www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-appliances.de-diff.h...


From: GNUN
Subject: www/proprietary/po malware-appliances.de-diff.h...
Date: Mon, 1 Oct 2018 05:59:23 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/01 05:59:22

Modified files:
        proprietary/po : malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary-tethers.de.po 
                         proprietary-tethers.fr.po 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ja.po 
                         proprietary-tethers.pot 
                         proprietary-tethers.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.315&r2=1.316
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.402&r2=1.403
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.44&r2=1.45

Patches:
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- malware-appliances.de-diff.html     1 Oct 2018 07:58:14 -0000       1.7
+++ malware-appliances.de-diff.html     1 Oct 2018 09:59:21 -0000       1.8
@@ -58,7 +58,7 @@
   &lt;li <span class="removed"><del><strong>id="nest-thermometers"&gt;
     &lt;p&gt;Nest thermometers
       send</strong></del></span> <span 
class="inserted"><ins><em>id="M201809260"&gt;
-    &lt;p&gt;Honeywell's "smart" thermostats communicate
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
     all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
       lot</strong></del></span>
@@ -652,65 +652,65 @@
 href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
 &lt;a
 
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app developers. That is clearly true
+    if the apps are proprietary software.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Lots of &lt;a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+    &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going
+    to screw you.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Lots of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604110"&gt;
+    &lt;p&gt;Malware was found on</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
 hospital equipment has lousy security&lt;/a&gt;, and it can be fatal.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;&lt;a
 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken over&lt;/a&gt; and turned
-into a botnet for</strong></del></span> <span class="inserted"><ins><em>app 
developers. That is clearly true
-    if</em></ins></span> the <span class="removed"><del><strong>purpose of 
collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>apps 
are proprietary software.&lt;/p&gt;
-
-    &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going
-    to screw you.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
-&lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>id="M201604110"&gt;
-    &lt;p&gt;Malware was found on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</strong></del></span>
+Point-of-sale terminals running Windows were taken 
over&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
     security cameras available through Amazon&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;A camera that records locally</em></ins></span> on <span 
class="removed"><del><strong>what
-users watch&lt;/a&gt;.  The TVs did</strong></del></span> <span 
class="inserted"><ins><em>physical media, and has no network
-    connection, does</em></ins></span> not <span 
class="removed"><del><strong>do that when first 
sold.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>threaten 
people with surveillance&mdash;neither
-    by watching people through the camera, nor through malware in the
+    &lt;p&gt;A camera that records locally on physical 
media,</em></ins></span> and <span class="removed"><del><strong>turned
+into a botnet for</strong></del></span> <span class="inserted"><ins><em>has no 
network
+    connection, does not threaten people with surveillance&mdash;neither
+    by watching people through</em></ins></span> the <span 
class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>camera, nor through malware in the
     camera.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
+  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
+&lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>id="M201604050"&gt;
+    &lt;p&gt;Google/Alphabet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+used</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+    intentionally broke Revolv home automatic control products that
+    depended on</em></ins></span> a <span 
class="removed"><del><strong>firmware 
&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>make its TVs snoop on what
+users watch&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>function, by shutting down the 
server.</em></ins></span>
+    The <span class="removed"><del><strong>TVs did not 
do</strong></del></span> <span class="inserted"><ins><em>lesson is, reject all 
such products.  Insist on self-contained
+    computers</em></ins></span> that <span class="removed"><del><strong>when 
first sold.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>run 
free software!&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;LG</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201604050"&gt;
-    &lt;p&gt;Google/Alphabet</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-disabled network features&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
-    intentionally broke Revolv home automatic control products that
-    depended</em></ins></span> on <span 
class="removed"><del><strong>&lt;em&gt;previously purchased&lt;/em&gt;
+disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
 &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
-begin</strong></del></span> <span class="inserted"><ins><em>a 
server&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>function, by shutting down the server.
-    The lesson is, reject all such products.  Insist</em></ins></span> on 
<span class="removed"><del><strong>them and distribute their personal 
data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>self-contained
-    computers that run free software!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+begin to snoop on them and distribute their personal data.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;&lt;a
 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
 Barbie is going</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
-    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>spy&lt;/a&gt; on children and adults.&lt;/p&gt;
 &lt;/li&gt;
 
@@ -733,7 +733,7 @@
     printers.  Now</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
 
 &lt;p&gt;A &ldquo;smart&rdquo; device</strong></del></span> <span 
class="inserted"><ins><em>is being discontinued, which</em></ins></span> means 
<span class="inserted"><ins><em>that eventually
-    authorized materials won't be available and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to</strong></del></span> 
<span class="inserted"><ins><em>printers may become
+    authorized materials won't be available and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to 
outsmart</strong></del></span> <span class="inserted"><ins><em>printers may 
become
     unusable.&lt;/p&gt;
 
