small>by Vladimir Z&uacute;&ntilde;iga</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|tux|)$/
                && $TYPE  = /^(poster|)$/" -->
 <tr><td><a href="/graphics/gnulove.html">
     <img src="/graphics/icons/Gnulove.80.png"
          alt="&nbsp;[GNU Love]&nbsp;" /></a></td>
-    <td>A Penguin Hugging A Gnu<br />
+    <td>GNU Love<br />
     <small>by Alison Upton</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(plastic|)$/" -->
@@ -579,8 +584,8 @@
                && $TYPE  = /^(badge|logo|)$/" -->
 <tr><td><a href="/graphics/gnupascal.html">
     <img src="/graphics/icons/Gnu+Pascal.80.png"
-         alt="&nbsp;[image of a Gnu and Blaise Pascal]&nbsp;" /></a></td>
-    <td>Gnu and Blaise Pascal<br />
+         alt="&nbsp;[A Gnu and Blaise Pascal]&nbsp;" /></a></td>
+    <td>GNU and Blaise Pascal<br />
     <small>by Markus Gerwinski</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(plastic|)$/" -->
@@ -593,36 +598,36 @@
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/groff-head.html">
     <img src="/graphics/icons/groff-head.80.png"
-         alt="&nbsp;[image of the Head of a GNU with a printing press]&nbsp;" 
/></a></td>
-    <td>Groff Head<br />
+         alt="&nbsp;[Head of a GNU with a printing press]&nbsp;" /></a></td>
+    <td>GNU Head with Printing Press<br />
     <small>by Imogen Mulley</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/heckert_gnu.html">
     <img src="/graphics/icons/heckert_gnu.80.png"
          alt="&nbsp;[Bold image of the head of a GNU]&nbsp;" /></a></td>
-    <td>Bold alternative GNU Head<br />
-    <small>by Aurelio A. Heckert</small></td></tr><!--#endif
+    <td>A Bold GNU Head<br />
+    <small>by Aur&eacute;lio A. Heckert</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/hitflip-gnu.html">
     <img src="/graphics/icons/hitflip-gnu.80.png"
-         alt="&nbsp;[Hitflip 1 small]&nbsp;" /></a></td>
-    <td>GNU coin and herd<br />
+         alt="&nbsp;[GNU coin]&nbsp;" /></a></td>
+    <td>GNU Coin and Herd<br />
     <small>by the Hitflip Team</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/httptunnel-logo.html">
     <img src="/graphics/icons/httptunnel-w.80.png"
-         alt="&nbsp;[httptunnel logo]&nbsp;" /></a></td>
-    <td>HTTP-Tunnel logo<br />
+         alt="&nbsp;[HTTPTunnel logo]&nbsp;" /></a></td>
+    <td>HTTPTunnel Logo<br />
     <small>by Harri Manni</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|)$/" -->
 <tr><td><a href="/graphics/hurd_mf.html">
     <img src="/graphics/icons/hurd_mf.80.png"
-         alt="&nbsp;[small image of a Hurd Metafont Logo]&nbsp;" /></a></td>
-    <td>Hurd logos in Metafont<br />
+         alt="&nbsp;[Hurd Metafont logo]&nbsp;" /></a></td>
+    <td>Hurd Logo in Metafont<br />
     <small>by Stephen McCamant</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^$/
                && $TYPE  = /^(cartoon|)$/" -->
@@ -663,7 +668,7 @@
                && $TYPE  = /^(icon|)$/" -->
 <tr><td><a href="/graphics/gnu-and-tux-icon.html">
     <img src="/graphics/icons/gnu-and-tux-icon.80.png"
-         alt="&nbsp;[GNU and Tux]&nbsp;" /></a></td>
+         alt="&nbsp;[Gnu and Tux icon]&nbsp;" /></a></td>
     <td>Gnu and Tux Icon<br />
     <small>by Sventsitskaya Nadezda</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
@@ -671,14 +676,14 @@
 <tr><td><a href="/graphics/nandakumar-gnu.html">
     <img src="/graphics/icons/gnu-gives-freedom.80.png"
          alt="&nbsp;[GNU liberating a computer]&nbsp;" /></a></td>
-    <td>GNU Gives Freedom<br />
+    <td>GNU Gives Freedom poster<br />
     <small>by Nandakumar</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(cartoon|svg|)$/" -->
 <tr><td><a href="/graphics/navaneeth-gnu.html">
     <img src="/graphics/icons/give-me-freedom.80.png"
          alt="&nbsp;[A computer dreaming about GNU for freedom]&nbsp;" 
/></a></td>
-    <td>Give Me Freedom<br />
+    <td>Give Me Freedom poster<br />
     <small>by Navaneeth</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(svg|)$/" -->
@@ -700,7 +705,7 @@
     <img src="/graphics/icons/plant-onion.80.png"
          alt="&nbsp;[Gnu and Tux plant onions]&nbsp;" /></a></td>
     <td>Plant Onions!<br />
-    <small>by Péhä</small></td></tr><!--#endif
+    <small>by P&eacute;h&auml;</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(banner|)$/" -->
 <tr><td><a href="/graphics/r4sh-gnu-vaporwave.html">
@@ -712,7 +717,7 @@
                && $TYPE  = /^$/" -->
 <tr><td><a href="/graphics/reiss-gnuhead.html">
     <img src="/graphics/icons/reiss-head.80.png"
-         alt="&nbsp;[Head of a GNU]&nbsp;" /></a></td>
+         alt="&nbsp;[Colored GNU head]&nbsp;" /></a></td>
     <td>Color GNU Head<br />
     <small>by Joseph W. Reiss</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
@@ -720,20 +725,20 @@
 <tr><td><a href="/graphics/runfreegnu.html">
     <img src="/graphics/icons/runfreegnu.80.png"
          alt="&nbsp;['Run free run GNU' banner]&nbsp;" /></a></td>
-    <td>Run free run GNU<br />
-    <small>by Vladimir Zúñiga</small></td></tr><!--#endif
+    <td>Run free run GNU banner<br />
+    <small>by Vladimir Z&uacute;&ntilde;iga</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(svg|)$/" -->
 <tr><td><a href="/graphics/santa-gnu.html">
     <img src="/graphics/icons/Santa_GNU.80.png"
          alt="&nbsp;[Santa Claus GNU]&nbsp;" /></a></td>
-    <td>Santa Claus Gnu<br />
-    <small>by Luciano Lourenço</small></td></tr><!--#endif
+    <td>Santa Claus GNU<br />
+    <small>by Luciano Louren&ccedil;o</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(poster|)$/" -->
 <tr><td><a href="/graphics/scowcroft.html">
     <img src="/graphics/icons/gnu-beast.80.png"
-         alt="&nbsp;[GNU with stars]&nbsp;" /></a></td>
+         alt="&nbsp;[GNU beast poster]&nbsp;" /></a></td>
     <td>Gnu Characters<br />
     <small>by Carol Anne Scowcroft</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
@@ -741,28 +746,28 @@
 <tr><td><a href="/graphics/skwetu-gnu-logo.html">
     <img src="/graphics/icons/skwetu-gnu-logo.80.png"
          alt="&nbsp;[Skwetu's GNU Logo]&nbsp;" /></a></td>
-    <td>A Shishalh GNU logo<br />
+    <td>Salish GNU logo<br />
     <small>by Skwetu</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|fs|)$/
                && $TYPE  = /^(banner|wallpaper|)$/" -->
 <tr><td><a href="/graphics/skwid-wallpapers.html">
     <img src="/graphics/icons/skwid-free-side-wallpaper.80.png"
          alt="&nbsp;[Free Side of the Force wallpaper]&nbsp;" /></a></td>
-    <td>GNU designs<br />
+    <td>GNU Designs<br />
     <small>by Ben &ldquo;Skwid&rdquo; Gailly</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/slickgnu.html">
     <img src="/graphics/icons/slickgnu.80.png"
-         alt="&nbsp;[The Spirit of Freedom]&nbsp;" /></a></td>
-    <td>A slick GNU logo<br />
+         alt="&nbsp;[A slick GNU logo]&nbsp;" /></a></td>
+    <td>A Slick GNU Logo<br />
     <small>by Brian Bush</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/social.html">
     <img src="/graphics/icons/gnu-social-logo.80.png"
          alt="&nbsp;[GNU social Logo]&nbsp;" /></a></td>
-    <td>The GNU Social logo<br />
+    <td>GNU Social logo<br />
     <small>by Jonas Laugs and Steven DuBois</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|tux|)$/
                && $TYPE  = /^(poster|wallpaper|)$/" -->
@@ -783,35 +788,42 @@
 <tr><td><a href="/graphics/stark-gnuherd.html">
     <img src="/graphics/icons/gnu_herd_banner.80.png"
          alt="&nbsp;[GNU banner]&nbsp;" /></a></td>
-    <td>Herd Banner<br />
-    <small>by Jochen St&auml;rk</small></td></tr><!--#endif
+    <td>GNU Herd Banner<br />
+    <small>by Stephan Baumann, usegroup</small></td></tr><!--#endif
+--><!--#if expr="$THEME = /^(gnuhead|)$/
+               && $TYPE  = /^(logo|svg|)$/" -->
+<tr><td><a href="/graphics/sven-gnuhead.html">
+    <img src="/graphics/icons/nu-gnu.80.png"
+         alt="&nbsp;[Simplified GNU Head]&nbsp;" /></a></td>
+    <td>Simplified GNU Head<br />
+    <small>by Sven H.</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(ascii|)$/" -->
 <tr><td><a href="/graphics/supergnu-ascii.html">
     <img src="/graphics/icons/supergnu-ascii.80.png"
          alt="&nbsp;[ASCII Super Gnu]&nbsp;" /></a></td>
-    <td>An ASCII Super Gnu<br />
+    <td>ASCII Super Gnu<br />
     <small>by Vijay Kumar</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(ascii|)$/" -->
 <tr><td><a href="/graphics/alternative-ascii.html">
     <img src="/graphics/icons/alternative-ascii.80.png"
          alt="&nbsp;[ASCII GNU head]&nbsp;" /></a></td>
-    <td>Another ASCII GNU<br />
+    <td>An Alternative ASCII GNU<br />
     <small>by Vijay Kumar</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(wallpaper|)$/" -->
 <tr><td><a href="/graphics/this-is-freedom-wallpaper.html">
     <img src="/graphics/icons/this-is-freedom-wallpaper.80.png"
-         alt="&nbsp;['this is freedom' wallpaper]&nbsp;" /></a></td>
-    <td>This is Freedom<br />
+         alt="&nbsp;['This is freedom' wallpaper]&nbsp;" /></a></td>
+    <td>This is Freedom wallpaper<br />
     <small>by Vadim Gush</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(fs|)$/
                && $TYPE  = /^(logo|svg|)$/" -->
 <tr><td><a href="/graphics/Trisquel.html">
     <img src="/graphics/icons/trisquel.80.png"
          alt="&nbsp;[Trisquel Logo]&nbsp;" /></a></td>
-    <td>Trisquel logo</td></tr><!--#endif
+    <td>Trisquel Logo</td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(badge|banner|)$/" -->
 <tr><td><a href="/graphics/usegnu.html">
@@ -831,7 +843,7 @@
 <tr><td><a href="/graphics/winkler-gnu.html">
     <img src="/graphics/icons/winkler-gnu.80.png"
          alt="&nbsp;[Kyle's Alternative GNU logo]&nbsp;" /></a></td>
-    <td>Alternative GNU logo<br />
+    <td>Alternative GNU Logo<br />
     <small>by Kyle Winkler</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|gnu|)$/
                && $TYPE  = /^$/" -->
@@ -845,7 +857,7 @@
 <tr><td><a href="/graphics/bahlon/index.html">
     <img src="/graphics/icons/3d-gnu-head.80.png"
          alt="&nbsp;[3D Gnu head]&nbsp;" /></a></td>
-    <td>3D GNU Head<br />
+    <td>GNU Head in 3D<br />
     <small>by Georg Bahlon</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|)$/
                && $TYPE  = /^(button|svg|)$/" -->
@@ -859,7 +871,8 @@
 <tr><td><a href="/graphics/fsfsociety/fsfsociety.html">
     <img src="/graphics/icons/party.80.png"
          alt="&nbsp;[GNU party]&nbsp;" /></a></td>
-    <td>Graphics from <i>Free Software, Free Society</i></td></tr><!--#endif
+    <td>GNU Party<br />
+    <small>by Etienne Suvasa</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|tux|emacs|fs|)$/
                && $TYPE  = /^(banner|button|cartoon|svg|)$/" -->
 <tr><td><a href="/graphics/gnu-post/index.html">
@@ -871,18 +884,18 @@
                && $TYPE  = /^(button|cartoon|icon|svg|)$/" -->
 <tr><td><a href="/graphics/gnu-and-freedo/gnu-and-freedo.html">
     <img src="/graphics/icons/freedo-logo.80.png"
-         alt="&nbsp;[GNU + Freedo]&nbsp;" /></a></td>
-    <td>Gnu + Freedo characters<br />
+         alt="&nbsp;[Freedo]&nbsp;" /></a></td>
+    <td>GNU and Freedo<br />
     <small>by Jos&eacute; Miguel Silva Lara and M&aacute;rcio Alexandre
     Silva Delgado</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|tux|)$/
                && $TYPE  = /^(poster|svg|)$/" -->
 <tr><td><a href="/graphics/umsa/umsa.html">
     <img src="/graphics/icons/gnu-tux.80.png"
-         alt="&nbsp;[Tux riding GNU]&nbsp;" /></a></td>
+         alt="&nbsp;[Tux riding a strong GNU]&nbsp;" /></a></td>
     <td>Designs for the UMSA course
     &ldquo;Núcleo GNU/Linux&rdquo;<br />
-    <small>by Ruth García</small></td></tr><!--#endif
+    <small>by Ruth Garc&iacute;a</small></td></tr><!--#endif
 -->
 </table>
 
