www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 28 Mar 2019 05:02:23 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/03/28 05:02:21

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.396&r2=1.397
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.284&r2=1.285
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.205&r2=1.206
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.493&r2=1.494
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.54&r2=1.55

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- de.po       28 Mar 2019 08:32:45 -0000      1.54
+++ de.po       28 Mar 2019 09:02:19 -0000      1.55
@@ -7427,6 +7427,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- es.po       28 Mar 2019 08:32:45 -0000      1.72
+++ es.po       28 Mar 2019 09:02:19 -0000      1.73
@@ -5675,6 +5675,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- fr.po       28 Mar 2019 08:32:45 -0000      1.95
+++ fr.po       28 Mar 2019 09:02:19 -0000      1.96
@@ -6015,6 +6015,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- it.po       28 Mar 2019 08:32:45 -0000      1.54
+++ it.po       28 Mar 2019 09:02:19 -0000      1.55
@@ -6979,6 +6979,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- ja.po       28 Mar 2019 08:32:45 -0000      1.54
+++ ja.po       28 Mar 2019 09:02:19 -0000      1.55
@@ -5954,6 +5954,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-mobiles.de-diff.html        17 Mar 2019 10:32:40 -0000      1.46
+++ malware-mobiles.de-diff.html        28 Mar 2019 09:02:19 -0000      1.47
@@ -336,58 +336,43 @@
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
     WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be 
recovered</em></ins></span>
-    in <span class="removed"><del><strong>user's address
-      book to developer's server.  Note that this article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>various ways.&lt;/p&gt;</em></ins></span>
+    in <span class="inserted"><ins><em>various ways.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607280"&gt;
-    &lt;p&gt;A half-blind security critique</em></ins></span> of <span 
class="removed"><del><strong>data to China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's app listens all the time,</strong></del></span> <span 
class="inserted"><ins><em>a tracking app: it found that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
-    blatant flaws allowed anyone to</em></ins></span> snoop on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>a user's personal data&lt;/a&gt;.
-    The critique fails entirely</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
-  advertisements.&lt;/p&gt;
-&lt;/li&gt;
-
-
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated the privacy and security
-    of 283 Android VPN apps concluded</strong></del></span> <span 
class="inserted"><ins><em>express concern</em></ins></span> that <span 
class="removed"><del><strong>&ldquo;in spite of</strong></del></span> the
-    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span class="inserted"><ins><em>app 
sends</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject</strong></del></span>
-    <span class="inserted"><ins><em>personal data</em></ins></span> to <span 
class="removed"><del><strong>poor security guarantees</strong></del></span> 
<span class="inserted"><ins><em>a server, where the 
&lt;em&gt;developer&lt;/em&gt; gets it all.
+  &lt;li id="M201607280"&gt;
+    &lt;p&gt;A half-blind security critique of a tracking app: it found that 
&lt;a
+    
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
+    blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span 
class="removed"><del><strong>address
+      book</strong></del></span> <span class="inserted"><ins><em>personal 
data&lt;/a&gt;.
+    The critique fails entirely</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>express concern</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> the 
<span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>app 
sends the
+    personal data</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
server, where the &lt;em&gt;developer&lt;/em&gt; gets it all.
     This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
-    &lt;p&gt;The server surely has a &ldquo;privacy 
policy,&rdquo;</em></ins></span> and <span class="removed"><del><strong>abusive 
practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>surely
-    it</em></ins></span> is <span class="inserted"><ins><em>worthless since 
nearly all of them are.&lt;/p&gt;
+    &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely
+    it is worthless since nearly all of them are.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201607190"&gt;
-    &lt;p&gt;A bug in</em></ins></span> a <span 
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span 
class="inserted"><ins><em>proprietary ASN.1 library, used
-    in cell phone towers as well as cell phones and routers, &lt;a
-    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some 
portable</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;
+    &lt;p&gt;A bug in a proprietary ASN.1 library, used
+    in cell phone towers as well as cell</em></ins></span> phones <span 
class="inserted"><ins><em>and routers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control</em></ins></span> of <span class="inserted"><ins><em>those 
systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603100"&gt;
-    &lt;p&gt;Many</em></ins></span> proprietary <span 
class="removed"><del><strong>VPN</strong></del></span> <span 
class="inserted"><ins><em>payment</em></ins></span> apps <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Many proprietary payment apps &lt;a
     
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit
-    personal data in an insecure way&lt;/a&gt;. However,</em></ins></span>
-    the <span class="removed"><del><strong>research 
paper</strong></del></span> <span class="inserted"><ins><em>worse aspect of 
these apps is</em></ins></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not
+    personal</em></ins></span> data <span class="removed"><del><strong>to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>in an insecure way&lt;/a&gt;. 
However,</em></ins></span>
+    the <span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not
     anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -395,28 +380,33 @@
     &lt;p&gt;&lt;a
     
