www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/po/malware-webpages.de-diff.htm...


From: GNUN
Subject: www proprietary/po/malware-webpages.de-diff.htm...
Date: Mon, 1 Oct 2018 15:58:12 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/01 15:58:12

Modified files:
        proprietary/po : malware-webpages.de-diff.html 
                         malware-webpages.de.po malware-webpages.fr.po 
                         malware-webpages.pot malware-webpages.ru.po 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
        thankgnus/po   : 2018supporters.de.po 2018supporters.pot 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.pot?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.405&r2=1.406
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2018supporters.de.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2018supporters.pot?cvsroot=www&r1=1.42&r2=1.43

Patches:
Index: proprietary/po/malware-webpages.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-webpages.de-diff.html        25 Jul 2018 02:00:53 
-0000      1.4
+++ proprietary/po/malware-webpages.de-diff.html        1 Oct 2018 19:58:10 
-0000       1.5
@@ -11,7 +11,12 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84 --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ Generated from propr-blurbs.rec. Please do not edit this file manually !
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</em></ins></span>
+--&gt;
 &lt;title&gt;Malware in Webpages
 - GNU Project - Free Software Foundation&lt;/title&gt;
 &lt;style type="text/css" media="print,screen"&gt;&lt;!--
@@ -58,54 +63,146 @@
 many sites collect information that the user sends, via forms or otherwise, but
 here we're not talking about that.&lt;/p&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
 
-  &lt;li&gt;
-    <span class="inserted"><ins><em>&lt;p&gt;Some websites send JavaScript 
code to collect all the user's
-    input, &lt;a 
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
 can then
-        be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT webpages --&gt;
+  &lt;li id="M201807190"&gt;
+    &lt;p&gt;British Airways used &lt;a
+    
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;If you use LibreJS, it will block that malicious Javascript
-    code.&lt;/p&gt;
+  &lt;li id="M201805170"&gt;
+    &lt;p&gt;The Storyful program &lt;a
+    
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
+    on the reporters that use it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201712300"&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+    swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;</em></ins></span>
-    &lt;p&gt;Many web sites
-      &lt;a 
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-      snoop on information that users have typed into a form but not 
sent&lt;/a&gt;.
-    &lt;/p&gt;
+  &lt;li id="M201712210"&gt;</em></ins></span>
+    &lt;p&gt;Many web sites <span class="inserted"><ins><em>use JavaScript 
code</em></ins></span> &lt;a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
+    <span class="inserted"><ins><em>to</em></ins></span> snoop on information 
that users have typed into a
+    form but not <span class="removed"><del><strong>sent&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sent&lt;/a&gt;, in order to learn their identity. 
Some are &lt;a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711150"&gt;
+    &lt;p&gt;Some websites send
+    JavaScript code to collect all the user's input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
+    code.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701060"&gt;
+    &lt;p&gt;When a page uses Disqus
+    for comments, the proprietary Disqus software &lt;a
+    
href="https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook"&gt;loads
+    a Facebook software package into the browser of every anonymous visitor
+    to the page, and makes the page's URL available to 
Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612064"&gt;
+    &lt;p&gt;Online sales, with tracking and surveillance of customers, &lt;a
+    
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
+    businesses to show different people different prices&lt;/a&gt;. Most of
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A
-      &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated the privacy and security of 
283
-      Android VPN apps concluded that &ldquo;in spite of the promises for
-      privacy, security, and anonymity given by the majority of VPN
+
+  &lt;li id="M201611161"&gt;</em></ins></span>
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
       apps&mdash;millions of users may be unawarely subject to poor security
       guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
-    &lt;p&gt;Following is a non-exhaustive list of some proprietary VPN apps 
from the
-      research paper that tracks users and infringes their privacy:&lt;/p&gt;
+    <span class="removed"><del><strong>&lt;p&gt;Following is a non-exhaustive 
list</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;p&gt;Here are two examples, taken from 
the research paper,</em></ins></span> of <span 
class="removed"><del><strong>some</strong></del></span> 
+    proprietary VPN apps <span class="removed"><del><strong>from the
+      research paper</strong></del></span> that <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>use JavaScript to track</em></ins></span> users and 
<span class="removed"><del><strong>infringes</strong></del></span> <span 
class="inserted"><ins><em>infringe</em></ins></span>
+    their privacy:&lt;/p&gt;
+
     &lt;dl&gt;
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the 
users. The
-      stated purpose of the JS injection is to display ads. Uses roughly five
-      tracking libraries. Also, it redirects the user's traffic through
-      valueclick.com (an advertising website).&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
+
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly 
five
-      tracking libraries. Developers of this app have confirmed that the
-      non-premium version of the app does JavaScript injection for tracking
-      the user and displaying ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and
-      &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201603080"&gt;</em></ins></span>
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
+    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
        sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+
+  <span class="inserted"><ins><em>&lt;li id="M201310110"&gt;
+    &lt;p&gt;Flash and JavaScript are used for &lt;a
+    
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210240"&gt;
+    &lt;p&gt;Many web sites rat their visitors to advertising
+    networks that track users.  Of the top 1000 web sites, &lt;a
+    
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/"&gt;84%
+    (as of 5/17/2012) fed their visitors third-party cookies, allowing
+    other sites to track them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201208210"&gt;
+    &lt;p&gt;Many web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
+    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+    tells Google the IP address and the page that was 
visited&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201200000"&gt;
+    &lt;p&gt;Many web sites try to collect users' address books (the user's 
list
+    of other people's phone numbers or email addresses).  This violates
+    the privacy of those other people.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201110040"&gt;
+    &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
+    
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
+    enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even users
+    that don't have Facebook accounts.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201003010"&gt;
+    &lt;p&gt;Flash Player's &lt;a
+    
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
+
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -164,7 +261,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/07/25 02:00:53 $
+$Date: 2018/10/01 19:58:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-webpages.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/malware-webpages.de.po       25 Jul 2018 02:00:53 -0000      
1.8
+++ proprietary/po/malware-webpages.de.po       1 Oct 2018 19:58:10 -0000       
1.9
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2017-12-05 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -72,12 +72,24 @@
 "aufzuerlegen."
 
 #. type: Content of: <div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to present the specifics."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to present the specifics."
 msgstr ""
+"Sollten Sie von einem Beispiel wissen, dass hier genannt werden sollte aber "
+"nicht aufgeführt wird, informieren Sie uns bitte unter <a href=\"mailto:";
+"address@hidden">&lt;address@hidden&gt;</a> darüber. Bitte geben Sie "
+"die URL einer vertrauenswürdigen Referenz (oder zwei) an, um die "
+"Einzelheiten aufzuzeigen."
 