@@ -895,12 +908,6 @@
     <img src="/graphics/icons/avatar-3d-baby-gnu.80.png"
          alt="&nbsp;[An avatar based on Georg Bahlon's 3D GNU head]&nbsp;" 
/></a></td>
     <td>Avatars</td></tr><!--#endif
---><!--#if expr="$THEME = /^(gnuhead|gnu|)$/
-               && $TYPE  = /^(svg|)$/" -->
-<tr><td><a href="/graphics/gnusvgart.html">
-    <img src="/graphics/icons/dittberner_gnu.80.png"
-         alt="&nbsp;[Running GNU]&nbsp;" /></a></td>
-    <td>GNU art in SVG format</td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnuhead|gnu|emacs|fs|)$/
                && $TYPE  = /^(banner|button|plastic|poster|)$/" -->
 <tr><td><a href="/graphics/historic-gnu-press.html">
@@ -931,6 +938,7 @@
 <h3 id="other-sites">GNU Art on other sites</h3>
 
 <table>
+<!-- RT #1297904 -->
 <tr style="display:none"><td></td></tr><!-- Dummy entry for xhtml validation.
 --><!--#if expr="$THEME = /^(gnu|tux|rms|)$/
                && $TYPE  = /^(cartoon|)$/" -->
@@ -941,6 +949,7 @@
     <small>by Librefan</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|emacs|)$/
                && $TYPE  = /^(wallpaper|)$/" -->
+<!-- RT #1242119 -->
 <tr><td><a 
href="https://goblinrefuge.com/mediagoblin/u/emacsomancer/m/my-god-it-s-full-of-car-s-png";>
     <img src="/graphics/icons/lisp-meditate.80.png"
          alt="&nbsp;[Meditating GNU with Lisp on background]&nbsp;" /></a></td>
@@ -959,7 +968,7 @@
     <img src="/graphics/icons/fsf-cuaderno.80.png"
          alt="&nbsp;[FSF art]&nbsp;" /></a></td>
     <td>Free software art<br />
-    <small>by David Arroyo Menéndez</small></td></tr><!--#endif
+    <small>by David Arroyo Men&eacute;ndez</small></td></tr><!--#endif
 --><!--#if expr="$THEME = /^(gnu|)$/
                && $TYPE  = /^(poster|)$/" -->
 <tr><td><a href="https://apolonis.deviantart.com/art/Le-Sage-285523519";>
@@ -993,13 +1002,13 @@
 <tr><td><a 
href="https://web.archive.org/web/20110513011151/http://graphics.rootmode.com/";>
     <img src="/graphics/icons/button-powered-by-gnu.80.png"
          alt="&nbsp;['Powered by GNU' button]&nbsp;" /></a></td>
-    <td>Favicon and buttons (archived)<br />
-    <small>by Edward Alfert</small></td></tr><!--#endif
+    <td>Favicon and buttons <small>(archived)<br />
+    by Edward Alfert</small></td></tr><!--#endif
 -->
 </table>
 
 <p class="button"><a href="#select">Back to selection form</a></p>
-
+<!-- RT #902381 -->
 <p id="openclipart">You can also find GNU-related public domain graphics at
 <a href="https://openclipart.org/search/?query=GNU";>openclipart.org</a>.</p>
 
@@ -1050,7 +1059,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 1996-2007, 2010, 2012-2018 Free Software Foundation, 
Inc.</p>
+<p>Copyright &copy; 1996-2007, 2010, 2012-2019 Free Software Foundation, 
Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -1060,7 +1069,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/12/15 14:46:13 $
+$Date: 2019/03/13 11:00:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: graphics/po/philosophicalgnu.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/philosophicalgnu.es-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- graphics/po/philosophicalgnu.es-en.html     14 Feb 2019 11:31:12 -0000      
1.11
+++ graphics/po/philosophicalgnu.es-en.html     13 Mar 2019 11:00:58 -0000      
1.12
@@ -52,8 +52,8 @@
 
https://web.archive.org/web/20090224214409/http://ngc224.gerwinski.de/~anja/gnuart/markus/index.html
 -->
 <p>This image is available under the <a rel="license"
-href="/licenses/gpl.html">GNU General Public License</a>, version&nbsp;2 or
-any later version.</p>
+href="/licenses/old-licenses/gpl-2.0.html">GNU General Public License</a>,
+version&nbsp;2 or any later version.</p>
 </div>
 </div>
 
@@ -98,7 +98,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/14 11:31:12 $
+$Date: 2019/03/13 11:00:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: graphics/po/reiss-gnuhead.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/reiss-gnuhead.es-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- graphics/po/reiss-gnuhead.es-en.html        26 Feb 2019 11:30:02 -0000      
1.15
+++ graphics/po/reiss-gnuhead.es-en.html        13 Mar 2019 11:00:58 -0000      
1.16
@@ -38,8 +38,8 @@
 <p>Copyright &copy; 2000 Free Software Foundation, Inc.</p>
 
 <p>This image is available under the <a rel="license"
-href="/licenses/gpl.html">GNU General Public License</a>, version&nbsp;2 or
-any later version, or the <a rel="license"
+href="/licenses/old-licenses/gpl-2.0.html">GNU General Public License</a>,
+version&nbsp;2 or any later version, or the <a rel="license"
 href="https://directory.fsf.org/wiki/License:Free-Art-L-v1.3";>Free Art
 License</a>.</p>
 
@@ -95,7 +95,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/26 11:30:02 $
+$Date: 2019/03/13 11:00:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: graphics/po/usegnu.es-en.html
===================================================================
RCS file: /web/www/www/graphics/po/usegnu.es-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- graphics/po/usegnu.es-en.html       15 Dec 2018 14:46:13 -0000      1.13
+++ graphics/po/usegnu.es-en.html       13 Mar 2019 11:00:58 -0000      1.14
@@ -1,43 +1,58 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.86 -->
-<title>Use 'GNU - GNU Project - Free Software Foundation</title>
+<!-- Parent-version: 1.87 -->
+<title>Use 'GNU by Etienne Suvasa and FSF Staff - GNU Project - Free Software 
Foundation</title>
+<link rel="stylesheet" type="text/css" href="/graphics/graphics.css" 
media="print,screen" />
+<style type="text/css" media="print,screen"><!--
+.reduced-width { width: 55em; }
address@hidden (min-width: 43em) {
+   #navigation li#more-links, #back-to-top { display: none; }
+}
+--></style>
 <!--#include virtual="/graphics/po/usegnu.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Use 'GNU</h2>
 