     &lt;p&gt;With a &lt;a
@@ -780,14 +780,13 @@
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to</em></ins></span> outsmart you.&lt;/p&gt;
+    to outsmart</em></ins></span> you.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Vizio goes</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511198"&gt;
-    &lt;p&gt;ARRIS cable modem has</em></ins></span> a <span 
class="removed"><del><strong>step further than</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;ARRIS cable modem has a &lt;a
     
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
     back door in the back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -795,7 +794,7 @@
   &lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on</em></ins></span> other <span class="inserted"><ins><em>devices in 
range so as to determine that they
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
@@ -871,10 +870,10 @@
     the door to murder.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio &lt;a
+  &lt;li id="M201504300"&gt;</em></ins></span>
+    &lt;p&gt;Vizio <span 
class="removed"><del><strong>goes</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    used</em></ins></span> a <span class="removed"><del><strong>step further 
than</strong></del></span> <span class="inserted"><ins><em>firmware 
&ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -888,8 +887,8 @@
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
     transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the US or some
-    other government.&lt;/p&gt;
+    Nuance can save it and would then have to give it to the US or 
some</em></ins></span>
+    other <span class="inserted"><ins><em>government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
@@ -1197,7 +1196,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 07:58:14 $
+$Date: 2018/10/01 09:59:21 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-appliances.de.po    1 Oct 2018 07:58:14 -0000       1.56
+++ malware-appliances.de.po    1 Oct 2018 09:59:21 -0000       1.57
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -100,9 +100,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- malware-appliances.fr.po    1 Oct 2018 07:58:14 -0000       1.84
+++ malware-appliances.fr.po    1 Oct 2018 09:59:21 -0000       1.85
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-09-26 20:27+0200\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -83,9 +83,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-appliances.pot      1 Oct 2018 07:58:15 -0000       1.42
+++ malware-appliances.pot      1 Oct 2018 09:59:21 -0000       1.43
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,8 +64,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
 
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
 "
 "surveillance, and danger of sabotage</a> (of a specific user, or of all "
 "users at once), as well as the risk of an outage (which is what just "

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-appliances.ru.po    1 Oct 2018 07:58:15 -0000       1.113
+++ malware-appliances.ru.po    1 Oct 2018 09:59:22 -0000       1.114
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-09-26 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -83,9 +83,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-insecurity.de.po        1 Oct 2018 08:28:39 -0000       1.117
+++ proprietary-insecurity.de.po        1 Oct 2018 09:59:22 -0000       1.118
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -128,9 +128,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-insecurity.fr.po        1 Oct 2018 08:28:39 -0000       1.142
+++ proprietary-insecurity.fr.po        1 Oct 2018 09:59:22 -0000       1.143
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-09-26 20:27+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -111,9 +111,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary-insecurity.it-diff.html 1 Oct 2018 08:28:39 -0000       1.14
+++ proprietary-insecurity.it-diff.html 1 Oct 2018 09:59:22 -0000       1.15
@@ -51,45 +51,45 @@
 &lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;.  
Keeping the
 users helpless is what's culpable about proprietary software.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li id="break-security-smarttv"&gt;
+  &lt;p&gt;&lt;a
+       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers found a way</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that 
ought</em></ins></span> to <span class="removed"><del><strong>break security 
on</strong></del></span> <span class="inserted"><ins><em>be in this page but 
isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span 
class="inserted"><ins><em>trustworthy reference or two
 to present the specifics.&lt;/p&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
-  &lt;p&gt;&lt;a
-       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers</strong></del></span> <span 
class="inserted"><ins><em>id="M201809260"&gt;
-    &lt;p&gt;Honeywell's "smart" thermostats communicate
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201809260"&gt;
+    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TV&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>thermostats communicate
     only through the company's server. They have
     all the nasty characteristics of such devices: &lt;a
     
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
+    surveillance,</em></ins></span> and <span class="removed"><del><strong>use 
its camera
+      to watch</strong></del></span> <span class="inserted"><ins><em>danger of 
sabotage&lt;/a&gt; (of a specific user, or of
     all users at once), as well as the risk of an outage (which is what
     just happened).&lt;/p&gt;
 
     &lt;p&gt;In addition, setting the desired temperature requires running
     nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;
+    using controls right on</em></ins></span> the <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
+    hide voice commands in other audio&lt;/a&gt;, so that</em></ins></span> 
people <span class="removed"><del><strong>who are watching 
TV.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Many models</strong></del></span>
 