 #. type: Content of: <p>
 msgid ""
@@ -96,6 +108,56 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"British Airways used <a href=\"https://www.theverge.com/2018/7/19/17591732/";
+"british-airways-gdpr-compliance-twitter-personal-data-security\">nonfree "
+"JavaScript on its web site to give other companies personal data on its "
+"customers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
+"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
+"the reporters that use it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | Many web sites {+use JavaScript code+} <a
+# | 
href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
+# | {+to+} snoop on information that users have typed into a form but not
+# | [-sent</a>.-] {+sent</a>, in order to learn their identity. Some are <a
+# | 
href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\";>
+# | getting sued</a> for this.+}
+#, fuzzy
+#| msgid ""
+#| "Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
+#| "company-has-already-logge-1795906081\"> snoop on information that users "
+#| "have typed into a form but not sent</a>."
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"Viele Präsenzen <a href=\"https://gizmodo.com/before-you-hit-submit-this-";
+"company-has-already-logge-1795906081\" title=\"Kashmir Hill und Surya Mattu, "
+"Before You Hit 'Submit,' This Company Has Already Logged Your Personal Data, "
+"unter: https://gizmodo.com/before-you-hit-submit-this-company-has-already-";
+"logge-1795906081, Gizmodo 2017.\">schnüffeln bereits Information aus, die "
+"Besucher erst in Formulare eingegeben, aber noch gar nicht gesendet haben</"
+"a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some websites send JavaScript code to collect all the user's input, <a href="
 "\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
 "personal-data-by-session-replay-scripts/\">which can then be used to "
@@ -110,22 +172,29 @@
 "der gesamten Sitzung verwendet werden können</a>."
 
 #. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious Javascript code."
+# | If you use LibreJS, it will block that malicious Java[-s-]{+S+}cript code.
+#, fuzzy
+#| msgid "If you use LibreJS, it will block that malicious Javascript code."
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
 msgstr "Mit LibreJS wird dieser schädliche JavaScript-Code blockiert."
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
-"company-has-already-logge-1795906081\"> snoop on information that users have "
-"typed into a form but not sent</a>."
+"When a page uses Disqus for comments, the proprietary Disqus software <a "
+"href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-";
+"comments-when-not-logged-in-sends-the-url-to-facebook\">loads a Facebook "
+"software package into the browser of every anonymous visitor to the page, "
+"and makes the page's URL available to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Online sales, with tracking and surveillance of customers, <a href=\"https://";
+"www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-"
+"browsing-history-could-mean-rip-off-prices\">enables businesses to show "
+"different people different prices</a>. Most of the tracking is done by "
+"recording interactions with servers, but proprietary software contributes."
 msgstr ""
-"Viele Präsenzen <a href=\"https://gizmodo.com/before-you-hit-submit-this-";
-"company-has-already-logge-1795906081\" title=\"Kashmir Hill und Surya Mattu, "
-"Before You Hit 'Submit,' This Company Has Already Logged Your Personal Data, "
-"unter: https://gizmodo.com/before-you-hit-submit-this-company-has-already-";
-"logge-1795906081, Gizmodo 2017.\">schnüffeln bereits Information aus, die "
-"Besucher erst in Formulare eingegeben, aber noch gar nicht gesendet haben</"
-"a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -152,9 +221,17 @@
 "die von VPN-Apps verursacht werden, unterliegen könnten.“</a>"
 
 #. type: Content of: <ul><li><p>
+# | [-Following is a non-exhaustive list-]{+Here are two examples, taken from
+# | the research paper,+} of [-some-] proprietary VPN apps [-from the research
+# | paper-] that [-tracks-] {+use JavaScript to track+} users and
+# | infringe[-s-] their privacy:
+#, fuzzy
+#| msgid ""
+#| "Following is a non-exhaustive list of some proprietary VPN apps from the "
+#| "research paper that tracks users and infringes their privacy:"
 msgid ""
-"Following is a non-exhaustive list of some proprietary VPN apps from the "
-"research paper that tracks users and infringes their privacy:"
+"Here are two examples, taken from the research paper, of proprietary VPN "
+"apps that use JavaScript to track users and infringe their privacy:"
 msgstr ""
 "Nachfolgend eine unvollständige Übersicht einiger proprietärer VPN-Apps 
aus "
 "der Forschungsarbeit, die die Nutzer verfolgen und deren Privatsphäre "
@@ -206,6 +283,54 @@
 "mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds The "
 "Guardian 2017.\">so die Leserschaft bisweilen ausschnüffeln</a>."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash and JavaScript are used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites rat their visitors to advertising networks that track users.  "
+"Of the top 1000 web sites, <a href=\"https://www.law.berkeley.edu/research/";
+"bclt/research/privacy-at-bclt/web-privacy-census/\">84% (as of 5/17/2012) "
+"fed their visitors third-party cookies, allowing other sites to track them</"
+"a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites report all their visitors to Google by using the Google "
+"Analytics service, which <a href=\"http://www.pcworld.idg.com.au/";
+"article/434164/"
+"google_analytics_breaks_norwegian_privacy_laws_local_agency_said/\"> tells "
+"Google the IP address and the page that was visited</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites try to collect users' address books (the user's list of other "
+"people's phone numbers or email addresses).  This violates the privacy of "
+"those other people."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Pages that contain &ldquo;Like&rdquo; buttons <a href=\"https://www.smh.com.";
+"au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-"
+"uncovered-20111004-1l61i.html\"> enable Facebook to track visitors to those "
+"pages</a>&mdash;even users that don't have Facebook accounts."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/malware-webpages.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/malware-webpages.fr.po       25 Sep 2018 21:06:12 -0000      
1.13
+++ proprietary/po/malware-webpages.fr.po       1 Oct 2018 19:58:10 -0000       
1.14
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2018-09-02 00:24+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-01 19:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
@@ -91,6 +92,52 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"British Airways used <a href=\"https://www.theverge.com/2018/7/19/17591732/";
+"british-airways-gdpr-compliance-twitter-personal-data-security\">nonfree "
+"JavaScript on its web site to give other companies personal data on its "
+"customers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
+"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
+"the reporters that use it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | Many web sites {+use JavaScript code+} <a
+# | 
href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
+# | {+to+} snoop on information that users have typed into a form but not
+# | [-sent</a>.-] {+sent</a>, in order to learn their identity. Some are <a
+# | 
href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\";>
+# | getting sued</a> for this.+}
+#, fuzzy
+#| msgid ""
+#| "Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
+#| "company-has-already-logge-1795906081\"> snoop on information that users "
+#| "have typed into a form but not sent</a>."
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"De nombreux sites web <a href=\"http://gizmodo.com/before-you-hit-submit-";
+"this-company-has-already-logge-1795906081\">récupèrent l'information que 
les "
+"utilisateurs ont saisie dans un formulaire mais n'ont pas envoyée</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some websites send JavaScript code to collect all the user's input, <a href="
 "\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
 "personal-data-by-session-replay-scripts/\">which can then be used to "
@@ -102,18 +149,29 @@
 "qui permet de reproduire l'ensemble de la session</a>."
 
 #. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious Javascript code."
+# | If you use LibreJS, it will block that malicious Java[-s-]{+S+}cript code.
+#, fuzzy
+#| msgid "If you use LibreJS, it will block that malicious Javascript code."
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
 msgstr "Si vous utilisez LibreJS, il bloquera ce code JavaScript malveillant."
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
-"company-has-already-logge-1795906081\"> snoop on information that users have "
-"typed into a form but not sent</a>."
+"When a page uses Disqus for comments, the proprietary Disqus software <a "
+"href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-";
+"comments-when-not-logged-in-sends-the-url-to-facebook\">loads a Facebook "
+"software package into the browser of every anonymous visitor to the page, "
+"and makes the page's URL available to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Online sales, with tracking and surveillance of customers, <a href=\"https://";
+"www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-"
+"browsing-history-could-mean-rip-off-prices\">enables businesses to show "
+"different people different prices</a>. Most of the tracking is done by "
+"recording interactions with servers, but proprietary software contributes."
 msgstr ""
-"De nombreux sites web <a href=\"http://gizmodo.com/before-you-hit-submit-";
-"this-company-has-already-logge-1795906081\">récupèrent l'information que 
les "
-"utilisateurs ont saisie dans un formulaire mais n'ont pas envoyée</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -133,9 +191,17 @@
 "fallacieuses et des pratiques abusives que ces applis leur infligent. »"
 