-<p>
-<a href="/graphics/use-gnu-sm.jpg"><img src="/graphics/use-gnu-sm.jpg"
-   alt="&nbsp;[Pseudo-Lisp (Use 'GNU)]&nbsp;"
-   width="139" height="111" /></a>
-</p>
+<p class="byline">by Etienne Suvasa and the FSF Staff</p>
+
+<div class="reduced-width">
+<div class="pict narrow">
+  <a href="/graphics/use-gnu.jpg"><img
+     src="/graphics/use-gnu.jpg"
+     alt="&nbsp;[Pseudo-Lisp (Use 'GNU)]&nbsp;" /></a>
+</div>
 
-<p>
-&ldquo;GNU's Not Unix&rdquo; curves above, and &ldquo;Free Software
+<p>&ldquo;GNU's Not Unix&rdquo; curves above, and &ldquo;Free Software
 Foundation&rdquo; borders below in this Lisp-like statement about GNU.  Two
 &ldquo;parentheses&rdquo; formed by curved, dancing GNUs form a pseudo-Lisp
-program: (USE 'GNU).
-</p>
+program: (USE 'GNU).</p>
 
-<p>
-The dancing GNU parentheses were drawn by Etienne Suvasa.  They are
+<p>The dancing GNU parentheses were drawn by Etienne Suvasa; they are
 part of the cover art for the
-<a href="/manual/manual.html#emacs">GNU
+<a href="https://shop.fsf.org/collection/books-docs";>GNU
 Emacs Lisp Reference manual</a>.
-</p>
+The rest was designed by the FSF staff for the 1996
+<a href="https://shop.fsf.org/collection/gnu-gear#Tshirts";>GNU t-shirt</a>.</p>
 
-<p>
-The rest of this art was designed by the FSF staff for the 1996
-<a href="/order/t-shirts.html">GNU T-shirt</a>.
-</p>
-
-<p>
-This picture is available in the following formats:
-</p>
 <ul>
-       <li>jpeg <a href="/graphics/use-gnu-sm.jpg">6k</a>, <a 
href="/graphics/use-gnu.jpg">17k</a></li>
-       <li>png <a href="/graphics/use-gnu-sm.png">2k</a>, <a 
href="/graphics/use-gnu.png">5k</a></li>
+  <li>JPEG&nbsp;
+    <a href="/graphics/use-gnu-sm.jpg">4kB</a> (139x111),&nbsp;
+    <a href="/graphics/use-gnu.jpg">16kB</a>&nbsp;(331x264)</li>
+  <li>PNG&nbsp;
+    <a href="/graphics/use-gnu-sm.png">1.3kB</a> (139x111),&nbsp;
+    <a href="/graphics/use-gnu.png">4kB</a>&nbsp;(331x264)</li>
 </ul>
 
+<div id="license" class="infobox">
+<hr />
+<p>Copyright &copy; 1998 Etienne Suvasa (dansing parentheses)<br />
+   Copyright &copy; 1998 Free Software Foundation, Inc. (text)</p>
+
+<p>This image is available under the <a rel="license"
+href="https://creativecommons.org/licenses/by-sa/4.0/";>Creative
+Commons Attribution-ShareAlike 4.0 International License</a>.</p>
+</div>
+</div>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -68,34 +83,18 @@
 of this article.</p>
 </div>
 
-<!-- Regarding copyright, in general, standalone pages (as opposed to
-     files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 4.0.  Please do NOT change or remove this
-     without talking with the webmasters or licensing team first.
-     Please make sure the copyright date is consistent with the
-     document.  For web pages, it is ok to list just the latest year the
-     document was modified, or published.
-     
-     If you wish to list earlier years, that is ok too.
-     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
-     years, as long as each year in the range is in fact a copyrightable
-     year, i.e., a year in which the document was published (including
-     being publicly visible on the web or in a revision control system).
-     
-     There is more detail about copyright years in the GNU Maintainers
-     Information document, www.gnu.org/prep/maintain. -->
-
-<p>Copyright &copy; 2014, 2015, 2018 Free Software Foundation, Inc.</p>
-
-<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
-Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+<!-- Please only list the latest year the page was modified. -->
+<p><em>Page text:</em>&nbsp;
+Copyright &copy; 2019 Free Software Foundation, Inc.<br />
+Available under the <a rel="license"
+href="https://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/12/15 14:46:13 $
+$Date: 2019/03/13 11:00:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/de.po        11 Mar 2019 10:02:10 -0000      1.48
+++ proprietary/po/de.po        13 Mar 2019 11:00:58 -0000      1.49
@@ -3959,6 +3959,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/es.po        11 Mar 2019 11:01:58 -0000      1.64
+++ proprietary/po/es.po        13 Mar 2019 11:00:58 -0000      1.65
@@ -2754,6 +2754,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/fr.po        11 Mar 2019 10:33:04 -0000      1.85
+++ proprietary/po/fr.po        13 Mar 2019 11:00:59 -0000      1.86
@@ -3145,6 +3145,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/it.po        11 Mar 2019 10:02:10 -0000      1.48
+++ proprietary/po/it.po        13 Mar 2019 11:00:59 -0000      1.49
@@ -3746,6 +3746,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/ja.po        11 Mar 2019 10:02:10 -0000      1.48
+++ proprietary/po/ja.po        13 Mar 2019 11:00:59 -0000      1.49
@@ -3200,6 +3200,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/malware-cars.de-diff.html    4 Feb 2019 07:31:22 -0000       
1.25
+++ proprietary/po/malware-cars.de-diff.html    13 Mar 2019 11:00:59 -0000      
1.26
@@ -75,6 +75,17 @@
     worse.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810230"&gt;
     &lt;p&gt;GM &lt;a
     href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
@@ -156,9 +167,9 @@
 href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
 Volkswagen programmed its car engine computers</strong></del></span> <span 
class="inserted"><ins><em>weak security, &lt;a
     
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
-    is easy</em></ins></span> to <span 
class="removed"><del><strong>detect</strong></del></span> <span 
class="inserted"><ins><em>open</em></ins></span> the
-<span class="removed"><del><strong>Environmental Protection Agency's emission 
tests&lt;/a&gt;,
-and run dirty the rest</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> of <span 
class="removed"><del><strong>the time.&lt;/p&gt;
+    is easy</em></ins></span> to <span class="removed"><del><strong>detect the
+Environmental Protection Agency's emission tests&lt;/a&gt;,
+and run dirty</strong></del></span> <span 
class="inserted"><ins><em>open</em></ins></span> the <span 
class="removed"><del><strong>rest</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> of <span 
class="removed"><del><strong>the time.&lt;/p&gt;
 
 &lt;p&gt;In real driving, the</strong></del></span> <span 
class="inserted"><ins><em>100 million</em></ins></span> cars <span 
class="removed"><del><strong>exceeded emissions standards</strong></del></span> 
<span class="inserted"><ins><em>built</em></ins></span> by <span 
class="removed"><del><strong>a factor
 of up to 35.&lt;/p&gt;
@@ -173,7 +184,7 @@
 DRM in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized</em></ins></span> cars <span 
class="removed"><del><strong>will drive consumers 
crazy&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>with nonfree software are &lt;a
+    &lt;p id="car-spying"&gt;Computerized</em></ins></span> cars <span 
class="removed"><del><strong>will drive consumers 
crazy&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>with nonfree software are &lt;a
     
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -372,7 +383,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/13 11:00:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/malware-cars.de.po   1 Jan 2019 20:00:35 -0000       1.15
+++ proprietary/po/malware-cars.de.po   13 Mar 2019 11:00:59 -0000      1.16
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -119,6 +119,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/malware-cars.fr.po   1 Jan 2019 22:19:49 -0000       1.23
+++ proprietary/po/malware-cars.fr.po   13 Mar 2019 11:00:59 -0000      1.24
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2019-01-01 23:19+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -97,6 +98,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/malware-cars.pot     1 Jan 2019 20:00:35 -0000       1.10
+++ proprietary/po/malware-cars.pot     13 Mar 2019 11:00:59 -0000      1.11
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a "
+"href=\"/proprietary/proprietary-surveillance.html#car-spying\"> "
+"manufacturers collect this data</a> as part of their own spying, then "
+"forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/malware-cars.ru.po   25 Feb 2019 09:37:05 -0000      1.29
+++ proprietary/po/malware-cars.ru.po   13 Mar 2019 11:00:59 -0000      1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2018-09-27 04:21-0500\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -99,6 +100,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/nl.po        11 Mar 2019 10:02:10 -0000      1.48
+++ proprietary/po/nl.po        13 Mar 2019 11:00:59 -0000      1.49
@@ -2690,6 +2690,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/pl.po        11 Mar 2019 10:02:10 -0000      1.48
+++ proprietary/po/pl.po        13 Mar 2019 11:00:59 -0000      1.49
@@ -2258,6 +2258,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/pot  11 Mar 2019 10:02:10 -0000      1.48
+++ proprietary/po/pot  13 Mar 2019 11:00:59 -0000      1.49
@@ -2113,6 +2113,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-surveillance.de-diff.html        9 Mar 2019 
17:02:55 -0000       1.53
+++ proprietary/po/proprietary-surveillance.de-diff.html        13 Mar 2019 
11:00:59 -0000      1.54
@@ -2094,25 +2094,16 @@
   &lt;li id="M201702060"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</em></ins></span> that <span 
class="removed"><del><strong>the specific sabotage method Lenovo used 
did</strong></del></span> <span class="inserted"><ins><em>is viewed on them, 
and</em></ins></span> not <span class="removed"><del><strong>affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>just broadcasts and
-    cable&lt;/a&gt;. Even if the image</em></ins></span> is <span 
class="inserted"><ins><em>coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were</em></ins></span> not <span 
class="removed"><del><strong>really
+    report everything</em></ins></span> that <span 
class="removed"><del><strong>the specific sabotage method Lenovo used did not 
affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
is <span class="inserted"><ins><em>viewed on them, and</em></ins></span> not 
<span class="removed"><del><strong>really
 clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>hidden as it 
was</em></ins></span> in <span class="removed"><del><strong>its own 
malware&lt;/a&gt;.
+puts in its</strong></del></span> <span class="inserted"><ins><em>just 
broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the 
user's</em></ins></span> own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>be picked up by 
proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2122,33 +2113,20 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>other 
devices in range so as to determine that they
-    are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers</em></ins></span> 
can <span class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
-    across devices.&lt;/p&gt;
-
-    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off, but having</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>computer,</em></ins></span>
+    the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>TV reports what 
it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>a way to disable the
+    surveillance, even if</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2157,410 +2135,437 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>were not hidden as it was</em></ins></span> in <span 
class="removed"><del><strong>Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
-    already monitors. Tivo customers are unaware they're
-    being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span 
class="removed"><del><strong>place</strong></del></span> new <span 
class="removed"><del><strong>items on top under each subsection --&gt;
+
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>be picked up by proprietary malware 
running</em></ins></span>
+    on <span class="removed"><del><strong>The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</strong></del></span> 
<span class="inserted"><ins><em>combined surveillance by default.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even</em></ins></span> if <span 
class="removed"><del><strong>its manufacturer can communicate with it,
-      is</strong></del></span> <span class="inserted"><ins><em>it 
isn't</em></ins></span> a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its 
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as 
to determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>communicate</strong></del></span> <span 
class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="removed"><del><strong>it,
+      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>Web activity, and other</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
     &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>the fact
-      that the device is tethered</strong></del></span> <span 
class="inserted"><ins><em>what programs people watch, and even what they 
wanted</em></ins></span> to
-    <span class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+  &lt;li id="M201511060"&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers in spying</em></ins></span> on <span 
class="removed"><del><strong>the fact</strong></del></span> <span 
class="inserted"><ins><em>their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="removed"><del><strong>the device</strong></del></span> <span 
class="inserted"><ins><em>advertisers can track you
+    across devices.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo; to make its TVs snoop 
on what
-    users watch&lt;/a&gt;.  The TVs did not do</em></ins></span> that <span 
class="removed"><del><strong>the device gives the company
-      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>when first sold.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>turn 
this off, but having</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  &lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>600 millions social 
media profiles</em></ins></span> the company
+    <span class="inserted"><ins><em>already monitors. Tivo customers are 
unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to</em></ins></span> 
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>US or some
-    other government.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span>
 