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
     Many smartphone apps use insecure authentication methods when storing
-    your personal data on remote servers&lt;/a&gt;. This leaves personal
-    information like email addresses, passwords,</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy</strong></del></span> <span 
class="inserted"><ins><em>health information
-    vulnerable. Because many</em></ins></span> of
-    <span class="removed"><del><strong>users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</strong></del></span> <span class="inserted"><ins><em>these apps 
are proprietary it makes it
-    hard</em></ins></span> to <span class="removed"><del><strong>track users 
and show them</strong></del></span> <span class="inserted"><ins><em>impossible 
to know which apps are at risk.&lt;/p&gt;
+    your personal data</em></ins></span> on <span 
class="removed"><del><strong>what people</strong></del></span> <span 
class="inserted"><ins><em>remote servers&lt;/a&gt;. This leaves personal
+    information like email addresses, passwords, and health information
+    vulnerable. Because many of these apps</em></ins></span> are <span 
class="removed"><del><strong>listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>proprietary</em></ins></span> it <span 
class="removed"><del><strong>may
+  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>makes it
+    hard</em></ins></span> to <span class="removed"><del><strong>serve them 
with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>impossible to know which apps are at 
risk.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405190"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;
     &lt;p&gt;An app to prevent &ldquo;identity theft&rdquo;
-    (access to personal data) by storing users' data on a special server &lt;a
-    
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
-    deactivated by its developer&lt;/a&gt; which had discovered a security
-    flaw.&lt;/p&gt;
+    (access to personal data) by storing users' data on a special 
server</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy 
and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
+    deactivated by its developer&lt;/a&gt; which had discovered 
a</em></ins></span> security
+    <span class="removed"><del><strong>of 283 Android VPN apps 
concluded</strong></del></span>
+    <span class="inserted"><ins><em>flaw.&lt;/p&gt;
 
     &lt;p&gt;That developer seems to be conscientious about protecting personal
-    data from third parties in general, but it can't protect that data
-    from the state.  Quite the contrary: confiding your data to someone
+    data from third parties in general, but it can't protect</em></ins></span> 
that <span class="removed"><del><strong>&ldquo;in spite 
of</strong></del></span> <span class="inserted"><ins><em>data
+    from</em></ins></span> the
+    <span class="removed"><del><strong>promises for privacy, security, and 
anonymity given by</strong></del></span> <span class="inserted"><ins><em>state. 
 Quite</em></ins></span> the
+    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject
+    to</strong></del></span> <span class="inserted"><ins><em>contrary: 
confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your rights.&lt;/p&gt;
   &lt;/li&gt;
@@ -494,6 +484,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -786,17 +788,21 @@
     research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
+    apps&mdash;millions of users may be unawarely subject to</em></ins></span> 
poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
+    &lt;p&gt;Following is a non-exhaustive <span 
class="removed"><del><strong>list</strong></del></span> <span 
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+    of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN 
apps <span class="removed"><del><strong>from
+    the research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="removed"><del><strong>infringes the privacy of
+    users:&lt;/p&gt;
+
+  &lt;dl&gt;</strong></del></span> <span class="inserted"><ins><em>infringe 
their
     privacy:&lt;/p&gt;
 
-    &lt;dl class="compact"&gt;
+    &lt;dl class="compact"&gt;</em></ins></span>
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them</em></ins></span> targeted 
ads.&lt;/dd&gt;
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
@@ -888,38 +894,38 @@
        to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
        tens of thousands</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what</em></ins></span> users <span 
class="removed"><del><strong>that install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this 
point,</strong></del></span> <span class="inserted"><ins><em>make sure they 
can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
+    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point,</strong></del></span> <span 
class="inserted"><ins><em>500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not</em></ins></span> have
 <span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
@@ -1295,7 +1301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/28 09:02:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.de.po       17 Mar 2019 10:32:40 -0000      1.103
+++ malware-mobiles.de.po       28 Mar 2019 09:02:19 -0000      1.104
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -798,6 +798,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-mobiles.es.po       18 Mar 2019 09:57:48 -0000      1.112
+++ malware-mobiles.es.po       28 Mar 2019 09:02:19 -0000      1.113
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -687,6 +688,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-mobiles.fr.po       17 Mar 2019 16:01:34 -0000      1.133
+++ malware-mobiles.fr.po       28 Mar 2019 09:02:19 -0000      1.134
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2019-03-17 17:00+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -688,6 +689,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- malware-mobiles.it-diff.html        17 Mar 2019 10:32:40 -0000      1.51
+++ malware-mobiles.it-diff.html        28 Mar 2019 09:02:19 -0000      1.52
@@ -364,13 +364,10 @@
     modem that tells big brother all the time where</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>is.  If you own
     such a car, it would</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span 
class="inserted"><ins><em>wise</em></ins></span> to <span 
class="removed"><del><strong>serve them with targeted
   advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disconnect the modem so as to turn
-    off the tracking.&lt;/p&gt;</em></ins></span>
+    off the tracking.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701270"&gt;
+  &lt;li id="M201701270"&gt;
     &lt;p&gt;Samsung phones &lt;a
     