 #. type: Content of: <ul><li><p>
+# | [-Following is a non-exhaustive list-]{+Here are two examples, taken from
+# | the research paper,+} of [-some-] proprietary VPN apps [-from the research
+# | paper-] that [-tracks-] {+use JavaScript to track+} users and
+# | infringe[-s-] their privacy:
+#, fuzzy
+#| msgid ""
+#| "Following is a non-exhaustive list of some proprietary VPN apps from the "
+#| "research paper that tracks users and infringes their privacy:"
 msgid ""
-"Following is a non-exhaustive list of some proprietary VPN apps from the "
-"research paper that tracks users and infringes their privacy:"
+"Here are two examples, taken from the research paper, of proprietary VPN "
+"apps that use JavaScript to track users and infringe their privacy:"
 msgstr ""
 "La liste suivante, non exhaustive, est tirée de cet article. Elle 
répertorie "
 "des applis VPN privatrices qui traquent les utilisateurs et portent atteinte "
@@ -184,6 +250,54 @@
 "books-faster-than-women-study-finds\">parfois ce code espionne "
 "l'utilisateur</a>."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash and JavaScript are used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites rat their visitors to advertising networks that track users.  "
+"Of the top 1000 web sites, <a href=\"https://www.law.berkeley.edu/research/";
+"bclt/research/privacy-at-bclt/web-privacy-census/\">84% (as of 5/17/2012) "
+"fed their visitors third-party cookies, allowing other sites to track them</"
+"a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites report all their visitors to Google by using the Google "
+"Analytics service, which <a href=\"http://www.pcworld.idg.com.au/";
+"article/434164/"
+"google_analytics_breaks_norwegian_privacy_laws_local_agency_said/\"> tells "
+"Google the IP address and the page that was visited</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites try to collect users' address books (the user's list of other "
+"people's phone numbers or email addresses).  This violates the privacy of "
+"those other people."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Pages that contain &ldquo;Like&rdquo; buttons <a href=\"https://www.smh.com.";
+"au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-"
+"uncovered-20111004-1l61i.html\"> enable Facebook to track visitors to those "
+"pages</a>&mdash;even users that don't have Facebook accounts."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/malware-webpages.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.pot,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-webpages.pot 25 Jul 2018 02:00:53 -0000      1.7
+++ proprietary/po/malware-webpages.pot 1 Oct 2018 19:58:10 -0000       1.8
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -69,20 +69,62 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"British Airways used <a "
+"href=\"https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security\";>nonfree
 "
+"JavaScript on its web site to give other companies personal data on its "
+"customers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Storyful program <a "
+"href=\"https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch\";>spies
 "
+"on the reporters that use it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a "
+"href=\"https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research\";>
 "
+"swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites use JavaScript code <a "
+"href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
 "
+"to snoop on information that users have typed into a form but not sent</a>, "
+"in order to learn their identity. Some are <a "
+"href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\";>
 "
+"getting sued</a> for this."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some websites send JavaScript code to collect all the user's input, <a "
 
"href=\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/\";>which
 "
 "can then be used to reproduce the whole session</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious Javascript code."
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Many web sites <a "
-"href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
 "
-"snoop on information that users have typed into a form but not sent</a>."
+"When a page uses Disqus for comments, the proprietary Disqus software <a "
+"href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-comments-when-not-logged-in-sends-the-url-to-facebook\";>loads
 "
+"a Facebook software package into the browser of every anonymous visitor to "
+"the page, and makes the page's URL available to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Online sales, with tracking and surveillance of customers, <a "
+"href=\"https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices\";>enables
 "
+"businesses to show different people different prices</a>. Most of the "
+"tracking is done by recording interactions with servers, but proprietary "
+"software contributes."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -98,8 +140,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Following is a non-exhaustive list of some proprietary VPN apps from the "
-"research paper that tracks users and infringes their privacy:"
+"Here are two examples, taken from the research paper, of proprietary VPN "
+"apps that use JavaScript to track users and infringe their privacy:"
 msgstr ""
 
 #. type: Content of: <ul><li><dl><dt>
@@ -133,6 +175,52 @@
 "sometimes this code snoops on readers</a>."
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash and JavaScript are used for <a "
+"href=\"http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/\";>
 "
+"&ldquo;fingerprinting&rdquo; devices</a> to identify users."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites rat their visitors to advertising networks that track users.  "
+"Of the top 1000 web sites, <a "
+"href=\"https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/\";>84%
 "
+"(as of 5/17/2012) fed their visitors third-party cookies, allowing other "
+"sites to track them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites report all their visitors to Google by using the Google "
+"Analytics service, which <a "
+"href=\"http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/\";>
 "
+"tells Google the IP address and the page that was visited</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites try to collect users' address books (the user's list of other "
+"people's phone numbers or email addresses).  This violates the privacy of "
+"those other people."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Pages that contain &ldquo;Like&rdquo; buttons <a "
+"href=\"https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html\";>
 "
+"enable Facebook to track visitors to those pages</a>&mdash;even users that "
+"don't have Facebook accounts."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a "
+"href=\"http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/\";>
 "
+"cookie feature helps web sites track visitors</a>."
+msgstr ""
+
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-webpages.ru.po       25 Jul 2018 16:30:38 -0000      
1.14
+++ proprietary/po/malware-webpages.ru.po       1 Oct 2018 19:58:10 -0000       
1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-webpages.html\n"
-"POT-Creation-Date: 2018-07-25 01:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2018-06-22 08:22+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-01 19:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"
@@ -93,6 +94,52 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"British Airways used <a href=\"https://www.theverge.com/2018/7/19/17591732/";
+"british-airways-gdpr-compliance-twitter-personal-data-security\">nonfree "
+"JavaScript on its web site to give other companies personal data on its "
+"customers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Storyful program <a href=\"https://www.theguardian.com/world/2018/may/17/";
+"revealed-how-storyful-uses-tool-monitor-what-journalists-watch\">spies on "
+"the reporters that use it</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Some JavaScript malware <a href=\"https://www.theverge.";
+"com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"
+"\"> swipes usernames from browser-based password managers</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | Many web sites {+use JavaScript code+} <a
+# | 
href=\"http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081\";>
+# | {+to+} snoop on information that users have typed into a form but not
+# | [-sent</a>.-] {+sent</a>, in order to learn their identity. Some are <a
+# | 
href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege\";>
+# | getting sued</a> for this.+}
+#, fuzzy
+#| msgid ""
+#| "Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
+#| "company-has-already-logge-1795906081\"> snoop on information that users "
+#| "have typed into a form but not sent</a>."
+msgid ""
+"Many web sites use JavaScript code <a href=\"http://gizmodo.com/before-you-";
+"hit-submit-this-company-has-already-logge-1795906081\"> to snoop on "
+"information that users have typed into a form but not sent</a>, in order to "
+"learn their identity. Some are <a href=\"https://www.manatt.com/Insights/";
+"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
+"Allege\"> getting sued</a> for this."
+msgstr ""
+"Многие сайты <a 
href=\"http://gizmodo.com/before-you-hit-submit-this-company-";
+"has-already-logge-1795906081\">подглядывают за тем, что 
пользователи ввели в "
+"форму, но не отправили</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some websites send JavaScript code to collect all the user's input, <a href="
 "\"https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-";
 "personal-data-by-session-replay-scripts/\">which can then be used to "
@@ -104,20 +151,31 @@
 "затем с помощью этого можно воспроизвести 
весь сеанс работы</a>."
 