-    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>using it</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are</em></ins></span> watching&lt;/a&gt;, <span 
class="removed"><del><strong>even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span> 
<span class="inserted"><ins><em>be trusted unless it is done by free
-    software</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
+    and</strong></del></span> <span class="inserted"><ins><em>even if it isn't 
a TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
+    snoops on <span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch, and</em></ins></span> even <span 
class="removed"><del><strong>which page the user reads at</strong></del></span> 
what <span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span class="inserted"><ins><em>they 
wanted</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software in the car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
+    modem enables the phone company to track the car's movements all
+    the time; it is possible to physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>when first sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
-      Kindle:</strong></del></span>
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
+    Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> <span class="inserted"><ins><em>US or 
some</em></ins></span>
+    other
+      <span class="removed"><del><strong>cases mentioned 
are</strong></del></span> <span class="inserted"><ins><em>government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not to be trusted unless it 
is</em></ins></span> done by <span class="removed"><del><strong>proprietary 
malware</strong></del></span> <span class="inserted"><ins><em>free
+    software</em></ins></span> in <span class="removed"><del><strong>the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to 
extract</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span class="removed"><del><strong>user 
reads at what</strong></del></span> time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</em></ins></span>
+    data <span class="removed"><del><strong>remotely and
+      determine</strong></del></span> <span 
class="inserted"><ins><em>containing sensitive information will be transmitted 
to third
+    parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
+  &lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The report was as of 2014,</em></ins></span> but <span 
class="removed"><del><strong>if the state orders it</strong></del></span> <span 
class="inserted"><ins><em>we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>get users' 
formal
-    consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to get 
<span class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>users' formal
+    consent before collecting personal</em></ins></span> data
+      <span class="removed"><del><strong>and hand it 
over,</strong></del></span> <span class="inserted"><ins><em>are totally 
inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>state can store it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>tracking, the TV 
will not
+  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; 
products</strong></del></span> <span class="inserted"><ins><em>tracking, the TV 
will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs</em></ins></span> are
-  <span class="removed"><del><strong>&lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
+        <span class="removed"><del><strong>designed &lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen</strong></del></span> <span class="inserted"><ins><em>not 
allowed</em></ins></span> to <span 
class="removed"><del><strong>everyone</strong></del></span> <span 
class="inserted"><ins><em>report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy to do because</strong></del></span> the <span 
class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>switch to turn this off</em></ins></span> has
-    no <span class="removed"><del><strong>authentication when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>effect&lt;/a&gt;.  (The fact</em></ins></span> that 
<span class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>transmission reports a 404 error
-    really</em></ins></span> means <span class="removed"><del><strong>it 
demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>user watches, and the switch to turn this off has
+    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables the phone company to track</strong></del></span> <span 
class="inserted"><ins><em>nothing;</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
+    &lt;p&gt;Today's technological practice does not include any way of
+    making</strong></del></span> <span class="inserted"><ins><em>transmission 
reports</em></ins></span> a <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>404 error
+    really means nothing; the server could save</em></ins></span> that <span 
class="removed"><del><strong>can obey your voice commands without
+    potentially spying on you.  Even if</strong></del></span> <span 
class="inserted"><ins><em>data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>is air-gapped,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span> <span 
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
-    product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
+    product</em></ins></span> could <span class="removed"><del><strong>be
+    saving up records about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span> <span class="inserted"><ins><em>spy this 
way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots</em></ins></span> of <span class="removed"><del><strong>data about 
the user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span> <span 
class="inserted"><ins><em>id="M201212170"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span> <span class="inserted"><ins><em>break 
security on</em></ins></span> a <span class="removed"><del><strong>matter of 
proprietary surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>use its camera to watch</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned</strong></del></span> <span 
class="inserted"><ins><em>people who</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>watching TV.&lt;/p&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
     &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
     
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>video they capture</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
+    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>car's location</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone that comes near, or merely
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
     passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look</em></ins></span>
-    at <span class="removed"><del><strong>any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information,</strong></del></span> <span 
class="inserted"><ins><em>the videos freely.  It appears Amazon has tried to 
prevent that
-    secondary abuse,</em></ins></span> but <span 
class="removed"><del><strong>if</strong></del></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
+    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>how Ring used to let individual employees look
+    at</em></ins></span> the <span class="removed"><del><strong>other 
way.&rdquo; Evidently</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent</em></ins></span> that <span class="removed"><del><strong>was
+before</strong></del></span>
+    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of</em></ins></span> everything 
<span class="inserted"><ins><em>they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in the videos. That's not
-    security for your home. Security means making sure they 
don't</em></ins></span> get <span class="inserted"><ins><em>to
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs</em></ins></span> that <span class="inserted"><ins><em>allow 
anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</em></ins></span> is 
<span class="removed"><del><strong>viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming 
from</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>data
-      and hand</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+    even when</em></ins></span> the <span class="removed"><del><strong>user's 
own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it
-    to outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>is. The existence of a way</strong></del></span>
+    to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
-
-
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; products are
-        designed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-        listen</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes</em></ins></span> to <span 
class="removed"><del><strong>everyone in</strong></del></span> the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
-    into one.&lt;/p&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not 
hidden</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> as <span 
class="inserted"><ins><em>shipped doesn't act as a
+    listening device, remote changes to the code could surely 
convert</em></ins></span> it
+    <span class="inserted"><ins><em>into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
 