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers</em></ins></span> found a way to break <span 
class="removed"><del><strong>security on a &ldquo;smart&rdquo; TV&lt;/a&gt; and 
use its camera
-      to watch</strong></del></span> the <span 
class="removed"><del><strong>people who are watching TV.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras</strong></del></span> 
<span class="inserted"><ins><em>an Amazon device,
+  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way to break the security</em></ins></span> of 
<span class="removed"><del><strong>Internet-connected 
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
     and</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
   have backdoors&lt;/a&gt;.&lt;/p&gt;
@@ -246,7 +246,7 @@
   <span class="inserted"><ins><em>&lt;li id="M201705160"&gt;
     &lt;p&gt;Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
     pre-installed on 28 models</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span class="inserted"><ins><em>HP laptops 
logged</em></ins></span> the <span 
class="removed"><del><strong>Internet,</strong></del></span> <span 
class="inserted"><ins><em>user's keystroke
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the 
user's keystroke
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, &lt;a
     
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
@@ -273,7 +273,7 @@
     &lt;p&gt;When Miele's Internet of
     Stings hospital disinfectant dishwasher is &lt;a
     
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to the Internet,</em></ins></span> its security is 
crap&lt;/a&gt;.&lt;/p&gt;
+    connected to</em></ins></span> the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
     filesystem, infect it with malware, and force the dishwasher to launch
@@ -924,7 +924,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 08:28:39 $
+$Date: 2018/10/01 09:59:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-insecurity.it.po        1 Oct 2018 08:28:39 -0000       1.133
+++ proprietary-insecurity.it.po        1 Oct 2018 09:59:22 -0000       1.134
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -121,9 +121,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-insecurity.ja-diff.html 1 Oct 2018 08:28:39 -0000       1.33
+++ proprietary-insecurity.ja-diff.html 1 Oct 2018 09:59:22 -0000       1.34
@@ -90,7 +90,7 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's "smart" thermostats communicate
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server.</em></ins></span> They <span 
class="removed"><del><strong>can be recovered
 in various ways.
 &lt;/p&gt;
@@ -882,7 +882,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 08:28:39 $
+$Date: 2018/10/01 09:59:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary-insecurity.ja.po        1 Oct 2018 08:28:39 -0000       1.104
+++ proprietary-insecurity.ja.po        1 Oct 2018 09:59:22 -0000       1.105
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -102,9 +102,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-insecurity.pot  1 Oct 2018 08:28:39 -0000       1.74
+++ proprietary-insecurity.pot  1 Oct 2018 09:59:22 -0000       1.75
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,8 +77,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
 
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
 "
 "surveillance, and danger of sabotage</a> (of a specific user, or of all "
 "users at once), as well as the risk of an outage (which is what just "

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary-insecurity.ru.po        1 Oct 2018 08:28:39 -0000       1.190
+++ proprietary-insecurity.ru.po        1 Oct 2018 09:59:22 -0000       1.191
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-09-26 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -108,9 +108,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary-surveillance.de.po      1 Oct 2018 07:58:15 -0000       1.230
+++ proprietary-surveillance.de.po      1 Oct 2018 09:59:22 -0000       1.231
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -3581,9 +3581,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.315
retrieving revision 1.316
diff -u -b -r1.315 -r1.316
--- proprietary-surveillance.fr.po      1 Oct 2018 09:12:53 -0000       1.315
+++ proprietary-surveillance.fr.po      1 Oct 2018 09:59:22 -0000       1.316
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-10-01 11:11+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-01 09:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -2923,10 +2924,25 @@
 "\">#SpywareAtHome</a>)</span>"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+# | Honeywell's [-\"smart\"-] {+&ldquo;smart&rdquo;+} thermostats communicate
+# | only through the company's server. They have all the nasty characteristics
+# | of such devices: <a
+# | 
href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
+# | surveillance, and danger of sabotage</a> (of a specific user, or of all
+# | users at once), as well as the risk of an outage (which is what just
+# | happened).
+#, fuzzy
+#| msgid ""
+#| "Honeywell's \"smart\" thermostats communicate only through the company's "
+#| "server. They have all the nasty characteristics of such devices: <a href="
+#| "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+#| "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
+#| "user, or of all users at once), as well as the risk of an outage (which "
+#| "is what just happened)."
+msgid ""
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-surveillance.it-diff.html       1 Oct 2018 07:58:15 -0000       
1.70
+++ proprietary-surveillance.it-diff.html       1 Oct 2018 09:59:22 -0000       
1.71
@@ -492,25 +492,13 @@
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201509220"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found that 90% of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note that</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
-    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span> <span 
class="inserted"><ins><em>not really clean since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its
+    BIOS&lt;/a&gt; on Windows installs.  Note that</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis</strong></del></span> <span 
class="inserted"><ins><em>specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
     own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -518,9 +506,7 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span> <span 
class="inserted"><ins><em>Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -535,37 +521,18 @@
     &lt;p&gt;The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
     