 #. type: Content of: <ul><li><p>
-msgid "If you use LibreJS, it will block that malicious Javascript code."
+# | If you use LibreJS, it will block that malicious Java[-s-]{+S+}cript code.
+#, fuzzy
+#| msgid "If you use LibreJS, it will block that malicious Javascript code."
+msgid "If you use LibreJS, it will block that malicious JavaScript code."
 msgstr ""
 "Если пользоваться LibreJS, то эти вредоносные 
программы на JavaScript "
 "блокируются."
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Many web sites <a href=\"http://gizmodo.com/before-you-hit-submit-this-";
-"company-has-already-logge-1795906081\"> snoop on information that users have "
-"typed into a form but not sent</a>."
+"When a page uses Disqus for comments, the proprietary Disqus software <a "
+"href=\"https://blog.dantup.com/2017/01/visiting-a-site-that-uses-disqus-";
+"comments-when-not-logged-in-sends-the-url-to-facebook\">loads a Facebook "
+"software package into the browser of every anonymous visitor to the page, "
+"and makes the page's URL available to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Online sales, with tracking and surveillance of customers, <a href=\"https://";
+"www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-"
+"browsing-history-could-mean-rip-off-prices\">enables businesses to show "
+"different people different prices</a>. Most of the tracking is done by "
+"recording interactions with servers, but proprietary software contributes."
 msgstr ""
-"Многие сайты <a 
href=\"http://gizmodo.com/before-you-hit-submit-this-company-";
-"has-already-logge-1795906081\">подглядывают за тем, что 
пользователи ввели в "
-"форму, но не отправили</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -137,9 +195,17 @@
 "VPN</a>&rdquo;."
 
 #. type: Content of: <ul><li><p>
+# | [-Following is a non-exhaustive list-]{+Here are two examples, taken from
+# | the research paper,+} of [-some-] proprietary VPN apps [-from the research
+# | paper-] that [-tracks-] {+use JavaScript to track+} users and
+# | infringe[-s-] their privacy:
+#, fuzzy
+#| msgid ""
+#| "Following is a non-exhaustive list of some proprietary VPN apps from the "
+#| "research paper that tracks users and infringes their privacy:"
 msgid ""
-"Following is a non-exhaustive list of some proprietary VPN apps from the "
-"research paper that tracks users and infringes their privacy:"
+"Here are two examples, taken from the research paper, of proprietary VPN "
+"apps that use JavaScript to track users and infringe their privacy:"
 msgstr ""
 "Далее следует неисчерпывающий список 
некоторых несвободных приложений для "
 "VPN, которые следят за пользователями и 
вторгаются в их личную жизнь:"
@@ -187,6 +253,54 @@
 "study-finds\">программы на JavaScript, которые иногда 
подглядывают за "
 "читателями</a>."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash and JavaScript are used for <a href=\"http://arstechnica.com/";
+"security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-"
+"fingerprinting/\"> &ldquo;fingerprinting&rdquo; devices</a> to identify "
+"users."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites rat their visitors to advertising networks that track users.  "
+"Of the top 1000 web sites, <a href=\"https://www.law.berkeley.edu/research/";
+"bclt/research/privacy-at-bclt/web-privacy-census/\">84% (as of 5/17/2012) "
+"fed their visitors third-party cookies, allowing other sites to track them</"
+"a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites report all their visitors to Google by using the Google "
+"Analytics service, which <a href=\"http://www.pcworld.idg.com.au/";
+"article/434164/"
+"google_analytics_breaks_norwegian_privacy_laws_local_agency_said/\"> tells "
+"Google the IP address and the page that was visited</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Many web sites try to collect users' address books (the user's list of other "
+"people's phone numbers or email addresses).  This violates the privacy of "
+"those other people."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Pages that contain &ldquo;Like&rdquo; buttons <a href=\"https://www.smh.com.";
+"au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-"
+"uncovered-20111004-1l61i.html\"> enable Facebook to track visitors to those "
+"pages</a>&mdash;even users that don't have Facebook accounts."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Flash Player's <a href=\"http://www.imasuper.com/66/technology/flash-cookies-";
+"the-silent-privacy-killer/\"> cookie feature helps web sites track visitors</"
+"a>."
+msgstr ""
+
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary/po/proprietary-surveillance.de.po       1 Oct 2018 09:59:22 
-0000       1.231
+++ proprietary/po/proprietary-surveillance.de.po       1 Oct 2018 19:58:10 
-0000       1.232
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -2153,9 +2153,17 @@
 "unterliegen könnten.“</cite>"
 
 #. type: Content of: <ul><li><p>
+# | Following is a non-exhaustive [-list-] {+list, taken from the research
+# | paper,+} of {+some+} proprietary VPN apps [-from the research paper-] that
+# | [-tracks-] {+track users+} and [-infringes the privacy of users:-]
+# | {+infringe their privacy:+}
+#, fuzzy
+#| msgid ""
+#| "Following is a non-exhaustive list of proprietary VPN apps from the "
+#| "research paper that tracks and infringes the privacy of users:"
 msgid ""
-"Following is a non-exhaustive list of proprietary VPN apps from the research "
-"paper that tracks and infringes the privacy of users:"
+"Following is a non-exhaustive list, taken from the research paper, of some "
+"proprietary VPN apps that track users and infringe their privacy:"
 msgstr ""
 "Im Folgenden eine unvollständige Übersicht proprietärer VPN-Apps aus der "
 "Arbeit, welche Nutzer verfolgt und die Privatsphäre verletzt:"
@@ -2248,7 +2256,7 @@
 # | Injects JavaScript code into HTML pages, and also uses roughly [-5-]
 # | {+five+} tracking libraries. Developers of this app have confirmed that
 # | the non-premium version of the app does JavaScript injection for tracking
-# | and display ads.
+# | {+the user+} and [-display-] {+displaying+} ads.
 #, fuzzy
 #| msgid ""
 #| "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
@@ -2257,7 +2265,8 @@
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly five tracking "
 "libraries. Developers of this app have confirmed that the non-premium "
-"version of the app does JavaScript injection for tracking and display ads."
+"version of the app does JavaScript injection for tracking the user and "
+"displaying ads."
 msgstr ""
 "Fügt JavaScript-Code in HTML-Dokumente ein und nutzt ebenso etwa 5 Tracking-"
 "Bibliotheken. Entwickler haben bestätigt, dass die Nicht-Premium-Version der 
"

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- proprietary/po/proprietary-surveillance.fr.po       1 Oct 2018 11:16:18 
-0000       1.317
+++ proprietary/po/proprietary-surveillance.fr.po       1 Oct 2018 19:58:10 
-0000       1.318
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2018-10-01 13:15+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-01 19:55+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1743,9 +1744,17 @@
 "fallacieuses et des pratiques abusives que ces applis leur infligent. »"
 