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of
-    making</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response:</em></ins></span> a <span 
class="removed"><del><strong>device that can obey your voice commands without
-    potentially spying on you.  Even if it is air-gapped, it could be
-    saving up records</strong></del></span> <span 
class="inserted"><ins><em>labeling
-    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>you for later examination.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span> <span class="inserted"><ins><em>their
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>personal information</em></ins></span> about <span 
class="inserted"><ins><em>how people
+    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="removed"><del><strong>data are totally inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>information 
about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing</em></ins></span> 
the <span class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
+    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>data
-    broker, the data broker would have been able</em></ins></span> to <span 
class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see</strong></del></span> <span 
class="inserted"><ins><em>figure</em></ins></span> out <span 
class="inserted"><ins><em>who</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span class="inserted"><ins><em>company has 
been ordered to pay a total</em></ins></span> of <span 
class="inserted"><ins><em>C$4m&lt;/a&gt; to its
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a way to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less 
all</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="removed"><del><strong>get 
users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>speech 
recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>U.S.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This</em></ins></span> 
would <span class="removed"><del><strong>say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>report 
what
-      the user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV 
manufacturers</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> on 
-      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span class="inserted"><ins><em>a child's speech, 
and even speak into the
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>toys</em></ins></span> with <span 
class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2573,12 +2578,19 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>turn this off, but having it enabled 
by default</strong></del></span> <span class="inserted"><ins><em>snoop on other 
people, DJI</em></ins></span> is <span class="removed"><del><strong>an 
injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    to <span class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is</em></ins></span> in
+      <span class="removed"><del><strong>range so as to determine that they 
are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -2588,79 +2600,87 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
-    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>HP 
servers&lt;/a&gt;</em></ins></span> to <span class="inserted"><ins><em>make 
sure</em></ins></span> the <span class="removed"><del><strong>600 millions 
social media profiles</strong></del></span> <span 
class="inserted"><ins><em>user is still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>subscription,</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible sounds 
to</strong></del></span> <span class="inserted"><ins><em>hasn't printed more 
pages than were
+    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span class="inserted"><ins><em>user is 
still
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>internet to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may</em></ins></span> be
-      <span class="removed"><del><strong>picked up by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>cheaper in some
-    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions</em></ins></span> in
-      <span class="removed"><del><strong>range so</strong></del></span> <span 
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases,</em></ins></span> it <span class="inserted"><ins><em>spies 
on users,</em></ins></span> and <span class="inserted"><ins><em>involves 
totally unacceptable
+    restrictions in the use of ink cartridges that</em></ins></span> would 
<span class="removed"><del><strong>then have</strong></del></span> <span 
class="inserted"><ins><em>otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    &lt;p&gt;Crackers found a way</em></ins></span> to
+      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+    turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such</em></ins></span> as <span 
class="inserted"><ins><em>China or the US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell the product 
in</em></ins></span> that <span class="removed"><del><strong>they are nearby.  
Once your
-      Internet devices</strong></del></span> <span 
class="inserted"><ins><em>country,
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the US
+    <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span> 
or <span class="removed"><del><strong>some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>cease</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
+    by free software</strong></del></span> <span 
class="inserted"><ins><em>sell the product</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> that <span class="inserted"><ins><em>country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>probably 
hackers too, but please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive information will be 
transmitted</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo;</em></ins></span> to
+      <span class="removed"><del><strong>third 
parties&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people</strong></del></span>
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what 
the</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its</em></ins></span> 
user <span class="removed"><del><strong>watches, and</strong></del></span> 
<span class="inserted"><ins><em>by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products</em></ins></span> are <span 
class="removed"><del><strong>watching&lt;/a&gt;,
-      even</strong></del></span> <span class="inserted"><ins><em>designed &lt;a
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact that</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even</em></ins></span> if it <span 
class="removed"><del><strong>isn't a TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>is 
air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
+    a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
+    on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped,</em></ins></span> it 
<span class="removed"><del><strong>had installed a patch to stop this, but any 
product</strong></del></span> could <span class="removed"><del><strong>spy this 
way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
+    about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data about</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>data about the 
user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>what programs</strong></del></span> <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2674,12 +2694,10 @@
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
+    monitor how often</em></ins></span> people <span 
class="removed"><del><strong>watch, and even</strong></del></span> <span 
class="inserted"><ins><em>wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would then have to
-      give</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="inserted"><ins><em>normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2690,114 +2708,94 @@
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects</em></ins></span> to <span class="removed"><del><strong>the 
US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>not to</strong></del></span> <span 
class="inserted"><ins><em>a back door, but that could</em></ins></span> be 
<span class="removed"><del><strong>trusted unless</strong></del></span> <span 
class="inserted"><ins><em>a
-    misunderstanding.  However,</em></ins></span> it is <span 
class="removed"><del><strong>done
-    by free software in your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that</strong></del></span> <span class="inserted"><ins><em>certainly 
surveillance, at least.&lt;/p&gt;
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-      data containing sensitive information will be 
transmitted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to
-      <span class="removed"><del><strong>third 
parties&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else and to transmit 
conversations
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- #SpywareInGames 
--&gt;</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareInGames"&gt;Spyware in 
Games&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The driver</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory</em></ins></span> for <span 
class="inserted"><ins><em>electric
+    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>certain gaming keyboard</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,</em></ins></span>
+    to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In 
practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>user 
watches, and</strong></del></span> <span class="inserted"><ins><em>choices of 
radio programs&lt;/a&gt; in its
+    tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
     &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for some digital service
+    sneaking it into the contract that</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends 
personal</strong></del></span> <span class="inserted"><ins><em>sign for some 
digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>turn this off 
has no effect.  (The fact that the
-      transmission reports a 404 error</strong></del></span> <span 
class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you</em></ins></span> really <span 
class="removed"><del><strong>means nothing;</strong></del></span> <span 
class="inserted"><ins><em>want to be safe, we must make sure</em></ins></span> 
the <span class="removed"><del><strong>server
-      could save</strong></del></span> <span class="inserted"><ins><em>car's
-    hardware cannot collect any of that data, or</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>about them</strong></del></span> <span 
class="inserted"><ins><em>collection should be forbidden.&lt;/p&gt;
 
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But if you really want</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that 
data.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can &lt;a
-    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;!-- #SpywareInGames --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized cars with nonfree software are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
-        to China&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
+  &lt;li id="M201602240"&gt;
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>make changes in 
various
+    cell phone modem which allows effectively anyone to &lt;a
+    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span> <span class="inserted"><ins><em>do because 
the system has no authentication
-    when accessed through the modem.  However, even if it 
asked</em></ins></span>
-    for <span class="removed"><del><strong>companies, 
and</strong></del></span> <span class="inserted"><ins><em>authentication, you 
couldn't be confident that Nissan
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
     has no access.  The software in the car is proprietary, &lt;a
     href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
@@ -3292,7 +3290,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/13 11:00:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.268
retrieving revision 1.269
diff -u -b -r1.268 -r1.269
--- proprietary/po/proprietary-surveillance.de.po       9 Mar 2019 17:02:56 
-0000       1.268
+++ proprietary/po/proprietary-surveillance.de.po       13 Mar 2019 11:00:59 
-0000      1.269
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -4065,6 +4065,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.390
retrieving revision 1.391
diff -u -b -r1.390 -r1.391
--- proprietary/po/proprietary-surveillance.fr.po       9 Mar 2019 18:22:39 
-0000       1.390
+++ proprietary/po/proprietary-surveillance.fr.po       13 Mar 2019 11:00:59 
-0000      1.391
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2019-03-09 19:16+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3448,6 +3449,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/proprietary-surveillance.it-diff.html        9 Mar 2019 
17:02:56 -0000       1.120
+++ proprietary/po/proprietary-surveillance.it-diff.html        13 Mar 2019 
11:00:59 -0000      1.121
@@ -1131,245 +1131,114 @@
     &lt;p&gt;This illustrates that making unauthorized copies of 
nonfree</em></ins></span> software <span class="removed"><del><strong>industry 
towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    is <span class="removed"><del><strong>doing this in</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>cure</em></ins></span> for <span 
class="removed"><del><strong>children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>is not a cure for the injustice of nonfree 
software. It may avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company, and perhaps by the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending personal data to</strong></del></span> the <span 
class="removed"><del><strong>app developer</strong></del></span> <span 
class="inserted"><ins><em>nasty thing,</em></ins></span> but <span 
class="removed"><del><strong>did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>cannot make</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This shows the
-      weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
-    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends</strong></del></span>
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
+    apps the user has
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span 
class="removed"><del><strong>i-Que</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit 
-      <span class="removed"><del><strong>&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
+    <span class="inserted"><ins><em>way</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
+    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android</em></ins></span> apps 
<span class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking</em></ins></span> by
-      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
     
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="inserted"><ins><em>take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>snooping 
done by the phone company, and perhaps by</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps</em></ins></span> have
-      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt;</em></ins></span> in <span 
class="inserted"><ins><em>interacting with</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span>
-    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used 
to</em></ins></span>
+    be <span class="removed"><del><strong>distracted by the 
question</strong></del></span> <span class="inserted"><ins><em>on Google Play 
had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
-    the user <span class="removed"><del><strong>was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>interface of most of them was 
designed</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there</em></ins></span> is no <span class="removed"><del><strong>excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
 <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play</em></ins></span> found <span 
class="removed"><del><strong>a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; 
due</em></ins></span> to <span class="removed"><del><strong>place new items on 
top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>DNS leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users. Other 
technical flaws were
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="inserted"><ins><em>&lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>not 
really
-clean since</strong></del></span> <span class="inserted"><ins><em>unfortunate 
that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+  &lt;li id="M201901050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>what it will do
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do
     with the data.&lt;/p&gt;
 
     &lt;p&gt;I think that lawsuit is about a side issue. What the company does
@@ -1383,75 +1252,34 @@
   &lt;/li&gt;
 
   &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span> <span 
class="inserted"><ins><em>send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    report on the user's actions</em></ins></span> to
+      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>obtains from the same machine via
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the</em></ins></span> data <span 
class="inserted"><ins><em>it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the app; others only say that the user is
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    account.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>Android</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location</em></ins></span> even when <span 
class="inserted"><ins><em>users disable &ldquo;location
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>other kinds of location
+    &lt;p&gt;There are other ways to turn off the other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2044,35 +1872,74 @@
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    users</em></ins></span> to <span class="removed"><del><strong>the app 
developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people are watching&lt;/a&gt;, even if</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This shows the
+      weakness of the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>even what they 
wanted</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information</strong></del></span> <span 
class="inserted"><ins><em>make its TVs snoop</em></ins></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>what
+    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Samsung &ldquo;Smart&rdquo; TV</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet</em></ins></span> to <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.</em></ins></span>
+    Nuance <span class="removed"><del><strong>Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
-  &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>and would 
then have to give it to the US or some
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> can <span class="removed"><del><strong>remotely 
control the toys with a mobile phone. This</strong></del></span> <span 
class="inserted"><ins><em>save it and</em></ins></span> would
+      <span class="removed"><del><strong>enable crackers</strong></del></span> 
<span class="inserted"><ins><em>then have to give it</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's speech, and even speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>US 
or some
     other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
@@ -2081,178 +1948,255 @@
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;
+    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
+    snooping <span class="removed"><del><strong>on its users 
through</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>TVs &lt;a
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    &lt;p&gt;The <span class="removed"><del><strong>app</strong></del></span> 
<span class="inserted"><ins><em>report</em></ins></span> was <span 
class="removed"><del><strong>reporting the temperature</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't 
expect this has got
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>make statements about
+      their products, rather than free software which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span> 
the <span class="removed"><del><strong>vibrator</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really</em></ins></span> means <span 
class="inserted"><ins><em>nothing;</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span class="removed"><del><strong>data 
may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>user watches, and</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data <span 
class="removed"><del><strong>broker would have been able to figure out
+      who</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    product could spy</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212170"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers</em></ins></span> found a way to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span class="inserted"><ins><em>break 
security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
+&lt;li&gt;&lt;p&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
 <span class="inserted"><ins><em>video</em></ins></span> they <span 
class="removed"><del><strong>report even</strong></del></span> <span 
class="inserted"><ins><em>capture to Amazon 
servers&lt;/a&gt;,</em></ins></span> which <span 
class="removed"><del><strong>page</strong></del></span> <span 
class="inserted"><ins><em>save it
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>video 
shows everyone that comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>e-reader</strong></del></span> <span 
class="inserted"><ins><em>user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used
-      <span class="removed"><del><strong>by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>let 
individual employees look
-    at the videos freely.  It appears Amazon has tried</em></ins></span> to 
<span class="removed"><del><strong>check DRM!&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
+    at <span class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>the videos 
freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication when
-    accessed through</strong></del></span>
+      &lt;p&gt;Specifically,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>modem.  
However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be <span 
class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>a better
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>these
-    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>videos. That's not
-    security for your home. Security</em></ins></span> means <span 
class="removed"><del><strong>it demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not to look at what's in</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
+    security for your home. Security means making sure</em></ins></span> they 
<span class="removed"><del><strong>pass it</strong></del></span> <span 
class="inserted"><ins><em>don't get to
+    see</em></ins></span> through <span 
class="removed"><del><strong>Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>making sure they don't get</em></ins></span> to
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>your camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
 