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
-    proprietary <span class="removed"><del><strong>apps, one can only hope 
that</strong></del></span> <span class="inserted"><ins><em>software to make 
sure</em></ins></span> they <span 
class="removed"><del><strong>don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    proprietary <span class="removed"><del><strong>Android apps contained 
recognizable tracking libraries. For</strong></del></span> <span 
class="inserted"><ins><em>software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users by
-       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>collude</strong></del></span> <span 
class="inserted"><ins><em>take over
+  &lt;li id="M201510050"&gt;
+    &lt;p&gt;According to Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>turn the 
phones on and off, listen</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+    them to turn the phones on and off, listen to the microphone,
+    retrieve geo-location data from the GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+    read the contact list. This malware is designed to disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -574,25 +541,19 @@
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that</em></ins></span> this <span 
class="removed"><del><strong>point, most users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>does not 
operate via</em></ins></span>
-    the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
-    phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location</em></ins></span> on <span 
class="removed"><del><strong>users, instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>remote 
command, and users cannot stop
-    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
+    will send their GPS location on remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -604,11 +565,10 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting</strong></del></span> 
<span class="inserted"><ins><em>the EU Copyright Directive make it &lt;a
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because</em></ins></span>
-    this <span class="removed"><del><strong>personal information 
in</strong></del></span> <span class="inserted"><ins><em>would require 
circumventing</em></ins></span> the <span class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
@@ -625,127 +585,135 @@
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on 
them.&lt;/p&gt;</em></ins></span>
+    no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
+  &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can get
+    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;; the
+    &lt;p&gt;The iMessage app on iThings &lt;a
+    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+    a server every phone number that the user types into it&lt;/a&gt;; the
     server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the 
photos</em></ins></span>
-    and <span class="removed"><del><strong>location 
tracking,</strong></del></span> <span class="inserted"><ins><em>videos they 
make.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    and videos they make.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video</em></ins></span> you <span class="removed"><del><strong>must
-    disable Google Play itself</strong></del></span>
-    <span class="inserted"><ins><em>take, and keeps them up</em></ins></span> 
to <span class="removed"><del><strong>completely stop the tracking.  
This</strong></del></span> <span class="inserted"><ins><em>date on all your 
devices. Any edits you
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
+    take, and keeps them up to date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is
-    <span class="removed"><del><strong>yet another 
example</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup</em></ins></span> of <span class="removed"><del><strong>nonfree 
software pretending</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>paid proprietary 
apps,</strong></del></span>
+    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>obey the user,
-    when</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but</em></ins></span> it's <span 
class="removed"><del><strong>actually doing something else.  
Such</strong></del></span> <span class="inserted"><ins><em>active by default so 
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing 
would be almost
-    unthinkable</strong></del></span>
-    <span class="inserted"><ins><em>surveillance functionality.&lt;/p&gt;
+    &lt;p&gt;There is a way to
+    &lt;a href="https://support.apple.com/en-us/HT201104"&gt; deactivate
+    iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps</strong></del></span> 
<span class="inserted"><ins><em>still counts</em></ins></span> as <span 
class="removed"><del><strong>&ldquo;free&rdquo;,</strong></del></span> <span 
class="inserted"><ins><em>a
+    surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security to get at them,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span 
class="removed"><del><strong>are not in fact</strong></del></span> <span 
class="inserted"><ins><em>through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>that word is &ldquo;exploit&rdquo;; nearly always 
that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved</em></ins></span> with <span 
class="removed"><del><strong>free software.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
     not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other</em></ins></span> than <span 
class="removed"><del><strong>73% of</strong></del></span> <span 
class="inserted"><ins><em>surveillance&lt;/a&gt;.  Here is</em></ins></span> 
the <span class="removed"><del><strong>most popular Android 
apps</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
+    Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
+    for <span class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here is the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</em></ins></span> and <span class="removed"><del><strong>location 
information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>get other info 
too.&lt;/p&gt;</em></ins></span>
+    iBeacon&lt;/a&gt; lets</em></ins></span> stores <span 
class="removed"><del><strong>or played by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>determine exactly where the iThing is, and
+    get other info too.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated to</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' 
personal</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span class="inserted"><ins><em>NSA snoop on 
all</em></ins></span> the <span class="removed"><del><strong>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps the NSA snoop on all the</em></ins></span> data <span 
class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308080"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article should not have 
described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span class="inserted"><ins><em>iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though that can be
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
+    &lt;p&gt;The iThing also</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites</em></ins></span> to <span 
class="removed"><del><strong>say
-  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>track users, which</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;There</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span class="inserted"><ins><em>also a feature for 
web sites</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on</strong></del></span> 
<span class="inserted"><ins><em>track</em></ins></span> users, <span 
class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That</em></ins></span> article <span 
class="removed"><del><strong>takes for granted that the usual analytics tools 
are
-  legitimate,</strong></del></span> <span class="inserted"><ins><em>talks 
about iOS 6,</em></ins></span> but <span 
class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers have no 
right</strong></del></span>
-    <span class="inserted"><ins><em>still true in iOS 7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
+    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;
-    necessary</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address and receiving the verification code Apple sends
+    necessary</em></ins></span> to <span class="removed"><del><strong>truly 
protect people's privacy, we must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
+    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
     to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -760,56 +728,90 @@
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo;</em></ins></span> are
-  <span class="removed"><del><strong>just as wrong as any other 
snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component of Android)</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611150"&gt;
+    &lt;p&gt;Some portable phones &lt;a
+    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;</em></ins></span>
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>location 
tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>tracking.  This</em></ins></span> is <span 
class="removed"><del><strong>present in some Android 
devices</strong></del></span>
-    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending to obey the user,</em></ins></span>
-    when <span class="removed"><del><strong>they are sold.
-      Some Motorola</strong></del></span> <span class="inserted"><ins><em>it's 
actually doing something else.  Such a thing would be almost
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung</em></ins></span> phones <span 
class="removed"><del><strong>modify Android to</strong></del></span> <span 
class="inserted"><ins><em>come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;, and they</em></ins></span> send <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>so much</em></ins></span> data <span 
class="removed"><del><strong>to Motorola&lt;/a&gt;.&lt;/p&gt;
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
+    transmission is a substantial expense for users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute 
spying</em></ins></span>
+    of <span class="removed"><del><strong>their users with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>some 
kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> <span 
class="inserted"><ins><em>that their
-    transmission is</em></ins></span> a
-      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>substantial expense for users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+  &lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis</strong></del></span> 
Android <span class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
-    &lt;p&gt;&lt;a</em></ins></span> 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to 
say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
+    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
+    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt;.  (I suspect this means Windows 
laptops.)  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when
+    they are sold.  Some Motorola phones modify Android to &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
     Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -824,32 +826,20 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>Android phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us by a paywall) reports 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
       &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone in 
Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  
Here</em></ins></span> is <span class="removed"><del><strong>snooping on
+      taken. Users would have no way to tell whether the phone is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
       lots of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when
-    they are sold.  Some Motorola phones modify Android to &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
     send</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
         get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -954,14 +944,25 @@
        iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>Swindle</em></ins></span> and <span 
class="removed"><del><strong>get</strong></del></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>e-readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
+      is still true</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even</em></ins></span> which <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -978,156 +979,146 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 
6,</strong></del></span>
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking,</em></ins></span> but <span class="removed"><del><strong>it
-      is still true in iOS 7.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that 
can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>user's movements and 
listens through</em></ins></span> the <span class="removed"><del><strong>data 
in an iThing,
+      or</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't</em></ins></span> be
-      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>sure from 
the article.&lt;/p&gt;
+    &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>totally 
incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist 
for</strong></del></span> no
+      <span class="removed"><del><strong>possible purpose other than 
surveillance&lt;/a&gt;.  Here is</strong></del></span> <span 
class="inserted"><ins><em>way to save
+    a recording. But I can't be sure from</em></ins></span> the
+      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to</em></ins></span> snoop <span class="removed"><del><strong>on 
all</strong></del></span>
-    <span class="inserted"><ins><em>and collect information about its 
users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>an iThing,
-      or it</strong></del></span> <span class="inserted"><ins><em>these 