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
     a security hole that allows an SMS message to install
@@ -521,6 +518,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -804,10 +813,13 @@
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611160"&gt;</em></ins></span>
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -840,7 +852,8 @@
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and 
<span class="removed"><del><strong>may turn them over to the UK government if
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+      may <span class="removed"><del><strong>turn them over to the UK 
government if
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -893,8 +906,7 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-      <span class="inserted"><ins><em>may turn them over to</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
@@ -1322,7 +1334,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/28 09:02:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-mobiles.it.po       17 Mar 2019 10:32:40 -0000      1.103
+++ malware-mobiles.it.po       28 Mar 2019 09:02:19 -0000      1.104
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -767,6 +767,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.ja-diff.html        17 Mar 2019 10:32:40 -0000      1.65
+++ malware-mobiles.ja-diff.html        28 Mar 2019 09:02:19 -0000      1.66
@@ -214,11 +214,18 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-<span class="removed"><del><strong>&lt;p&gt;Many proprietary payment 
apps</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;See above for 
the</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;general universal back
-      door&lt;/a&gt; in essentially all mobile phones, which permits converting
+<span class="removed"><del><strong>&lt;p&gt;Many proprietary payment apps &lt;a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data in an insecure way&lt;/a&gt;.
+However,</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;See above for</em></ins></span> 
the <span class="removed"><del><strong>worse aspect of these apps is 
that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA can tap data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;general universal back
+      door&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>smart</strong></del></span> <span 
class="inserted"><ins><em>essentially all mobile</em></ins></span> phones, 
<span class="removed"><del><strong>including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there</strong></del></span> <span 
class="inserted"><ins><em>which permits converting
       them into full-time listening devices.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -227,18 +234,11 @@
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
-    a universal back door</em></ins></span> in <span 
class="removed"><del><strong>an insecure way&lt;/a&gt;.
-However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these apps</strong></del></span> <span 
class="inserted"><ins><em>application processor, for Xiaomi's
+    a universal back door in the application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the
-    universal back door</em></ins></span> in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there is not much detail here, it 
seems</strong></del></span> <span class="inserted"><ins><em>the modem 
processor</em></ins></span> that <span class="removed"><del><strong>this
+    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>not 
much detail here, it seems</strong></del></span> <span 
class="inserted"><ins><em>separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>this
   does not operate via</strong></del></span> the <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -328,9 +328,7 @@
 