-  &lt;li id="M201511250"&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>watch 
through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511250"&gt;</em></ins></span>
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
-    to <span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span>
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the</em></ins></span> code <span 
class="removed"><del><strong>snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
     was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
@@ -2260,109 +2204,105 @@
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>their
-    products, rather than free software</em></ins></span> which <span 
class="removed"><del><strong>is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>users could 
have checked</em></ins></span>
-    and
-      <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article, is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>company that made the vibrator &lt;a
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
+
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data 
may</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems,</strong></del></span>
-    <span class="inserted"><ins><em>true,</em></ins></span> but <span 
class="inserted"><ins><em>it doesn't really matter. If it had 
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>data to a data
-    broker,</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the company <span class="inserted"><ins><em>has been ordered to pay a 
total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the data to a data
+    broker,</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the
+    user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed</strong></del></span> <span class="inserted"><ins><em>pay a total 
of C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>access</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and the FBI could 
listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>listen in on a child's speech, and even speak 
into</em></ins></span> the <span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and
+      <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2373,146 +2313,179 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
+  &lt;li id="M201902080"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>case</strong></del></span> 
<span class="inserted"><ins><em>HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
-    computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
+      really</strong></del></span>
+    <span class="inserted"><ins><em>working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a way to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon 
device,
-    and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
+      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
+    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
-    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance</em></ins></span> company <span 
class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
+  &lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the <span 
class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device that</em></ins></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="inserted"><ins><em>everyone 
in</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially 
spying</em></ins></span>
+    on <span class="removed"><del><strong>top under each subsection --&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span class="removed"><del><strong>now 
&lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds 
to</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
-    on you.  Even if it is air-gapped, it could</em></ins></span> be
-      <span class="removed"><del><strong>picked</strong></del></span> <span 
class="inserted"><ins><em>saving</em></ins></span> up <span 
class="removed"><del><strong>by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>records
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped, it could be saving up 
records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201310260"&gt;
-    &lt;p&gt;&lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a</em></ins></span>
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
-      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable the surveillance, even if it were not hidden as it was in
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
-    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
+    monitor every aspect of</em></ins></span> what
+      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
+    that <span class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and</strong></del></span> <span 
class="inserted"><ins><em>watch is designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
+    to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else</em></ins></span> 
and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> to <span class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so as</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2521,18 +2494,35 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
       watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits</strong></del></span>
 <span class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get</em></ins></span> users' <span 
class="removed"><del><strong>voice on the internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
       give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
     sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
       &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
@@ -2588,7 +2578,7 @@
 &lt;li&gt;&lt;p&gt;Users</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized cars with nonfree software</em></ins></span> are 
<span class="removed"><del><strong>suing Bose for</strong></del></span> &lt;a
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree 
software</em></ins></span> are <span class="removed"><del><strong>suing Bose 
for</strong></del></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
 distributing</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
@@ -3060,7 +3050,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/09 17:02:56 $
+$Date: 2019/03/13 11:00:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.281
retrieving revision 1.282
diff -u -b -r1.281 -r1.282
--- proprietary/po/proprietary-surveillance.it.po       9 Mar 2019 17:02:56 
-0000       1.281
+++ proprietary/po/proprietary-surveillance.it.po       13 Mar 2019 11:00:59 
-0000      1.282
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3820,6 +3820,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary/po/proprietary-surveillance.ja-diff.html        9 Mar 2019 
17:02:56 -0000       1.130
+++ proprietary/po/proprietary-surveillance.ja-diff.html        13 Mar 2019 
11:00:59 -0000      1.131
@@ -1272,98 +1272,47 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
+      &lt;p&gt;Specifically,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
     the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop
-    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>manufacturer is 
using it</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were 
found to snoop
+    and collect information about its users&lt;/a&gt;.  40%</em></ins></span> 
of <span class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span class="inserted"><ins><em>the 
apps were
+    found to insecurely snitch on its users.  Furthermore,</em></ins></span> 
they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span> 
<span class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, 
they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
@@ -1392,7 +1341,7 @@
 
   &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers</em></ins></span> 
can <span class="removed"><del><strong>contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
@@ -1417,8 +1366,8 @@
     discovering what they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and
-    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice of their being
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
@@ -1995,87 +1944,86 @@
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;</em></ins></span>
-    snoops on <span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>other 
devices on</em></ins></span> the <span class="removed"><del><strong>e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Even worse, it &lt;a
+    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do</em></ins></span> lots of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>break 
security on a &ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone 
modem</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;,</em></ins></span> 
which <span class="removed"><del><strong>allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>save it
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
     passes by, the user's front door.&lt;/p&gt;
 
-    &lt;p&gt;The article focuses on how Ring used</em></ins></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look
-    at</em></ins></span> the <span 
class="removed"><del><strong>system</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon</em></ins></span> 
has <span class="removed"><del><strong>no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>tried to prevent that
-    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if it asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
-    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; 
would</em></ins></span> be <span 
class="removed"><del><strong>confident</strong></del></span> <span 
class="inserted"><ins><em>a better
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>Nissan has no
-    access.  The software</strong></del></span> <span 
class="inserted"><ins><em>these
-    manufacturers promise not to look at what's</em></ins></span> in the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
@@ -2084,263 +2032,288 @@
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+  &lt;li id="M201511250"&gt;</em></ins></span>
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device</em></ins></span> means <span 
class="inserted"><ins><em>the manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span>
-    to <span class="inserted"><ins><em>outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device, remote changes</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert</em></ins></span> it <span 
class="removed"><del><strong>is possible</strong></del></span>
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>make &lt;a
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the</em></ins></span> proprietary <span 
class="removed"><del><strong>surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>control app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> the <span 
class="removed"><del><strong>invasion isn't done</strong></del></span> <span 
class="inserted"><ins><em>vibrator minute</em></ins></span> by <span 
class="removed"><del><strong>malware. The other
-      cases mentioned are done</strong></del></span>
-    <span class="inserted"><ins><em>minute (thus, indirectly, whether it was 
surrounded</em></ins></span> by <span class="removed"><del><strong>proprietary 
malware in</strong></del></span> <span class="inserted"><ins><em>a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response: a labeling
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have 
checked</em></ins></span>
-    and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
+    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
+    and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span>
+    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If</em></ins></span> it <span 
class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>had sold</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>a data
-    broker,</em></ins></span> the data
-      <span class="removed"><del><strong>and hand it 
over,</strong></del></span> <span class="inserted"><ins><em>broker would have 
been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
+    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> <span class="inserted"><ins><em>was 
anonymizing</em></ins></span> the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>data 
may be
+    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>time; it 
is possible</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Proprietary software in cars</strong></del></span>
     <span class="inserted"><ins><em>user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
-    customers.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span 
class="inserted"><ins><em>pay</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>total</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be 
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m&lt;/a&gt; 
to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>access the data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>FBI could listen to 
these
-    conversations</em></ins></span> was
-<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all</strong></del></span> <span 
class="inserted"><ins><em>unacceptable by itself.&lt;/p&gt;
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="removed"><del><strong>get 
users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>speech 
recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>U.S.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
+    company <span class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This</em></ins></span> 
would <span class="removed"><del><strong>say that TVs are not 
allowed</strong></del></span> <span class="inserted"><ins><em>enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>report 
what</strong></del></span> <span class="inserted"><ins><em>listen in on a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201502180"&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>step further than</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
-    to snoop on</em></ins></span> other <span class="removed"><del><strong>TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>people, DJI 
is</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on 
-      <span class="removed"><del><strong>their users: 
their</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>make sure the user is still
+    paying for the subscription,</em></ins></span> and
+<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>detail</strong></del></span> <span 
class="inserted"><ins><em>some
-    specific cases, it spies on users,</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>involves totally 
unacceptable
-    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be in
+    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
+    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>break the security of an Amazon device,
-    and &lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;</em></ins></span>
-    turn <span class="removed"><del><strong>this off, but 
having</strong></del></span> it <span class="removed"><del><strong>enabled by 
default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>into a 
listening device&lt;/a&gt; for them.&lt;/p&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>company already
-      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>other devices in
-      range so as</strong></del></span> <span class="inserted"><ins><em>its 
user by
+    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
     sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>everyone in the house, all the 
time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span class="removed"><del><strong>they 
are nearby.  Once your
-      Internet devices are paired with your TV, 
advertisers</strong></del></span> can
-      <span class="removed"><del><strong>correlate ads with Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>obey your 
voice commands without potentially spying
-    on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
+    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
+  &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2352,13 +2325,14 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
-    &lt;p&gt;Tommy Hilfiger clothing</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often</em></ins></span> people <span 
class="removed"><del><strong>are watching&lt;/a&gt;,
-      even if</strong></del></span> <span class="inserted"><ins><em>wear 
it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This will teach the sheeple to find</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>normal that companies
-    monitor every aspect of what they do.&lt;/p&gt;
+    &lt;p&gt;Tommy Hilfiger clothing &lt;a
+    
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2367,24 +2341,24 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>back door, but that could be a
+    &lt;p&gt;The article says this is a back door, but that could be a
     misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
+    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and</strong></del></span> <span 
class="inserted"><ins><em>watch is designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to report its location to someone else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2393,7 +2367,22 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201810230"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
+    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
     &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
     tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
@@ -2424,7 +2413,7 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized cars with nonfree software are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
       LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
@@ -2888,7 +2877,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/09 17:02:56 $
+$Date: 2019/03/13 11:00:59 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.254
retrieving revision 1.255
diff -u -b -r1.254 -r1.255
--- proprietary/po/proprietary-surveillance.ja.po       9 Mar 2019 17:02:56 
-0000       1.254
+++ proprietary/po/proprietary-surveillance.ja.po       13 Mar 2019 11:00:59 
-0000      1.255
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3234,6 +3234,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.202
retrieving revision 1.203
diff -u -b -r1.202 -r1.203
--- proprietary/po/proprietary-surveillance.pot 9 Mar 2019 17:02:56 -0000       
1.202
+++ proprietary/po/proprietary-surveillance.pot 13 Mar 2019 11:00:59 -0000      
1.203
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2363,6 +2363,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a "
+"href=\"/proprietary/proprietary-surveillance.html#car-spying\"> "
+"manufacturers collect this data</a> as part of their own spying, then "
+"forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.487
retrieving revision 1.488
diff -u -b -r1.487 -r1.488
--- proprietary/po/proprietary-surveillance.ru.po       9 Mar 2019 18:05:21 
-0000       1.487
+++ proprietary/po/proprietary-surveillance.ru.po       13 Mar 2019 11:00:59 
-0000      1.488
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3408,6 +3409,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary.de-diff.html     11 Mar 2019 10:02:10 -0000      
1.61
+++ proprietary/po/proprietary.de-diff.html     13 Mar 2019 11:01:00 -0000      
1.62
@@ -45,10 +45,10 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -125,19 +125,19 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903080"&gt;
     &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
     