proprietary apps whose
+    of the 5,855 Android apps studied</em></ins></span> by <span 
class="removed"><del><strong>sending hidden text messages which enable 
them</strong></del></span> <span class="inserted"><ins><em>researchers were 
found</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span 
class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>apps were
+    found to insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
+    need</em></ins></span> to <span class="inserted"><ins><em>get rid 
of</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>read</strong></del></span> the 
<span class="removed"><del><strong>contact list. This malware is designed to
+      disguise itself</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps</em></ins></span> 
from <span class="removed"><del><strong>investigation.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software&mdash;both proprietary
-    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from</em></ins></span> the <span 
class="inserted"><ins><em>free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
+  &lt;li&gt;&lt;p&gt;Samsung phones come with</strong></del></span> <span 
class="inserted"><ins><em>the free software
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
 <span class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;</em></ins></span>
-    which <span class="removed"><del><strong>enable them</strong></del></span> 
<span class="inserted"><ins><em>users are HIV-positive, then provides the 
information to
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which</em></ins></span> users <span class="removed"><del><strong>can't 
delete&lt;/a&gt;,
+      and they send</strong></del></span> <span class="inserted"><ins><em>are 
HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> the <span 
class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have</em></ins></span> so much <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>information about its users.
+    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy</em></ins></span> on <span class="inserted"><ins><em>users even more 
than users expected. It &lt;a
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>after going</em></ins></span> to <span 
class="removed"><del><strong>the microphone, retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, 
location</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive</em></ins></span> and <span class="removed"><del><strong>web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some trackers can &lt;a
+    &lt;p&gt;Tracking software in popular Android apps</em></ins></span>
+    is <span class="inserted"><ins><em>pervasive and sometimes very clever. 
Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
+    follow</em></ins></span> a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
+      requested</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store</em></ins></span> by <span 
class="removed"><del><strong>the user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span class="removed"><del><strong>contact list. 
This malware is designed</strong></del></span> <span 
class="inserted"><ins><em>words
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads</em></ins></span> all <span class="inserted"><ins><em>phone 
numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>zero price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that,</em></ins></span> and <span 
class="inserted"><ins><em>deleted these apps after
-    discovering what</em></ins></span> they <span 
class="removed"><del><strong>send so much data that their transmission is a
-      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>did. So we cannot blame Google 
specifically</em></ins></span>
-    for <span class="removed"><del><strong>users.  Said transmission, not 
wanted or
-      requested by</strong></del></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
-
-    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes 
nonfree</em></ins></span> Android <span class="removed"><del><strong>phones 
(and Windows? laptops): The Wall
+    &lt;p&gt;20 dishonest</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
       Street Journal (in an article blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> and <span 
class="removed"><del><strong>microphone</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares</em></ins></span> in 
<span class="removed"><del><strong>Android
-      phones and laptops&lt;/a&gt;.
+      reports that</strong></del></span> <span class="inserted"><ins><em>apps 
recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls</em></ins></span> and <span class="removed"><del><strong>microphone 
in Android
+      phones</strong></del></span> <span class="inserted"><ins><em>sent 
them</em></ins></span> and <span class="removed"><del><strong>laptops&lt;/a&gt;.
       (I suspect this means Windows laptops.)  Here is
       &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send</strong></del></span> 
<span class="inserted"><ins><em>the responsibility for the injustice 
of</em></ins></span> their <span class="removed"><del><strong>GPS location on
-      remote command and users cannot stop them:</strong></del></span> <span 
class="inserted"><ins><em>being
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span> <span class="inserted"><ins><em>text messages 
and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> on
+      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>the contrary, it
+    worked in various ways to prevent that,</em></ins></span> and <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>deleted these apps after
+    discovering what they did. So we</em></ins></span> cannot <span 
class="removed"><del><strong>stop them:</strong></del></span> <span 
class="inserted"><ins><em>blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
     &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
@@ -1139,20 +1130,21 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>done a better job 
of preventing apps from
-    cheating? There</em></ins></span> is <span class="inserted"><ins><em>no 
systematic way for Google, or Android users,</em></ins></span>
-    to <span class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
+    cheating? There</em></ins></span> is <span class="inserted"><ins><em>no 
systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and 
study</em></ins></span>
-    the <span class="removed"><del><strong>user's computer, 
but</strong></del></span> <span class="inserted"><ins><em>source code somehow 
to determine whether they mistreat users in
-    various ways. If</em></ins></span> it <span 
class="removed"><del><strong>does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>did a good job of this,</em></ins></span> it 
<span class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>could more or less
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
-    enough</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>user's list</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+    enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>source code to the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer, but it does 
surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span> <span class="inserted"><ins><em>source 
code</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1234,7 +1226,7 @@
   <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
     &lt;p&gt;The</em></ins></span> Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user <span class="removed"><del><strong>data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>user data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
   can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
@@ -1242,7 +1234,8 @@
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The</strong></del></span>
+    <span class="inserted"><ins><em>user data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1583,10 +1576,10 @@
   &lt;li&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend 
Cayla</strong></del></span> <span class="inserted"><ins><em>their 
users</em></ins></span> and <span class="removed"><del><strong>i-Que transmit 
       &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
+      a speech recognition company based in</strong></del></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      can remotely control the toys with a mobile phone. This would
       enable crackers to listen in on</strong></del></span>
     <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
@@ -1698,11 +1691,11 @@
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
+    spies on every process running</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>a gamer's computer 
and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>do with cheating.&lt;/p&gt;
+    have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
@@ -1899,42 +1892,42 @@
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
     transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
     Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to</em></ins></span> 
the <span class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition</em></ins></span> is
-    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span class="inserted"><ins><em>not to be 
trusted unless</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from</strong></del></span> <span class="inserted"><ins><em>is done 
by free
-    software in your own computer.&lt;/p&gt;
-
-    &lt;p&gt;In</em></ins></span> its <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>trusted 
unless it is done by free</em></ins></span>
+    software in <span class="removed"><del><strong>the 
car</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>privacy policy, Samsung explicitly confirms that &lt;a
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="inserted"><ins><em>third
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    on their</em></ins></span> users&lt;/a&gt;.&lt;/p&gt;
+
+    <span class="removed"><del><strong>&lt;p&gt;Even if no one 
connects</strong></del></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    <span class="inserted"><ins><em>&lt;p&gt;The report was as of 2014, but we 
don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>get users' formal
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="inserted"><ins><em>get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>physically remove</strong></del></span> 
<span class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
@@ -2200,7 +2193,7 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's "smart" thermostats communicate
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
     all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
       watching</strong></del></span>
@@ -2782,7 +2775,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 07:58:15 $
+$Date: 2018/10/01 09:59:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- proprietary-surveillance.it.po      1 Oct 2018 07:58:15 -0000       1.243
+++ proprietary-surveillance.it.po      1 Oct 2018 09:59:22 -0000       1.244
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3328,9 +3328,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-surveillance.ja-diff.html       1 Oct 2018 07:58:15 -0000       
1.81
+++ proprietary-surveillance.ja-diff.html       1 Oct 2018 09:59:22 -0000       
1.82
@@ -1598,7 +1598,7 @@
     approve sending personal data to the app developer but did not ask
     about sending it to other companies.  This shows the weakness of
     the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should a flashlight app send</em></ins></span> any <span 
class="removed"><del><strong>time. (See</strong></del></span> <span 
class="inserted"><ins><em>information to
+    surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1836,9 +1836,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1863,8 +1862,7 @@
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store</strong></del></span> <span class="inserted"><ins><em>the switch 
to turn</em></ins></span> this <span 
class="removed"><del><strong>information,</strong></del></span> <span 
class="inserted"><ins><em>off has
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
@@ -1872,8 +1870,8 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop 
this,</em></ins></span> but <span class="inserted"><ins><em>any
-    product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch to stop this, 
but</em></ins></span> any <span class="removed"><del><strong>time. 
(See</strong></del></span>
+    <span class="inserted"><ins><em>product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -1896,34 +1894,36 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201710040"&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera,</em></ins></span> if 
<span class="inserted"><ins><em>its
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
     manufacturer can communicate with it, is a surveillance device. &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
     Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on
     the fact that the device is tethered to a server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But</em></ins></span> it <span class="inserted"><ins><em>also 
demonstrates that the device gives the company
+    &lt;p&gt;But it also demonstrates that the device gives the company
     surveillance capability.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>data
-      and hand</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
+    even when</em></ins></span> the <span class="removed"><del><strong>state 
orders</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>to get</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>data
+      and hand</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1939,7 +1939,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+      Rent-to-own computers were programmed</strong></del></span>
     to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1982,99 +1982,82 @@
 