 #. type: Content of: <ul><li><p>
+# | Following is a non-exhaustive [-list-] {+list, taken from the research
+# | paper,+} of {+some+} proprietary VPN apps [-from the research paper-] that
+# | [-tracks-] {+track users+} and [-infringes the privacy of users:-]
+# | {+infringe their privacy:+}
+#, fuzzy
+#| msgid ""
+#| "Following is a non-exhaustive list of proprietary VPN apps from the "
+#| "research paper that tracks and infringes the privacy of users:"
 msgid ""
-"Following is a non-exhaustive list of proprietary VPN apps from the research "
-"paper that tracks and infringes the privacy of users:"
+"Following is a non-exhaustive list, taken from the research paper, of some "
+"proprietary VPN apps that track users and infringe their privacy:"
 msgstr ""
 "La liste suivante, non exhaustive, est tirée de cet article. Elle 
répertorie "
 "des applis VPN privatrices qui traquent les utilisateurs et portent atteinte "
@@ -1822,10 +1831,21 @@
 msgstr "WiFi Protector VPN"
 
 #. type: Content of: <ul><li><dl><dd>
+# | Injects JavaScript code into HTML pages, and also uses roughly five
+# | tracking libraries. Developers of this app have confirmed that the
+# | non-premium version of the app does JavaScript injection for tracking
+# | {+the user+} and [-display-] {+displaying+} ads.
+#, fuzzy
+#| msgid ""
+#| "Injects JavaScript code into HTML pages, and also uses roughly five "
+#| "tracking libraries. Developers of this app have confirmed that the non-"
+#| "premium version of the app does JavaScript injection for tracking and "
+#| "display ads."
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly five tracking "
 "libraries. Developers of this app have confirmed that the non-premium "
-"version of the app does JavaScript injection for tracking and display ads."
+"version of the app does JavaScript injection for tracking the user and "
+"displaying ads."
 msgstr ""
 "Injecte du code JavaScript dans les pages HTML et utilise également cinq "
 "bibliothèques de pistage. Ses développeurs ont confirmé que l'injection de 
"

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/proprietary-surveillance.it-diff.html        1 Oct 2018 
09:59:22 -0000       1.71
+++ proprietary/po/proprietary-surveillance.it-diff.html        1 Oct 2018 
19:58:10 -0000       1.72
@@ -207,6 +207,7 @@
   files</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT windows --&gt;
   &lt;li id="M201712110"&gt;
     &lt;p&gt;HP's proprietary operating system &lt;a
     href="http://www.bbc.com/news/technology-42309371"&gt;includes a
@@ -223,11 +224,11 @@
     
href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
     by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
+    &lt;p&gt;The &lt;a
+    
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
-    engineers to access, among other things, registry keys &lt;a
-    href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+    engineers to access, among other things, registry keys</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
     can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -307,24 +308,16 @@
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-    Intel devices will be able</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span 
class="removed"><del><strong>users' files, text input, voice input,
-  location info, contacts, calendar records and web browsing
-  history, as well as automatically connecting the machines to open
-  hotspots and showing targeted ads.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;
-  &lt;a</strong></del></span> <span class="inserted"><ins><em>time, even
+    Intel devices will be able</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span 
class="removed"><del><strong>users' files,</strong></del></span> <span 
class="inserted"><ins><em>time, even
     when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508130"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
     Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
-    the privacy-protection <span 
class="removed"><del><strong>settings.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>settings.&lt;/p&gt;
+    the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507300"&gt;
@@ -332,9 +325,17 @@
     
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
     ships with default settings that show no regard for the privacy of
     its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
-    the users' files, text input, voice input, location info, contacts,
+    the users' files,</em></ins></span> text input, voice input, location 
info, contacts,
     calendar records and web browsing history, as well as automatically
-    connecting the machines to open hotspots and showing targeted 
ads.&lt;/p&gt;
+    connecting the machines to open hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+  Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if a 
user
+  turns off its Bing search and Cortana features, and activates the
+  privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
 
     &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="inserted"><ins><em>look at users' files for the US government
     on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
@@ -414,6 +415,7 @@
       edited&lt;/a&gt;. The</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT macos --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
@@ -491,11 +493,12 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT bios --&gt;
   &lt;li id="M201509220"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found that 90% of</strong></del></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note that</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis</strong></del></span> <span 
class="inserted"><ins><em>specific
+    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
     href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
@@ -517,11 +520,12 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT phones --&gt;
   &lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
-    proprietary <span class="removed"><del><strong>Android apps contained 
recognizable tracking libraries. For</strong></del></span> <span 
class="inserted"><ins><em>software to make sure they can't &ldquo;fool&rdquo;
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
     the monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -564,6 +568,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT ithings --&gt;
   &lt;li id="M201711250"&gt;
     &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
@@ -591,15 +596,16 @@
   &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
+    lots</em></ins></span> of <span class="inserted"><ins><em>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609280"&gt;
     &lt;p&gt;The iMessage app on iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+    a server every phone number that</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>user types into 
it&lt;/a&gt;;</em></ins></span> the <span class="removed"><del><strong>paid 
proprietary apps,</strong></del></span>
+    <span class="inserted"><ins><em>server records these numbers for at least 
30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
@@ -612,8 +618,8 @@
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>paid proprietary 
apps,</strong></del></span>
-    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
@@ -627,94 +633,91 @@
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
     security to get at them,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span 
class="removed"><del><strong>are not in fact</strong></del></span> <span 
class="inserted"><ins><em>through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span>
+  It also uses</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>that word is &ldquo;exploit&rdquo;; nearly always 
that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+  &lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
-    for <span class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here is the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    for <span class="removed"><del><strong>that word</strong></del></span> 
<span class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the &lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+  &lt;p&gt;Apps for BART</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
+    &lt;p&gt;The</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets</em></ins></span> stores <span 
class="removed"><del><strong>or played by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;</em></ins></span>
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' 
personal</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
+  &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the</em></ins></span> data <span 
class="removed"><del><strong>to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Either Apple helps the NSA snoop</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>all the 
data in an iThing, or it
+    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>can be
-    turned off.&lt;/p&gt;
+  &lt;li id="M201308080"&gt;
+    &lt;p&gt;The iThing also &lt;a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one</strong></del></span> can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
+    turned off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span class="inserted"><ins><em>also a feature for 
web sites</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on</strong></del></span> 
<span class="inserted"><ins><em>track</em></ins></span> users, <span 
class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
-    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites to</em></ins></span> track 
<span class="removed"><del><strong>users by</strong></del></span> <span 
class="inserted"><ins><em>users, which is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or 
played</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled</em></ins></span> by <span class="removed"><del><strong>TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default&lt;/a&gt;.  (That article talks about iOS 6, 
but it is
+    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
+       data</strong></del></span>
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;
-    necessary</em></ins></span> to <span class="removed"><del><strong>truly 
protect people's privacy, we must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>verification code Apple sends
-    to it.&lt;/p&gt;
+    necessary</em></ins></span> to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that</strong></del></span> install <span 
class="inserted"><ins><em>even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>verification code 
Apple sends</em></ins></span>
+    to <span class="removed"><del><strong>legitimize actions like this.  At 
this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -725,17 +728,23 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT android --&gt;
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
+    &lt;p&gt;Android tracks location for</em></ins></span> Google <span 
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="removed"><del><strong>information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sold with spyware sending lots</em></ins></span> of <span 
class="removed"><del><strong>hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -758,10 +767,10 @@
     &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
   behavioral</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>they send so much data that their
-    transmission is a substantial expense for users.  Said transmission,
-    not wanted or requested by the user, clearly must constitute 
spying</em></ins></span>
-    of <span class="removed"><del><strong>their users with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>some 
kind.&lt;/p&gt;</em></ins></span>
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>transmission is a substantial expense for 
users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
@@ -799,170 +808,113 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
     &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when
-    they are sold.  Some Motorola phones modify Android to &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    they are sold.  Some Motorola phones modify Android to &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
       send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a
-      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201111170"&gt;
+    &lt;p&gt;Some</em></ins></span> manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier <span 
class="removed"><del><strong>IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-&lt;!-- #SpywareOnMobiles --&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT e-readers --&gt;
+  &lt;li id="M201603080"&gt;
+    &lt;p&gt;E-books can contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
       &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
+      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    send</em></ins></span> personal data to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola</em></ins></span> phone <span 
class="removed"><del><strong>number that the user types into it&lt;/a&gt;; the 
server records these numbers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens</em></ins></span> for <span class="removed"><del><strong>at least 
30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>voice all the 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>server records these numbers for at 
least 30
+        days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="inserted"><ins><em>users that install</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo;</em></ins></span> of 
<span class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>is not enough</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading</em></ins></span> the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo; that spell out 
what</em></ins></span>
-    they <span class="removed"><del><strong>make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make</strong></del></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should clearly 
and
-    honestly identify</em></ins></span> the
-      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, 
instead</em></ins></span> of <span class="removed"><del><strong>iOS&lt;/a&gt;. 
The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span>
-    <span class="inserted"><ins><em>hiding</em></ins></span> it <span 
class="removed"><del><strong>still counts as</strong></del></span> <span 
class="inserted"><ins><em>in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="inserted"><ins><em>&lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general</em></ins></span> surveillance <span 
class="removed"><del><strong>functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of</strong></del></span> 
<span class="inserted"><ins><em>package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes</em></ins></span> this <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201410080"&gt;
-    &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span class="removed"><del><strong>many 
celebrities&lt;/a&gt;. They needed</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
-      security</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>get at 
them, but NSA can access any of them through</strong></del></span> <span 
class="inserted"><ins><em>check DRM!&lt;/p&gt;
+    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving the code Apple
+      sends</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>check DRM!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212031"&gt;
-    &lt;p&gt;The Electronic Frontier Foundation has examined and 
found</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
-    kinds of surveillance</em></ins></span> in <span 
class="removed"><del><strong>iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>Swindle</em></ins></span> and <span 
class="removed"><del><strong>get</strong></del></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>e-readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
-      is still true</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212031"&gt;
+    &lt;p&gt;The Electronic Frontier Foundation has examined and found &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
+    kinds</em></ins></span> of <span class="inserted"><ins><em>surveillance 
in</em></ins></span> the <span class="removed"><del><strong>most popular 
iOS</strong></del></span> <span class="inserted"><ins><em>Swindle and other 
e-readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
@@ -978,94 +930,123 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT apps --&gt;
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span>
+    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="inserted"><ins><em>on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
+    record the user's</em></ins></span> location <span 
class="removed"><del><strong>information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
+    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>will 
be tricked by the misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>user's movements and 
listens through</em></ins></span> the <span class="removed"><del><strong>data 
in an iThing,
-      or</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
 