     &lt;p&gt;This is in addition</em></ins></span> to <span 
class="inserted"><ins><em>the fact that the car contains</em></ins></span> a 
<span class="removed"><del><strong>server, where</strong></del></span> <span 
class="inserted"><ins><em>cellular
     modem that tells big brother all</em></ins></span> the <span 
class="removed"><del><strong>&lt;em&gt;developer&lt;/em&gt; 
gets</strong></del></span> <span class="inserted"><ins><em>time 
where</em></ins></span> it <span class="removed"><del><strong>all.
-This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
-
-&lt;p&gt;The server surely</strong></del></span> <span 
class="inserted"><ins><em>is.  If you own
+This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>is.  If you own
     such a car, it would be wise to disconnect the modem so as to turn
     off the tracking.&lt;/p&gt;
   &lt;/li&gt;
@@ -367,9 +365,9 @@
     blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
     The critique fails entirely to express concern that the app sends the
     personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
-    This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
+    This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The server surely</em></ins></span> has a &ldquo;privacy 
policy,&rdquo; and <span 
class="removed"><del><strong>surely</strong></del></span> <span 
class="inserted"><ins><em>surely
+    &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and <span 
class="removed"><del><strong>surely</strong></del></span> <span 
class="inserted"><ins><em>surely
     it is worthless since nearly all of them are.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -486,6 +484,18 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -1167,7 +1177,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/28 09:02:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- malware-mobiles.ja.po       17 Mar 2019 10:32:40 -0000      1.91
+++ malware-mobiles.ja.po       28 Mar 2019 09:02:19 -0000      1.92
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -636,6 +636,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-mobiles.pot 17 Mar 2019 10:32:40 -0000      1.69
+++ malware-mobiles.pot 28 Mar 2019 09:02:19 -0000      1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -467,6 +467,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" "
+"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\";>
 "
+"send sensitive personal data to third parties</a>, which can use it for "
+"invasive advertising or discriminating against people in poor health "
+"condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, "
+"&ldquo;consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a "
 "href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\";> "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- malware-mobiles.ru.po       18 Mar 2019 06:31:57 -0000      1.167
+++ malware-mobiles.ru.po       28 Mar 2019 09:02:19 -0000      1.168
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -678,6 +679,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- nl.po       28 Mar 2019 08:32:45 -0000      1.54
+++ nl.po       28 Mar 2019 09:02:19 -0000      1.55
@@ -4741,6 +4741,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- pl.po       28 Mar 2019 08:32:46 -0000      1.54
+++ pl.po       28 Mar 2019 09:02:19 -0000      1.55
@@ -4185,6 +4185,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- pot 28 Mar 2019 08:32:46 -0000      1.54
+++ pot 28 Mar 2019 09:02:19 -0000      1.55
@@ -4008,6 +4008,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-surveillance.de-diff.html       26 Mar 2019 10:33:48 -0000      
1.56
+++ proprietary-surveillance.de-diff.html       28 Mar 2019 09:02:19 -0000      
1.57
@@ -943,6 +943,18 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -3337,7 +3349,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/03/28 09:02:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary-surveillance.de.po      26 Mar 2019 10:33:48 -0000      1.271
+++ proprietary-surveillance.de.po      28 Mar 2019 09:02:19 -0000      1.272
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1867,6 +1867,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.396
retrieving revision 1.397
diff -u -b -r1.396 -r1.397
--- proprietary-surveillance.fr.po      26 Mar 2019 18:11:47 -0000      1.396
+++ proprietary-surveillance.fr.po      28 Mar 2019 09:02:20 -0000      1.397
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2019-03-26 19:10+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1406,6 +1407,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary-surveillance.it-diff.html       26 Mar 2019 10:33:48 -0000      
1.123
+++ proprietary-surveillance.it-diff.html       28 Mar 2019 09:02:20 -0000      
1.124
@@ -1174,65 +1174,76 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
-    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends</strong></del></span> <span 
class="inserted"><ins><em>href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
       <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
-    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      spies</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which can use it</em></ins></span>
+    for <span class="removed"><del><strong>companies, and the NSA takes 
advantage to spy through</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising or discriminating against people 
in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought,</em></ins></span> 
it <span class="removed"><del><strong>too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>is buried</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span class="inserted"><ins><em>lengthy terms of service that are 
difficult</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span 
class="removed"><del><strong>i-Que</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit 
-      <span class="removed"><del><strong>&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;
+  &lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered</em></ins></span> a <span 
class="removed"><del><strong>speech recognition company based in the 
U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys</strong></del></span> <span 
class="inserted"><ins><em>convenient proprietary
+    library for building mobile apps, which</em></ins></span> also <span 
class="removed"><del><strong>contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>toys with a mobile phone. 
This</strong></del></span> <span class="inserted"><ins><em>personal
+    data they collected</em></ins></span> would
+      <span class="removed"><del><strong>enable crackers</strong></del></span> 
<span class="inserted"><ins><em>go</em></ins></span> to <span 
class="removed"><del><strong>listen in on</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not</em></ins></span> even <span 
class="removed"><del><strong>speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     
-    &lt;p&gt;The app was reporting the temperature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
     18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
     so that users cannot escape tracking</em></ins></span> by
       <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
@@ -1254,62 +1265,75 @@
     &lt;p&gt;Many nonfree apps</em></ins></span> have
       <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span class="removed"><del><strong>data 
to</strong></del></span> <span class="inserted"><ins><em>app.&lt;/p&gt;
+    &lt;p&gt;The company that made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>a surveillance feature for</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps 
that</em></ins></span> used <span 
class="removed"><del><strong>it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>to
     be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to make uninstallation
+    them to phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>data may be
+      true,</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
+    haven't yet,</em></ins></span> but <span class="removed"><del><strong>it 
doesn't</strong></del></span> <span class="inserted"><ins><em>they should also 
stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    there is no easy way of knowing what they</em></ins></span> really <span 
class="removed"><del><strong>matter. If it had sold</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of the 150 most popular
+    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>150 most popular
     gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
+    potentially also be used</em></ins></span> to <span 
class="inserted"><ins><em>spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover,</em></ins></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>data broker 
would</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps</em></ins></span> have <span class="removed"><del><strong>been able to 
figure out
+      who the user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+    stored users' locations to</em></ins></span> the <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The</em></ins></span> 
company <span class="removed"><del><strong>has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>is
+    being sued, demanding that it notify the users</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys</strong></del></span> <span 
class="inserted"><ins><em>what it will do</em></ins></span>
+    with <span class="removed"><del><strong>microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way to access</strong></del></span> <span 
class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>manufacturer 
and</strong></del></span> <span class="inserted"><ins><em>data is a secondary 
issue. The principal wrong here is that</em></ins></span>
+    the <span class="removed"><del><strong>FBI could listen 
to</strong></del></span> <span class="inserted"><ins><em>company gets that data 
at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1368,14 +1392,17 @@
     of the 5,855 Android apps studied by researchers were found to snoop
     and collect information about its users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+    detect only some methods of snooping, in</em></ins></span> these <span 
class="removed"><del><strong>conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    Android</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
@@ -1918,8 +1945,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes</em></ins></span> a
-      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>step further than other TV
+    &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
@@ -1932,7 +1958,7 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to</em></ins></span> the <span class="removed"><del><strong>data 
broker</strong></del></span> <span class="inserted"><ins><em>600 millions 
social media profiles the company
+    to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
@@ -1965,35 +1991,27 @@
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
     transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and</em></ins></span> would <span 
class="inserted"><ins><em>then</em></ins></span> have <span 
class="removed"><del><strong>been able</strong></del></span> to <span 
class="removed"><del><strong>figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>give it to</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>US or some
+    Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="inserted"><ins><em>be trusted unless it is done by free
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In</em></ins></span> its <span 
class="removed"><del><strong>customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with 
microphones</strong></del></span> <span class="inserted"><ins><em>privacy 
policy, Samsung explicitly confirms that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="inserted"><ins><em>third
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The report was as of 2014, but we don't expect this has got
@@ -2001,36 +2019,30 @@