     &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>vibrator minute by
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>the vibrator minute by
     minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
-
-    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate proposed 
response:</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV</strong></del></span> <span class="inserted"><ins><em>labeling
-    standard with which</em></ins></span> manufacturers <span 
class="removed"><del><strong>in spying on 
-      their users:</strong></del></span> <span class="inserted"><ins><em>would 
make statements about</em></ins></span> their <span 
class="removed"><del><strong>&lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked</em></ins></span>
-    and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>changed.&lt;/p&gt;
+    body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn this off,</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
+    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="inserted"><ins><em>information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> it <span 
class="removed"><del><strong>enabled by default
-      is an injustice already.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing 
the</em></ins></span> data <span class="removed"><del><strong>are totally 
inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>may be
+    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
+    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>doesn't really 
matter. If it had sold the data</em></ins></span> to <span 
class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span class="inserted"><ins><em>pay a 
total of C$4m&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span class="inserted"><ins><em>its
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Web activity, and
-      other</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span>
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span> <span class="inserted"><ins><em>way to 
access the data&lt;/a&gt; collected by the
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.</strong></del></span> Nuance <span 
class="inserted"><ins><em>Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>save it and</strong></del></span> 
<span class="inserted"><ins><em>remotely control the toys with a mobile phone. 
This</em></ins></span> would <span class="removed"><del><strong>then have to
-      give it</strong></del></span> <span class="inserted"><ins><em>enable
-    crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span>
-    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>toys</em></ins></span> with <span 
class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it</strong></del></span> <span class="inserted"><ins><em>spy on children 
and adults&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2086,13 +2069,17 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI</em></ins></span> is <span 
class="removed"><del><strong>done
-    by free software</strong></del></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is</em></ins></span> in
+      <span class="removed"><del><strong>range so as to determine that they 
are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -2102,33 +2089,48 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's "smart" thermostats communicate
+    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if it isn't a TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>thermostats communicate
     only through the company's server. They have
-    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports</strong></del></span>
+    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as the risk of an outage (which 
is</em></ins></span> what
-    <span class="inserted"><ins><em>just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>user watches, and</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
+    surveillance,</em></ins></span> and <span 
class="removed"><del><strong>listening</strong></del></span> <span 
class="inserted"><ins><em>danger of sabotage&lt;/a&gt; (of a specific user, or 
of</em></ins></span>
+    all <span class="inserted"><ins><em>users at once), as well 
as</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span class="inserted"><ins><em>risk of 
an outage (which is what
+    just happened).&lt;/p&gt;
+
+    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>internet to another
+    company, Nuance&lt;/a&gt;.  Nuance</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you</em></ins></span> 
can <span class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>do</em></ins></span> it <span 
class="removed"><del><strong>and would then have</strong></del></span>
+    <span class="inserted"><ins><em>using controls right on the 
thermostat.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact 
that</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the
-      <span class="removed"><del><strong>transmission 
reports</strong></del></span> <span class="inserted"><ins><em>security of an 
Amazon device,
+    &lt;p&gt;Crackers found a way</em></ins></span> to
+      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into</em></ins></span> a <span class="removed"><del><strong>404 
error really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>listening device&lt;/a&gt; for them.&lt;/p&gt;
+    turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>server
-      could save</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>data anyway.)&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the US
+    <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span> 
or <span class="removed"><del><strong>some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>cease</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
+    by free software in your own computer.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>switch to turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>product 
in</em></ins></span> that <span class="inserted"><ins><em>country,
+    do you think Amazon would have</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing; the server
+      could save that data anyway.)&lt;/p&gt;
 