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
@@ -272,25 +283,6 @@
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -351,7 +343,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary.de.po    11 Mar 2019 10:02:10 -0000      1.103
+++ proprietary/po/proprietary.de.po    13 Mar 2019 11:01:00 -0000      1.104
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -563,27 +573,6 @@
 "watch</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/proprietary.es.po    11 Mar 2019 10:30:48 -0000      1.120
+++ proprietary/po/proprietary.es.po    13 Mar 2019 11:01:00 -0000      1.121
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -298,6 +299,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -490,42 +501,6 @@
 "que <a href=\"/proprietary/proprietary-surveillance.html#M201901100\">le "
 "permite observar</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"La base de datos AppCensus ofrece información de <a href=\"https://www.";
-"appcensus.mobi\">cómo las aplicaciones de Android usan y abusan de los datos 
"
-"personales del usuario</a>. Hasta marzo de 2019, se habían analizado casi "
-"78.000, de las cuales 24.000 (el 31%) transmitían el <a href=\"/proprietary/"
-"proprietary-surveillance.html#M201812290\">identificador publicitario</a> a "
-"otras compañías, y <a href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-";
-"behaving-badly/\">18.000 (el 23% del total) enlazaban este identificador con "
-"identificadores de hardware</a>, de modo que los usuarios no podían evitar "
-"el rastreo reiniciándolo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"Recoger identificadores de hardware constituye una clara violación de las "
-"políticas de Google. Parece que Google no estaba enterada de ello, pero una "
-"vez informada tampoco se dio mucha prisa en actuar. Esto da prueba de que "
-"las políticas de una plataforma de desarrollo son ineficaces para evitar que 
"
-"los desarrolladores de software no libre incluyan software malicioso en sus "
-"programas."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -605,6 +580,41 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www.";
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "La base de datos AppCensus ofrece información de <a href=\"https://www.";
+#~ "appcensus.mobi\">cómo las aplicaciones de Android usan y abusan de los "
+#~ "datos personales del usuario</a>. Hasta marzo de 2019, se habían "
+#~ "analizado casi 78.000, de las cuales 24.000 (el 31%) transmitían el <a "
+#~ "href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\">identificador publicitario</a> a otras compañías, y <a 
"
+#~ "href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/";
+#~ "\">18.000 (el 23% del total) enlazaban este identificador con "
+#~ "identificadores de hardware</a>, de modo que los usuarios no podían "
+#~ "evitar el rastreo reiniciándolo."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "Recoger identificadores de hardware constituye una clara violación de las 
"
+#~ "políticas de Google. Parece que Google no estaba enterada de ello, pero "
+#~ "una vez informada tampoco se dio mucha prisa en actuar. Esto da prueba de "
+#~ "que las políticas de una plataforma de desarrollo son ineficaces para "
+#~ "evitar que los desarrolladores de software no libre incluyan software "
+#~ "malicioso en sus programas."
+
+#~ msgid ""
 #~ "Facebook offered a convenient proprietary library for building mobile "
 #~ "apps, which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 #~ "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary/po/proprietary.fr.po    11 Mar 2019 10:33:05 -0000      1.147
+++ proprietary/po/proprietary.fr.po    13 Mar 2019 11:01:00 -0000      1.148
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2019-03-11 11:32+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -488,41 +499,6 @@
 "proprietary-surveillance.html#M201901100\">lui permet, à elle, de regarder</"
 "a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"La base de données AppCensus donne des informations sur <a href=\"https://";
-"www.appcensus.mobi\">la manière dont chacune des applis Android use et abuse 
"
-"des données personnelles de l'utilisateur</a>. Actuellement (en mars 2019), "
-"près de 78 000 applis ont été analysées, parmi lesquelles 24 000 (31%) "
-"transmettent l'<a href=\"/proprietary/proprietary-surveillance."
-"html#M201812290\">identifiant publicitaire</a> à des sociétés tierces et "
-"18 000 (23% du total) l'associent à des identifiants de l'appareil pour que 
"
-"les utilisateurs ne puissent pas échapper au ciblage en le réinitialisant."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"La collecte des identifiants de l'appareil viole apparemment les règles "
-"édictées par Google. Mais il semble que Google ne s'en soit pas rendu 
compte "
-"et que, une fois informée, elle n'ait montré aucun empressement à prendre "
-"les mesures voulues. Cela prouve que les règles d'une plateforme de "
-"développement sont incapables d'empêcher les développeurs de logiciel non "
-"libre d'ajouter des fonctions malveillantes à leurs programmes."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -596,3 +572,37 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www.";
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "La base de données AppCensus donne des informations sur <a 
href=\"https://";
+#~ "www.appcensus.mobi\">la manière dont chacune des applis Android use et "
+#~ "abuse des données personnelles de l'utilisateur</a>. Actuellement (en "
+#~ "mars 2019), près de 78 000 applis ont été analysées, parmi lesquelles 
"
+#~ "24 000 (31%) transmettent l'<a href=\"/proprietary/proprietary-"
+#~ "surveillance.html#M201812290\">identifiant publicitaire</a> à des "
+#~ "sociétés tierces et 18 000 (23% du total) l'associent à des 
identifiants "
+#~ "de l'appareil pour que les utilisateurs ne puissent pas échapper au "
+#~ "ciblage en le réinitialisant."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "La collecte des identifiants de l'appareil viole apparemment les règles "
+#~ "édictées par Google. Mais il semble que Google ne s'en soit pas rendu "
+#~ "compte et que, une fois informée, elle n'ait montré aucun empressement à
 "
+#~ "prendre les mesures voulues. Cela prouve que les règles d'une plateforme "
+#~ "de développement sont incapables d'empêcher les développeurs de 
logiciel "
+#~ "non libre d'ajouter des fonctions malveillantes à leurs programmes."

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary.it-diff.html     11 Mar 2019 10:02:10 -0000      
1.73
+++ proprietary/po/proprietary.it-diff.html     13 Mar 2019 11:01:00 -0000      
1.74
@@ -46,13 +46,13 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -184,6 +184,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903080"&gt;
     &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
     
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
@@ -271,25 +282,6 @@
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -350,7 +342,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary/po/proprietary.it.po    11 Mar 2019 10:02:10 -0000      1.112
+++ proprietary/po/proprietary.it.po    13 Mar 2019 11:01:00 -0000      1.113
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -567,27 +577,6 @@
 "watch</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary.ja-diff.html     11 Mar 2019 10:02:10 -0000      
1.74
+++ proprietary/po/proprietary.ja-diff.html     13 Mar 2019 11:01:00 -0000      
1.75
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -157,10 +157,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -181,6 +181,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903080"&gt;
     &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
     
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
@@ -268,25 +279,6 @@
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -347,7 +339,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/proprietary.ja.po    11 Mar 2019 10:02:10 -0000      1.95
+++ proprietary/po/proprietary.ja.po    13 Mar 2019 11:01:00 -0000      1.96
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -487,27 +497,6 @@
 "watch</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary.nl-diff.html     11 Mar 2019 10:02:10 -0000      
1.73
+++ proprietary/po/proprietary.nl-diff.html     13 Mar 2019 11:01:00 -0000      
1.74
@@ -46,13 +46,13 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -184,6 +184,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903080"&gt;
     &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
     
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
@@ -271,25 +282,6 @@
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -350,7 +342,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary.nl.po    11 Mar 2019 10:02:10 -0000      1.84
+++ proprietary/po/proprietary.nl.po    13 Mar 2019 11:01:00 -0000      1.85
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -560,27 +570,6 @@
 "watch</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary.pl-diff.html     11 Mar 2019 10:02:10 -0000      
1.91
+++ proprietary/po/proprietary.pl-diff.html     13 Mar 2019 11:01:00 -0000      
1.92
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903080"&gt;
     &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
     
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
@@ -269,25 +280,6 @@
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -348,7 +340,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/proprietary.pl.po    11 Mar 2019 10:02:10 -0000      1.79
+++ proprietary/po/proprietary.pl.po    13 Mar 2019 11:01:00 -0000      1.80
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -642,27 +652,6 @@
 "watch</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/proprietary.pot      11 Mar 2019 10:02:10 -0000      1.76
+++ proprietary/po/proprietary.pot      13 Mar 2019 11:01:00 -0000      1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a "
+"href=\"/proprietary/proprietary-surveillance.html#car-spying\"> "
+"manufacturers collect this data</a> as part of their own spying, then "
+"forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a "
 