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>user's 
movements</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>totally 
incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem to exist 
for</strong></del></span> no
-      <span class="removed"><del><strong>possible purpose other than 
surveillance&lt;/a&gt;.  Here is</strong></del></span> <span 
class="inserted"><ins><em>way to save
-    a recording. But I can't be sure from</em></ins></span> the
-      <span class="removed"><del><strong>&lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>act</em></ins></span> as <span 
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>spies 
for licensing enforcement.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>no</em></ins></span> way to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
+    a
+      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>recording. But I 
can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied</em></ins></span> by <span 
class="removed"><del><strong>sending hidden text messages which enable 
them</strong></del></span> <span class="inserted"><ins><em>researchers were 
found</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span 
class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>apps were
-    found to insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>the 5,855 Android 
apps studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>get at them, 
but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>snooping,</em></ins></span> in <span 
class="removed"><del><strong>iThings:
+      the &lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is,
+      and get</strong></del></span> <span class="inserted"><ins><em>these 
proprietary apps whose
+    source code they cannot look at.  The</em></ins></span> other <span 
class="removed"><del><strong>info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>off, listen</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
-    need</em></ins></span> to <span class="inserted"><ins><em>get rid 
of</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>read</strong></del></span> the 
<span class="removed"><del><strong>contact list. This malware is designed to
-      disguise itself</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps</em></ins></span> 
from <span class="removed"><del><strong>investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come with</strong></del></span> <span 
class="inserted"><ins><em>the free software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
 <span class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>also 
a feature for web sites</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need</em></ins></span> to <span class="removed"><del><strong>track users, 
which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span> <span class="inserted"><ins><em>get rid of 
the proprietary software&mdash;both proprietary
+    Android</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but it
+      is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> the 
<span class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201804020"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the <span class="removed"><del><strong>data in</strong></del></span> <span 
class="inserted"><ins><em>user if</em></ins></span> an <span 
class="removed"><del><strong>iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which</em></ins></span> users <span class="removed"><del><strong>can't 
delete&lt;/a&gt;,
-      and they send</strong></del></span> <span class="inserted"><ins><em>are 
HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr should not have</em></ins></span> so much <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>information about its users.
-    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>their transmission</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;
+    which users are HIV-positive, then provides the 
information</em></ins></span> to <span class="removed"><del><strong>exist for no
+      possible purpose</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to 
each</em></ins></span>
+    other <span class="inserted"><ins><em>but not to the server's 
database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+    spy on users even more</em></ins></span> than <span 
class="removed"><del><strong>surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>users expected. It 
&lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
@@ -1074,131 +1055,150 @@
 