-      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;These crackers are probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
@@ -2652,7 +2654,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 07:58:15 $
+$Date: 2018/10/01 09:59:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary-surveillance.ja.po      1 Oct 2018 07:58:15 -0000       1.216
+++ proprietary-surveillance.ja.po      1 Oct 2018 09:59:22 -0000       1.217
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -2814,9 +2814,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary-surveillance.pot        1 Oct 2018 07:58:15 -0000       1.165
+++ proprietary-surveillance.pot        1 Oct 2018 09:59:22 -0000       1.166
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2019,8 +2019,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
 
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
 "
 "surveillance, and danger of sabotage</a> (of a specific user, or of all "
 "users at once), as well as the risk of an outage (which is what just "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.402
retrieving revision 1.403
diff -u -b -r1.402 -r1.403
--- proprietary-surveillance.ru.po      1 Oct 2018 07:58:15 -0000       1.402
+++ proprietary-surveillance.ru.po      1 Oct 2018 09:59:22 -0000       1.403
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 07:55+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-09-30 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -2890,9 +2890,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-tethers.de.po   1 Oct 2018 08:28:39 -0000       1.23
+++ proprietary-tethers.de.po   1 Oct 2018 09:59:22 -0000       1.24
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -74,9 +74,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-tethers.fr.po   1 Oct 2018 08:28:39 -0000       1.39
+++ proprietary-tethers.fr.po   1 Oct 2018 09:59:22 -0000       1.40
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-09-28 08:52+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -74,9 +74,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-tethers.ja-diff.html    1 Oct 2018 08:28:39 -0000       1.13
+++ proprietary-tethers.ja-diff.html    1 Oct 2018 09:59:22 -0000       1.14
@@ -46,7 +46,7 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's "smart" thermostats communicate
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
     all the nasty characteristics of such devices: &lt;a
     