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>TV 
will not
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user watches,</em></ins></span> and the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>switch to turn this off has
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing; the server</em></ins></span> could <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>save that data anyway.)&lt;/p&gt; 
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -3071,7 +3083,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.284
retrieving revision 1.285
diff -u -b -r1.284 -r1.285
--- proprietary-surveillance.it.po      26 Mar 2019 10:33:48 -0000      1.284
+++ proprietary-surveillance.it.po      28 Mar 2019 09:02:20 -0000      1.285
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1817,6 +1817,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-surveillance.ja-diff.html       26 Mar 2019 10:33:48 -0000      
1.133
+++ proprietary-surveillance.ja-diff.html       28 Mar 2019 09:02:20 -0000      
1.134
@@ -1026,7 +1026,7 @@
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
proprietary</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
@@ -1035,25 +1035,34 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
-    apps the user has
-    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way</strong></del></span>
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health</em></ins></span> apps <span 
class="removed"><del><strong>for mobile devices report</strong></del></span> 
<span class="inserted"><ins><em>found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;,</em></ins></span> 
which <span class="removed"><del><strong>other
+    apps the</strong></del></span> <span class="inserted"><ins><em>can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever</em></ins></span> user <span 
class="removed"><del><strong>has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;consent&rdquo;</em></ins></span> is 
<span class="removed"><del><strong>doing this</strong></del></span> <span 
class="inserted"><ins><em>sought, it is buried</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span>
+    <span class="inserted"><ins><em>lengthy terms of service</em></ins></span> 
that <span class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>are difficult to understand. In any case,
+    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>not 
sufficient to legitimize snooping.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most mobile 
apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
-    <span class="inserted"><ins><em>way</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
-    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
-  &lt;/li&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
@@ -1065,115 +1074,61 @@
     misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
     78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>&lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt;</em></ins></span> to
-      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by 
the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="inserted"><ins><em>other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>total) link 
this ID</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>snooping done</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by <span 
class="inserted"><ins><em>resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>no excuse for malware.&lt;/p&gt;
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>phone 
company, and perhaps by</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending personal data to the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
-    that</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
-  &lt;/li&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt;</em></ins></span> in <span 
class="inserted"><ins><em>interacting with</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
-      Here's information</strong></del></span>
-    <span class="inserted"><ins><em>be</em></ins></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;
-
-       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used 
to</em></ins></span>
+    be <span class="removed"><del><strong>distracted by the 
question</strong></del></span> <span class="inserted"><ins><em>on Google Play 
had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the data may be
-        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was 
designed</em></ins></span> to <span class="inserted"><ins><em>make 
uninstallation
+    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>user 
interface of most of them was designed</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. 
That</strong></del></span> <span class="inserted"><ins><em>make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a
-        <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>potential risk because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there</em></ins></span> is no <span class="removed"><del><strong>excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out who the user 
is.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span> <span class="inserted"><ins><em>150 
most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
-    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
@@ -1181,128 +1136,183 @@
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span class="removed"><del><strong>because it 
asked the user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="inserted"><ins><em>will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>surrounded by</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), and</strong></del></span> <span class="inserted"><ins><em>side 
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>data is</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users can 
check</strong></del></span> <span class="inserted"><ins><em>secondary issue. 
The principal wrong here is that
+    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This 
shows</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="inserted"><ins><em>what it will do
+    with</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal</strong></del></span> 
<span class="inserted"><ins><em>side issue. What the company does
+    with the</em></ins></span> data <span class="removed"><del><strong>about 
them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on <span class="removed"><del><strong>children 
and adults.&lt;/a&gt;.&lt;/p&gt;
+    report on</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the user's actions</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same 
machine</em></ins></span> via <span class="removed"><del><strong>BIOS&lt;/a&gt; 
on Windows installs.
-Note</strong></del></span>
-    <span class="inserted"><ins><em>various apps. Some of them send Facebook 
detailed information about
-    the user's activities in the app; others only say</em></ins></span> that 
the <span class="removed"><del><strong>specific sabotage method Lenovo used did 
not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows</strong></del></span> <span 
class="inserted"><ins><em>user is
+
+   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>makes 
internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots</strong></del></span>
+    <span class="inserted"><ins><em>Facebook can correlate the data it obtains 
from the same machine via
+    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed</em></ins></span> 
information about <span class="removed"><del><strong>how
+    people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span>
+    the <span class="removed"><del><strong>data may be
+        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>user's activities in</em></ins></span> the 
<span class="removed"><del><strong>data to a
+        data broker,</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
     track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
+    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201806110"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>Spanish football 
streaming</em></ins></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>temperature 
of</strong></del></span> <span class="inserted"><ins><em>user's movements and 
listens through</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>surrounded 
by</strong></del></span> <span class="inserted"><ins><em>no way to 
save</em></ins></span>
+    a <span class="removed"><del><strong>person's
+      body), and the vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span> 
the <span class="removed"><del><strong>totally inadequate proposed response: a 
labeling
+      standard with which manufacturers would make 
statements</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care much less</em></ins></span> about
+      <span class="removed"><del><strong>their products, rather than free 
software which users can check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
+
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on 
Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the proprietary 
apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have so much information 
about</em></ins></span> its <span class="removed"><del><strong>own 
malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>users.
+    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;</strong></del></span>
+    <span class="inserted"><ins><em>other but not to the server's 
database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
@@ -1738,17 +1748,21 @@
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -1800,7 +1814,7 @@
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that</em></ins></span> install <span 
class="inserted"><ins><em>a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
@@ -1889,7 +1903,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1908,24 +1922,7 @@
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are</em></ins></span> not <span 
class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>allowed</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>report 
what the
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2900,7 +2897,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- proprietary-surveillance.ja.po      26 Mar 2019 10:33:48 -0000      1.257
+++ proprietary-surveillance.ja.po      28 Mar 2019 09:02:20 -0000      1.258
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1501,6 +1501,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.205
retrieving revision 1.206
diff -u -b -r1.205 -r1.206
--- proprietary-surveillance.pot        26 Mar 2019 10:33:49 -0000      1.205
+++ proprietary-surveillance.pot        28 Mar 2019 09:02:20 -0000      1.206
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -997,6 +997,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" "
+"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\";>
 "
+"send sensitive personal data to third parties</a>, which can use it for "
+"invasive advertising or discriminating against people in poor health "
+"condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, "
+"&ldquo;consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a "
 "href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\";> "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.493
retrieving revision 1.494
diff -u -b -r1.493 -r1.494
--- proprietary-surveillance.ru.po      26 Mar 2019 18:00:34 -0000      1.493
+++ proprietary-surveillance.ru.po      28 Mar 2019 09:02:20 -0000      1.494
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-26 10:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-28 08:57+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1394,6 +1395,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.de-diff.html    28 Mar 2019 08:32:46 -0000      1.66
+++ proprietary.de-diff.html    28 Mar 2019 09:02:20 -0000      1.67
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
@@ -129,15 +129,15 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903200"&gt;
     &lt;p&gt;Volvo plans to &lt;a
     