   &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps</em></ins></span>
-    is <span class="inserted"><ins><em>pervasive and sometimes very clever. 
Some trackers can &lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a
-      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted or
-      requested</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store</em></ins></span> by <span 
class="removed"><del><strong>the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
+    is <span class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt;</em></ins></span> 
in <span class="removed"><del><strong>Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads</em></ins></span> all <span class="inserted"><ins><em>phone 
numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>words
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>user's address
+    book</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,</strong></del></span> <span class="inserted"><ins><em>developer's 
server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that</strong></del></span> <span class="inserted"><ins><em>apps 
recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS</strong></del></span>
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls</em></ins></span> and <span class="removed"><del><strong>microphone 
in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>sent 
them</em></ins></span> and <span class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span> <span class="inserted"><ins><em>text messages 
and emails to snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> on
-      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>the contrary, it
-    worked in various ways to prevent that,</em></ins></span> and <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>deleted these apps after
-    discovering what they did. So we</em></ins></span> cannot <span 
class="removed"><del><strong>stop them:</strong></del></span> <span 
class="inserted"><ins><em>blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
-
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says it will eventually require all new portable phones
-      to</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and</em></ins></span> text messages <span 
class="removed"><del><strong>which enable them</strong></del></span> <span 
class="inserted"><ins><em>and emails</em></ins></span> to <span 
class="removed"><del><strong>turn the phones</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google</em></ins></span> have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>and off, listen</strong></del></span> 
<span class="inserted"><ins><em>the contrary, it
+    worked in various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>responsibility 
for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span> <span class="inserted"><ins><em>done a better job 
of preventing apps from
-    cheating? There</em></ins></span> is <span class="inserted"><ins><em>no 
systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>no systematic way for Google, or Android 
users,</em></ins></span>
+    to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code for these 
apps,</em></ins></span> and <span class="inserted"><ins><em>study
+    the source code somehow to determine whether</em></ins></span> they <span 
class="removed"><del><strong>send so much data that their transmission 
is</strong></del></span> <span class="inserted"><ins><em>mistreat users in
+    various ways. If it did</em></ins></span> a
+      <span class="removed"><del><strong>substantial expense for users.  Said 
transmission, not wanted</strong></del></span> <span 
class="inserted"><ins><em>good job of this, it could more</em></ins></span> or
+      <span class="removed"><del><strong>requested by</strong></del></span> 
<span class="inserted"><ins><em>less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>user, clearly</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>data on the user's computer, but it does 
surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> <span class="inserted"><ins><em>source 
code</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="removed"><del><strong>user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    Google to protect us. We</em></ins></span> must <span 
class="removed"><del><strong>constitute spying</strong></del></span> <span 
class="inserted"><ins><em>demand release</em></ins></span> of <span 
class="removed"><del><strong>some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>source code to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by a paywall)
+      reports that</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
     on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>remotely activate the GPS and microphone 
in</strong></del></span> <span class="inserted"><ins><em>only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>stores or 
played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A study found 234</em></ins></span> Android
+      <span class="removed"><del><strong>phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here is</strong></del></span> 
<span class="inserted"><ins><em>apps that track users by</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704260"&gt;</em></ins></span>
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and users cannot stop them:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> <span 
class="inserted"><ins><em>demands</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>personal data in the 
device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704190"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+    the app would record the names of the audio files users 
listen</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span>
+    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    If the fine print</em></ins></span> of <span 
class="removed"><del><strong>data on</strong></del></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</strong></del></span>
 <span class="inserted"><ins><em>app said that users gave consent for this,
+    would that make</em></ins></span> it <span 
class="removed"><del><strong>tries</strong></del></span> <span 
class="inserted"><ins><em>acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
+    the <span class="removed"><del><strong>user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>do lots</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by 
+    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude</em></ins></span>
+    to <span class="inserted"><ins><em>transmit users'</em></ins></span> 
personal data <span class="removed"><del><strong>in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1226,7 +1226,7 @@
   <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
     &lt;p&gt;The</em></ins></span> Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  <span class="removed"><del><strong>user data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    user data to a Chinese <span 
class="removed"><del><strong>company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
   can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
@@ -1234,8 +1234,7 @@
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The</strong></del></span>
-    <span class="inserted"><ins><em>user data to a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1248,23 +1247,31 @@
     massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
-    &lt;p&gt;A &lt;a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy and security of
+    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio</strong></del></span> 
<span class="inserted"><ins><em>investigated the privacy</em></ins></span> and 
<span class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what</strong></del></span> <span 
class="inserted"><ins><em>security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
+    apps&mdash;millions of</em></ins></span> users <span 
class="removed"><del><strong>post on various sites</strong></del></span> <span 
class="inserted"><ins><em>may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
-    the research paper that tracks and infringes the privacy of 
users:&lt;/p&gt;
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
 
     &lt;dl&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      &lt;dd&gt;Includes tracking libraries</em></ins></span> such as <span 
class="removed"><del><strong>Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>NativeX</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Appflood,
       meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
@@ -1291,20 +1298,22 @@
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
       five tracking libraries. Developers of this app have confirmed that
       the non-premium version of the app does JavaScript injection for
-      tracking and display ads.&lt;/dd&gt;
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's</em></ins></span> new voice messaging app &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's</em></ins></span> new Magic Photo app &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;</em></ins></span>
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
     and suggests you to share the picture you take according to who is
     in the frame.&lt;/p&gt;
@@ -1318,7 +1327,9 @@
     even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201605310"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
     &lt;p&gt;Facebook's app listens all the time, &lt;a
     
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
@@ -1330,60 +1341,41 @@
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
     spy on many sorts of data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that include &lt;a
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps that include &lt;a
     
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
     such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> the <span 
class="removed"><del><strong>picture you take according to who
-      is</strong></del></span> <span class="inserted"><ins><em>app's 
functionality, was &lt;a
+    unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found</em></ins></span> in the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures</strong></del></span> 
<span class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they</em></ins></span> are <span 
class="removed"><del><strong>likely</strong></del></span> <span 
class="inserted"><ins><em>not free software.  The clear way</em></ins></span>
-    to <span class="removed"><del><strong>be
-      sent across</strong></del></span> <span class="inserted"><ins><em>say 
&ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
-    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73%</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>47%</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>mobile 
applications, from Android and iOS
+    &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
-    third parties.&lt;/p&gt;</em></ins></span>
+    third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+  &lt;li id="M201508210"&gt;
     &lt;p&gt;Like</em></ins></span> most &ldquo;music screaming&rdquo; 
disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
@@ -1477,25 +1469,25 @@
     approve sending personal data to the app developer but did not ask
     about sending it to other companies.  This shows the weakness of
     the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should a <span class="removed"><del><strong>flashlight
-      app send any</strong></del></span> <span 
class="inserted"><ins><em>flashlight app send any information to
+    surveillance: why should a flashlight app send any information to
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201212100"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
     &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
     
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT skype --&gt;
   &lt;li id="M201307110"&gt;
     &lt;p&gt;Skype contains &lt;a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
@@ -1507,11 +1499,15 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT games --&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
@@ -1529,42 +1525,60 @@
 
   &lt;li id="M201711070"&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends</em></ins></span>
-    information to <span class="removed"><del><strong>anyone?  A free software 
flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201611070"&gt;
+  &lt;li id="M201611070"&gt;
     &lt;p&gt;nVidia's</em></ins></span> proprietary GeForce Experience &lt;a
     
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
     users identify themselves and then sends personal data about them to
     nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
-    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage to spy through it 
too&lt;/a&gt;.
-      Here's information</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop</em></ins></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    &lt;p&gt;Many &lt;a
+    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop on their users and report to the
+    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
+
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509160"&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
+    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users and their users'
+    friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    collected by various cr&hellip;apps and sites made by different
+    companies.&lt;/p&gt;
+
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use the same tactics.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201401280"&gt;
+    &lt;p&gt;Angry</em></ins></span> Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies, and the NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on &lt;a
+    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+
+    &lt;p&gt;&lt;a
+    
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1574,88 +1588,128 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend 
Cayla</strong></del></span> <span class="inserted"><ins><em>their 
users</em></ins></span> and <span class="removed"><del><strong>i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
       can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in on</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
-
-    &lt;p&gt;A game console is</em></ins></span> a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>computer,</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;</em></ins></span>
+      enable crackers to listen in on a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
        was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
     
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
+      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
+    &lt;p&gt;Blizzard Warden is</em></ins></span> a <span 
class="removed"><del><strong>person's
       body), as well as the vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect</em></ins></span> a <span class="removed"><del><strong>labeling
-      standard with which manufacturers would make 
statements</strong></del></span> <span class="inserted"><ins><em>wide range of 
data</em></ins></span> about their <span class="removed"><del><strong>products, 
rather than free software which</strong></del></span> users <span 
class="removed"><del><strong>could have
-      checked</strong></del></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
+    &lt;p&gt;Note the totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>hidden
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software</strong></del></span> <span 
class="inserted"><ins><em>gamer's computer and sniffs a
+    good deal of personal data&lt;/a&gt;, including lots of 
activities</em></ins></span> which <span class="removed"><del><strong>users 
could</strong></del></span>
+    have
+      <span class="removed"><del><strong>checked and 
changed.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with cheating.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
     