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
@@ -242,7 +242,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 08:28:39 $
+$Date: 2018/10/01 09:59:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-tethers.ja.po   1 Oct 2018 08:28:39 -0000       1.20
+++ proprietary-tethers.ja.po   1 Oct 2018 09:59:22 -0000       1.21
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -66,9 +66,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."

Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-tethers.pot     1 Oct 2018 08:28:39 -0000       1.20
+++ proprietary-tethers.pot     1 Oct 2018 09:59:22 -0000       1.21
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -58,8 +58,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a "
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a "
 
"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
 "
 "surveillance, and danger of sabotage</a> (of a specific user, or of all "
 "users at once), as well as the risk of an outage (which is what just "

Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-tethers.ru.po   1 Oct 2018 08:28:39 -0000       1.44
+++ proprietary-tethers.ru.po   1 Oct 2018 09:59:22 -0000       1.45
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2018-10-01 08:25+0000\n"
+"POT-Creation-Date: 2018-10-01 09:56+0000\n"
 "PO-Revision-Date: 2018-09-27 09:13+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -74,9 +74,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Honeywell's \"smart\" thermostats communicate only through the company's "
-"server. They have all the nasty characteristics of such devices: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+"company's server. They have all the nasty characteristics of such devices: "
+"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
 "outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
 "user, or of all users at once), as well as the risk of an outage (which is "
 "what just happened)."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]