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"&gt;
@@ -240,16 +252,6 @@
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903080"&gt;
-    &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
-    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
-    use the disk itself as a microphone to detect speech&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article refers to the &ldquo;Linux operating system&rdquo; but
-    seems to mean &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt;. 
That
-    hack would not require changing Linux itself.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.de.po   28 Mar 2019 08:32:46 -0000      1.108
+++ proprietary.de.po   28 Mar 2019 09:02:20 -0000      1.109
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -503,21 +519,6 @@
 "spying, then forward it to the government-run platform."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.es.po   28 Mar 2019 08:32:46 -0000      1.127
+++ proprietary.es.po   28 Mar 2019 09:02:20 -0000      1.128
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -392,28 +408,6 @@
 "spying\">los fabricantes recopilan estos datos</a> para su propio espionaje, "
 "y luego los remiten a la plataforma gubernamental."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"Software malicioso instalado en el procesador de un disco duro podría <a "
-"href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
-"turned-into-listening-devices-researchers-find\">utilizar el propio disco "
-"como micrófono para detectar lenguaje hablado</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"El artículo habla del «sistema operativo Linux», pero parece que quiere "
-"decir <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Al parecer, esa "
-"intrusión no requiere cambiar el propio Linux."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -493,6 +487,26 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "Software malicioso instalado en el procesador de un disco duro podría <a "
+#~ "href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
+#~ "turned-into-listening-devices-researchers-find\">utilizar el propio disco "
+#~ "como micrófono para detectar lenguaje hablado</a>."
+
+#~ msgid ""
+#~ "The article refers to the &ldquo;Linux operating system&rdquo; but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "El artículo habla del «sistema operativo Linux», pero parece que quiere 
"
+#~ "decir <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Al parecer, esa "
+#~ "intrusión no requiere cambiar el propio Linux."
+
+#~ msgid ""
 #~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked.";
 #~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
 #~ "addictive features</a> which are based on <a href=\"/proprietary/"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.fr.po   28 Mar 2019 08:32:46 -0000      1.155
+++ proprietary.fr.po   28 Mar 2019 09:02:20 -0000      1.156
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2019-03-26 19:10+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -295,6 +295,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -391,28 +407,6 @@
 "dans le cadre de leur propre espionnage, puis les transmettent à la "
 "plateforme du gouvernement."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"Un logiciel malveillant instllé dans le processeur d'un disque dur pourrait "
-"<a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
-"turned-into-listening-devices-researchers-find\">utiliser le disque lui-même 
"
-"comme microphone pour détecter la parole</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"L'article fait référence au système d'exploitation Linux, mais semble "
-"vouloir dire <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Ce "
-"bidouillage ne nécessiterait pas de modifier Linux lui-même."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -488,6 +482,26 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "Un logiciel malveillant instllé dans le processeur d'un disque dur "
+#~ "pourrait <a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-";
+#~ "disks-can-be-turned-into-listening-devices-researchers-find\">utiliser le "
+#~ "disque lui-même comme microphone pour détecter la parole</a>."
+
+#~ msgid ""
+#~ "The article refers to the &ldquo;Linux operating system&rdquo; but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "L'article fait référence au système d'exploitation Linux, mais semble "
+#~ "vouloir dire <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Ce "
+#~ "bidouillage ne nécessiterait pas de modifier Linux lui-même."
+
+#~ msgid ""
 #~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked.";
 #~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
 #~ "addictive features</a> which are based on <a href=\"/proprietary/"