"href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find\";>
 "
 "use the disk itself as a microphone to detect speech</a>."
@@ -375,28 +386,6 @@
 "to watch</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a "
-"href=\"https://www.appcensus.mobi\";> how Android apps use and misuse users' "
-"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
-"which 24,000 (31%) transmit the <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
-"ID</a> to other companies, and <a "
-"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> "
-"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
-"users cannot escape tracking by resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/proprietary.pt-br.po 12 Mar 2019 14:31:29 -0000      1.107
+++ proprietary/po/proprietary.pt-br.po 13 Mar 2019 11:01:00 -0000      1.108
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2019-03-12 09:30-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -292,6 +293,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -482,41 +493,6 @@
 "design que <a href=\"/proprietary/proprietary-surveillance."
 "html#M201901100\"> permite que a Amazon assista</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"O banco de dados do AppCensus fornece informações sobre <a href=\"https://";
-"www.appcensus.mobi\"> como os aplicativos de Android usam e fazem mau uso "
-"dos dados pessoais dos usuários</a>. Até março de 2019, quase 78.000 foram 
"
-"analisados, dos quais 24.000 (31%) transmitem o <a href=\"/proprietary/"
-"proprietary-surveillance.html#M201812290\"> <i lang=\"en\">Advertising ID</"
-"i></a> para outras empresas e <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18.000 (23% do total) vinculam "
-"esse ID a identificadores de hardware</a>, para que os usuários não possam "
-"escapar do rastreamento redefinindo-o."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"A coleta de identificadores de hardware está em aparente violação das "
-"políticas do Google. Mas parece que o Google não estava ciente disso e, uma 
"
-"vez informada, não estava com pressa de agir. Isso prova que as políticas 
de "
-"uma plataforma de desenvolvimento são ineficazes para evitar que "
-"desenvolvedores de software não livres incluam malware em seus programas."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -592,6 +568,40 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www.";
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "O banco de dados do AppCensus fornece informações sobre <a 
href=\"https://";
+#~ "www.appcensus.mobi\"> como os aplicativos de Android usam e fazem mau uso "
+#~ "dos dados pessoais dos usuários</a>. Até março de 2019, quase 78.000 "
+#~ "foram analisados, dos quais 24.000 (31%) transmitem o <a href=\"/"
+#~ "proprietary/proprietary-surveillance.html#M201812290\"> <i lang=\"en"
+#~ "\">Advertising ID</i></a> para outras empresas e <a href=\"https://blog.";
+#~ "appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18.000 (23% do total) "
+#~ "vinculam esse ID a identificadores de hardware</a>, para que os usuários "
+#~ "não possam escapar do rastreamento redefinindo-o."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "A coleta de identificadores de hardware está em aparente violação das "
+#~ "políticas do Google. Mas parece que o Google não estava ciente disso e, "
+#~ "uma vez informada, não estava com pressa de agir. Isso prova que as "
+#~ "políticas de uma plataforma de desenvolvimento são ineficazes para 
evitar "
+#~ "que desenvolvedores de software não livres incluam malware em seus "
+#~ "programas."
+
+#~ msgid ""
 #~ "On-line gambling services (and their nonfree client programs) are <a href="
 #~ "\"https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-";
 #~ "dangerous-than-fobts-study-finds\"> designed to be addictive</a>, much "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary/po/proprietary.ru.po    11 Mar 2019 11:31:53 -0000      1.181
+++ proprietary/po/proprietary.ru.po    13 Mar 2019 11:01:00 -0000      1.182
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-13 10:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -489,41 +500,6 @@
 "программы, которое <a 
href=\"/proprietary/proprietary-surveillance."
 "html#M201901100\">позволяет Amazon смотреть через 
камеру</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-"База данных AppCensus содержит информацию о 
том, как <a href=\"https://www.";
-"appcensus.mobi\"> приложения Android используют 
персональные данные "
-"пользователей и злоупотребляют ими</a>. На 
март 2019&nbsp;года "
-"проанализировано около 78 тысяч 
приложений, из которых 24 тысячи (31%) <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201812290\">передают
 "
-"рекламный идентификатор</a> в другие 
компании, а <a href=\"https://blog.";
-"appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 тысяч (23% 
всех "
-"приложений) связывают этот идентификатор 
с идентификаторами аппаратуры</a>, "
-"так что сброс идентификатора не позволяет 
пользователям избежать слежки."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-"Сбор аппаратных идентификаторов явно 
нарушает правила Google. Но в Google об "
-"этом как будто не знали, а когда им 
сообщили, они не спешили с ответными "
-"действиями. Это доказывает, что правила 
платформы разработки фактически не "
-"препятствуют разработчикам несвободных 
программ закладывать вредоносные "
-"функции в их программы."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -603,6 +579,40 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The AppCensus database gives information on <a href=\"https://www.";
+#~ "appcensus.mobi\"> how Android apps use and misuse users' personal data</"
+#~ "a>. As of March 2019, nearly 78,000 have been analyzed, of which 24,000 "
+#~ "(31%) transmit the <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201812290\"> Advertising ID</a> to other companies, and <a href="
+#~ "\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> 18,000 "
+#~ "(23% of the total) link this ID to hardware identifiers</a>, so that "
+#~ "users cannot escape tracking by resetting it."
+#~ msgstr ""
+#~ "База данных AppCensus содержит информацию о 
том, как <a href=\"https://";
+#~ "www.appcensus.mobi\"> приложения Android используют 
персональные данные "
+#~ "пользователей и злоупотребляют ими</a>. 
На март 2019&nbsp;года "
+#~ "проанализировано около 78 тысяч 
приложений, из которых 24 тысячи (31%) <a "
+#~ 
"href=\"/proprietary/proprietary-surveillance.html#M201812290\">передают
 "
+#~ "рекламный идентификатор</a> в другие 
компании, а <a href=\"https://blog.";
+#~ "appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 тысяч (23% 
всех "
+#~ "приложений) связывают этот 
идентификатор с идентификаторами 
аппаратуры</"
+#~ "a>, так что сброс идентификатора не 
позволяет пользователям избежать "
+#~ "слежки."
+
+#~ msgid ""
+#~ "Collecting hardware identifiers is in apparent violation of Google's "
+#~ "policies. But it seems that Google wasn't aware of it, and, once "
+#~ "informed, was in no hurry to take action. This proves that the policies "
+#~ "of a development platform are ineffective at preventing nonfree software "
+#~ "developers from including malware in their programs."
+#~ msgstr ""
+#~ "Сбор аппаратных идентификаторов явно 
нарушает правила Google. Но в Google "
+#~ "об этом как будто не знали, а когда им 
сообщили, они не спешили с "
+#~ "ответными действиями. Это доказывает, 
что правила платформы разработки "
+#~ "фактически не препятствуют 
разработчикам несвободных программ 
закладывать "
+#~ "вредоносные функции в их программы."
+
+#~ msgid ""
 #~ "Facebook offered a convenient proprietary library for building mobile "
 #~ "apps, which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 #~ "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/proprietary.zh-tw-diff.html  11 Mar 2019 10:02:10 -0000      
1.51
+++ proprietary/po/proprietary.zh-tw-diff.html  13 Mar 2019 11:01:00 -0000      
1.52
@@ -45,10 +45,10 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -125,19 +125,19 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it is mandatory for electric
+    cars to be equipped with a terminal that &lt;a
+    href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
+    forward it to the government-run platform.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903080"&gt;
     &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
     
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
@@ -272,25 +283,6 @@
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
-
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry to take action. This proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -351,7 +343,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/11 10:02:10 $
+$Date: 2019/03/13 11:01:00 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary.zh-tw.po 11 Mar 2019 10:02:10 -0000      1.62
+++ proprietary/po/proprietary.zh-tw.po 13 Mar 2019 11:01:00 -0000      1.63
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-11 09:56+0000\n"
+"POT-Creation-Date: 2019-03-13 10:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Malware installed into the processor in a hard drive could <a href=\"https://";
 "yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
@@ -476,27 +486,6 @@
 "watch</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The AppCensus database gives information on <a href=\"https://www.appcensus.";
-"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
-"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
-"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
-"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
-"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
-"resetting it."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Collecting hardware identifiers is in apparent violation of Google's "
-"policies. But it seems that Google wasn't aware of it, and, once informed, "
-"was in no hurry to take action. This proves that the policies of a "
-"development platform are ineffective at preventing nonfree software "
-"developers from including malware in their programs."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/pt-br.po     12 Mar 2019 14:31:29 -0000      1.63
+++ proprietary/po/pt-br.po     13 Mar 2019 11:01:00 -0000      1.64
@@ -2286,6 +2286,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/po/ru.po        11 Mar 2019 11:16:37 -0000      1.109
+++ proprietary/po/ru.po        13 Mar 2019 11:01:00 -0000      1.110
@@ -3126,6 +3126,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."
@@ -7182,10 +7192,10 @@
 "listening-devices-researchers-find\"> use the disk itself as a microphone to "
 "detect speech</a>."
 msgstr ""
-"Вредоносные программы, установленные в 
процессоре жесткого диска, могли бы <a 
href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> использовать сам 
диска как микрофон, чтобы "
-"обнаруживать речь</a>."
+"Вредоносные программы, установленные в 
процессоре жесткого диска, могли бы "
+"<a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
+"turned-into-listening-devices-researchers-find\"> использовать 
сам диска как "
+"микрофон, чтобы обнаруживать речь</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -7194,8 +7204,8 @@
 "require changing Linux itself."
 msgstr ""
 "Эта статья ссылается на &ldquo;операционную 
систему Linux&rdquo;, но имеется "
-"в виду <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Этот 
трюк не потребовал "
-"бы изменений в самом Linux."
+"в виду <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Этот 
трюк не "
+"потребовал бы изменений в самом Linux."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/zh-tw.po     11 Mar 2019 10:02:11 -0000      1.48
+++ proprietary/po/zh-tw.po     13 Mar 2019 11:01:00 -0000      1.49
@@ -2216,6 +2216,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"In China, it is mandatory for electric cars to be equipped with a terminal "
+"that <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
+"transfers technical data, including car location, to a government-run "
+"platform</a>. In practice, <a href=\"/proprietary/proprietary-surveillance."
+"html#car-spying\"> manufacturers collect this data</a> as part of their own "
+"spying, then forward it to the government-run platform."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "GM <a href=\"https://boingboing.net/2018/10/23/dont-touch-that-dial.html\";> "
 "tracked the choices of radio programs</a> in its &ldquo;connected&rdquo; "
 "cars, minute by minute."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]