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.it-diff.html    28 Mar 2019 08:32:46 -0000      1.78
+++ proprietary.it-diff.html    28 Mar 2019 09:02:20 -0000      1.79
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
---&gt;
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903200"&gt;
     &lt;p&gt;Volvo plans to &lt;a
     
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"&gt;
@@ -239,16 +251,6 @@
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903080"&gt;
-    &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
-    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
-    use the disk itself as a microphone to detect speech&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article refers to the &ldquo;Linux operating system&rdquo; but
-    seems to mean &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt;. 
That
-    hack would not require changing Linux itself.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.it.po   28 Mar 2019 08:32:46 -0000      1.117
+++ proprietary.it.po   28 Mar 2019 09:02:20 -0000      1.118
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -496,21 +512,6 @@
 "spying, then forward it to the government-run platform."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.ja-diff.html    28 Mar 2019 08:32:46 -0000      1.79
+++ proprietary.ja-diff.html    28 Mar 2019 09:02:20 -0000      1.80
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -181,6 +181,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903200"&gt;
     &lt;p&gt;Volvo plans to &lt;a
     
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"&gt;
@@ -236,16 +248,6 @@
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903080"&gt;
-    &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
-    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
-    use the disk itself as a microphone to detect speech&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article refers to the &ldquo;Linux operating system&rdquo; but
-    seems to mean &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt;. 
That
-    hack would not require changing Linux itself.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -306,7 +308,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.ja.po   28 Mar 2019 08:32:46 -0000      1.100
+++ proprietary.ja.po   28 Mar 2019 09:02:20 -0000      1.101
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -416,21 +432,6 @@
 "spying, then forward it to the government-run platform."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.nl-diff.html    28 Mar 2019 08:32:46 -0000      1.78
+++ proprietary.nl-diff.html    28 Mar 2019 09:02:20 -0000      1.79
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
@@ -184,6 +184,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903200"&gt;
     &lt;p&gt;Volvo plans to &lt;a
     
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"&gt;
@@ -239,16 +251,6 @@
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903080"&gt;
-    &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
-    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
-    use the disk itself as a microphone to detect speech&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article refers to the &ldquo;Linux operating system&rdquo; but
-    seems to mean &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt;. 
That
-    hack would not require changing Linux itself.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.nl.po   28 Mar 2019 08:32:46 -0000      1.89
+++ proprietary.nl.po   28 Mar 2019 09:02:20 -0000      1.90
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -489,21 +505,6 @@
 "spying, then forward it to the government-run platform."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.pl-diff.html    28 Mar 2019 08:32:46 -0000      1.96
+++ proprietary.pl-diff.html    28 Mar 2019 09:02:20 -0000      1.97
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
-instances of malicious functionalities (with more than 400 references to
+&lt;p&gt;As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -126,17 +126,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903200"&gt;
     &lt;p&gt;Volvo plans to &lt;a
     
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"&gt;
@@ -237,16 +249,6 @@
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903080"&gt;
-    &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
-    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
-    use the disk itself as a microphone to detect speech&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article refers to the &ldquo;Linux operating system&rdquo; but
-    seems to mean &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt;. 
That
-    hack would not require changing Linux itself.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.pl.po   28 Mar 2019 08:32:46 -0000      1.84
+++ proprietary.pl.po   28 Mar 2019 09:02:20 -0000      1.85
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -571,21 +587,6 @@
 "spying, then forward it to the government-run platform."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary.pot     28 Mar 2019 08:32:46 -0000      1.81
+++ proprietary.pot     28 Mar 2019 09:02:20 -0000      1.82
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" "
+"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\";>
 "
+"send sensitive personal data to third parties</a>, which can use it for "
+"invasive advertising or discriminating against people in poor health "
+"condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, "
+"&ldquo;consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a "
 
"href=\"https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\";>
 "
 "install cameras inside cars</a> to monitor the driver for signs of "
@@ -310,20 +326,6 @@
 "forward it to the government-run platform."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a "
-"href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find\";>
 "
-"use the disk itself as a microphone to detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.pt-br.po        28 Mar 2019 08:32:46 -0000      1.117
+++ proprietary.pt-br.po        28 Mar 2019 09:02:20 -0000      1.118
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2019-03-23 08:45-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -366,28 +382,6 @@
 "\"> fabricantes coletam esses dados</a> como parte de sua própria espionagem 
"
 "e os encaminham para a plataforma administrada pelo governo."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"Malware instalado no processador em um disco rígido pode <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\">usar o próprio disco como um microfone "
-"para detectar a fala</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"O artigo faz referência ao “sistema operacional Linux”, mas parece "
-"significar <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Esse hack não "
-"exigiria a mudança do Linux em si."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -463,6 +457,26 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "Malware instalado no processador em um disco rígido pode <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
+#~ "turned-into-listening-devices-researchers-find\">usar o próprio disco "
+#~ "como um microfone para detectar a fala</a>."
+
+#~ msgid ""
+#~ "The article refers to the &ldquo;Linux operating system&rdquo; but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "O artigo faz referência ao “sistema operacional Linux”, mas parece "
+#~ "significar <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Esse hack "
+#~ "não exigiria a mudança do Linux em si."
+
+#~ msgid ""
 #~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked.";
 #~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
 #~ "addictive features</a> which are based on <a href=\"/proprietary/"

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.ru.po   28 Mar 2019 08:32:46 -0000      1.194
+++ proprietary.ru.po   28 Mar 2019 09:02:20 -0000      1.195
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -299,6 +299,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -391,28 +407,6 @@
 "собирают эти данные</a> в процессе 
собственного шпионажа, а затем передают "
 "их на платформу, предоставленную 
государством."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-"Вредоносные программы, установленные в 
процессоре жесткого диска, могли бы "
-"<a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
-"turned-into-listening-devices-researchers-find\"> использовать 
сам диск как "
-"микрофон, чтобы обнаруживать речь</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-"Эта статья ссылается на &ldquo;операционную 
систему Linux&rdquo;, но имеется "
-"в виду <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Этот 
трюк не "
-"потребовал бы изменений в самом Linux."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -492,6 +486,26 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Malware installed into the processor in a hard drive could <a href="
+#~ "\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-";
+#~ "turned-into-listening-devices-researchers-find\"> use the disk itself as "
+#~ "a microphone to detect speech</a>."
+#~ msgstr ""
+#~ "Вредоносные программы, установленные в 
процессоре жесткого диска, могли "
+#~ "бы <a href=\"https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-";
+#~ "can-be-turned-into-listening-devices-researchers-find\"> 
использовать сам "
+#~ "диск как микрофон, чтобы обнаруживать 
речь</a>."
+
+#~ msgid ""
+#~ "The article refers to the &ldquo;Linux operating system&rdquo; but seems "
+#~ "to mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack "
+#~ "would not require changing Linux itself."
+#~ msgstr ""
+#~ "Эта статья ссылается на 
&ldquo;операционную систему Linux&rdquo;, но "
+#~ "имеется в виду <a 
href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. Этот "
+#~ "трюк не потребовал бы изменений в самом 
Linux."
+
+#~ msgid ""
 #~ "Game Of War: Fire Age is an iPhone game with <a href=\"http://www.cracked.";
 #~ "com/personal-experiences-1762-5-reasons-i-lost-249000-iphone-game.html\"> "
 #~ "addictive features</a> which are based on <a href=\"/proprietary/"

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.zh-tw-diff.html 28 Mar 2019 08:32:46 -0000      1.56
+++ proprietary.zh-tw-diff.html 28 Mar 2019 09:02:20 -0000      1.57
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
@@ -129,15 +129,15 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -185,6 +185,18 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 health apps found that 19 of them &lt;a href="
+    
https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data to third parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
+    health condition.&lt;/p&gt;
+
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
+    lengthy terms of service that are difficult to understand. In any case,
+    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903200"&gt;
     &lt;p&gt;Volvo plans to &lt;a
     
href="https://www.theguardian.com/business/2019/mar/20/volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths"&gt;
@@ -240,16 +252,6 @@
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to the government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903080"&gt;
-    &lt;p&gt;Malware installed into the processor in a hard drive could &lt;a
-    
href="https://yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-listening-devices-researchers-find"&gt;
-    use the disk itself as a microphone to detect speech&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article refers to the &ldquo;Linux operating system&rdquo; but
-    seems to mean &lt;a href="/gnu/linux-and-gnu.html"&gt;GNU/Linux&lt;/a&gt;. 
That
-    hack would not require changing Linux itself.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/28 08:32:46 $
+$Date: 2019/03/28 09:02:20 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.zh-tw.po        28 Mar 2019 08:32:46 -0000      1.67
+++ proprietary.zh-tw.po        28 Mar 2019 09:02:20 -0000      1.68
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-28 08:27+0000\n"
+"POT-Creation-Date: 2019-03-28 08:57+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 "cameras inside cars</a> to monitor the driver for signs of impairment that "
@@ -405,21 +421,6 @@
 "spying, then forward it to the government-run platform."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Malware installed into the processor in a hard drive could <a href=\"https://";
-"yro.slashdot.org/story/19/03/08/1928257/hard-disks-can-be-turned-into-"
-"listening-devices-researchers-find\"> use the disk itself as a microphone to "
-"detect speech</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article refers to the &ldquo;Linux operating system&rdquo; but seems to "
-"mean <a href=\"/gnu/linux-and-gnu.html\">GNU/Linux</a>. That hack would not "
-"require changing Linux itself."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- pt-br.po    28 Mar 2019 08:32:46 -0000      1.71
+++ pt-br.po    28 Mar 2019 09:02:20 -0000      1.72
@@ -4364,6 +4364,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- ru.po       28 Mar 2019 08:32:46 -0000      1.123
+++ ru.po       28 Mar 2019 09:02:20 -0000      1.124
@@ -5970,6 +5970,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- zh-tw.po    28 Mar 2019 08:32:46 -0000      1.54
+++ zh-tw.po    28 Mar 2019 09:02:20 -0000      1.55
@@ -4137,6 +4137,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"A study of 24 health apps found that 19 of them <a href=\" https://";
+"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
+"everywhere-new-study-shows\"> send sensitive personal data to third parties</"
+"a>, which can use it for invasive advertising or discriminating against "
+"people in poor health condition."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
+"of service that are difficult to understand. In any case, &ldquo;"
+"consent&rdquo; is not sufficient to legitimize snooping."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]