-    &lt;p&gt;The company that made the vibrator
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT stings --&gt;
+  &lt;li id="M201708280"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>company that made the 
vibrator
       &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>bad security in many Internet</em></ins></span> of 
<span class="removed"><del><strong>personal information about 
how</strong></del></span> <span class="inserted"><ins><em>Stings devices allows 
&lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the</em></ins></span> people <span 
class="removed"><del><strong>used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that</strong></del></span> <span 
class="inserted"><ins><em>their users'
-    friends and associates&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company's statement</strong></del></span> that <span 
class="removed"><del><strong>it was anonymizing the data 
may</strong></del></span> <span class="inserted"><ins><em>use 
them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do</em></ins></span> it <span 
class="removed"><del><strong>was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>through ad networks that merge</em></ins></span> the 
data <span class="removed"><del><strong>may be
-      true, but it doesn't really matter. If it had sold 
the</strong></del></span>
-    <span class="inserted"><ins><em>collected by various cr&hellip;apps and 
sites made by different
-    companies.&lt;/p&gt;
+    &lt;p&gt;Don't</em></ins></span> be
+      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold the data to</strong></del></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>sucker&mdash;reject all</em></ins></span> the 
<span class="removed"><del><strong>data broker would have been 
able</strong></del></span> <span class="inserted"><ins><em>stings.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see</em></ins></span> out
+      <span class="removed"><del><strong>who</strong></del></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
 
-    &lt;p&gt;They use this</em></ins></span> data to <span 
class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span> 
<span class="inserted"><ins><em>manipulate people</em></ins></span> to <span 
class="removed"><del><strong>figure out</strong></del></span> <span 
class="inserted"><ins><em>buy things, and hunt for
-    &ldquo;whales&rdquo;</em></ins></span> who <span 
class="removed"><del><strong>the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered</strong></del></span> <span 
class="inserted"><ins><em>can be led</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>spend</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>lot</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>money. They also
-    use</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>game 
play for specific players.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT tvsets --&gt;
+  &lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, games that cost money
-    can use</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>same tactics.&lt;/p&gt;
+    &lt;p&gt;We link to the article for the facts it presents. It
+    is too bad that the article finishes by advocating the
+    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and the <span 
class="removed"><del><strong>FBI could listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if the image is coming from the user's own 
computer,</em></ins></span>
+    the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>TV reports what it 
is. The existence of</em></ins></span> a way to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
+    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web</em></ins></span> and <span 
class="removed"><del><strong>the FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>TV advertisements play inaudible
+    sounds</em></ins></span> to <span class="removed"><del><strong>these 
conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>be picked up</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>NSA takes 
advantage</em></ins></span>
-    to spy <span class="inserted"><ins><em>through it too&lt;/a&gt;.  Here's 
information</em></ins></span> on <span class="removed"><del><strong>children 
and adults&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware running</em></ins></span>
+    on <span class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1665,110 +1719,92 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-    more</em></ins></span> spyware <span class="removed"><del><strong>via 
BIOS&lt;/a&gt; on Windows installs.
-Note that the specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>range so as to 
determine</em></ins></span> that <span class="removed"><del><strong>the 
specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers can correlate ads with Web activity, and 
other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since</strong></del></span> <span class="inserted"><ins><em>a hidden
-    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
+  &lt;li id="M201511060"&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers</em></ins></span> in <span class="removed"><del><strong>its 
own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>a gamer's computer 
and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing to do with cheating.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
-
-
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows</strong></del></span> <span class="inserted"><ins><em>their 
users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Specifically, it</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
+    link them your IP address&lt;/a&gt; so that advertisers</em></ins></span> 
can <span class="removed"><del><strong>collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>track you
+    across devices.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;It is possible to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off, but having</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>enabled by default
+    is an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
       Microsoft changed Skype</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to the article</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
+    being watched by advertisers. By combining TV viewing
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the facts it presents. It
-    is too bad that the article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users</em></ins></span> to <span 
class="removed"><del><strong>place</strong></del></span> new <span 
class="removed"><del><strong>items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on</strong></del></span> <span 
class="inserted"><ins><em>Netflix.</em></ins></span> The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1780,74 +1816,66 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>image is coming from the user's own computer,
-    the TV reports what</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>is. The existence of a way to 
disable</em></ins></span> the <span class="removed"><del><strong>manufacturer 
is using</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if</em></ins></span> it 
<span class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what people are</em></ins></span> watching&lt;/a&gt;, even <span 
class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span 
class="inserted"><ins><em>if</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>isn't a TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds to be picked up by proprietary malware running
-    on other devices</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
-    are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>contain Javascript code,</strong></del></span> 
<span class="inserted"><ins><em>correlate ads with Web 
activity,</em></ins></span> and <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only the
-      Kindle:</strong></del></span> <span class="inserted"><ins><em>spying on 
their users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-    &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so that advertisers can track you
-    across devices.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
+    snoops on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>what programs people watch, and even what they 
wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
+      Kindle:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop 
on</em></ins></span> what <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>users watch&lt;/a&gt;.  The TVs did not do 
that when first sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to</em></ins></span> the <span class="removed"><del><strong>e-reader 
used</strong></del></span> <span class="inserted"><ins><em>600 millions social 
media profiles the company
-    already monitors. Tivo customers are unaware they're
-    being watched</em></ins></span> by <span class="removed"><del><strong>most 
US libraries,</strong></del></span> <span 
class="inserted"><ins><em>advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>new 
combined surveillance by default.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>e-reader used
+      by most</strong></del></span> US <span 
class="removed"><del><strong>libraries,</strong></del></span> <span 
class="inserted"><ins><em>or some
+    other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</em></ins></span>
+    data <span class="inserted"><ins><em>containing sensitive information will 
be transmitted</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
+    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1859,71 +1887,34 @@
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
+    snooping <span 
class="removed"><del><strong>devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>all the 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to the US or some
-    other government.&lt;/p&gt;
-
-    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The</strong></del></span> <span class="inserted"><ins><em>trusted 
unless it is done by free</em></ins></span>
-    software in <span class="removed"><del><strong>the 
car</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their</em></ins></span> users&lt;/a&gt;.&lt;/p&gt;
-
-    <span class="removed"><del><strong>&lt;p&gt;Even if no one 
connects</strong></del></span>
-
-    <span class="inserted"><ins><em>&lt;p&gt;The report was as of 2014, but we 
don't expect this has got
+    &lt;p&gt;That's easy to do because the system</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect 
this</em></ins></span> has <span class="removed"><del><strong>no authentication 
when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="inserted"><ins><em>get users' formal
+    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software in the car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products</em></ins></span> to <span 
class="inserted"><ins><em>get users' formal
     consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car remotely, the cell phone
     modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>TV will
@@ -1937,152 +1928,149 @@
 
   &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software</strong></del></span> <span 
class="inserted"><ins><em>id="M201405200"&gt;
     &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span> <span 
class="inserted"><ins><em>LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
+      which is made available to car manufacturers, insurance 
companies,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
 
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of proprietary surveillance. These systems are an
+      &lt;p&gt;The case of toll-collection systems, mentioned 
in</strong></del></span> <span class="inserted"><ins><em>the switch to 
turn</em></ins></span> this <span class="removed"><del><strong>article, is not
+      really</strong></del></span> <span class="inserted"><ins><em>off has
+    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span class="removed"><del><strong>matter of 
proprietary surveillance. These systems are an
       intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>user 
watches,</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store</strong></del></span> <span class="inserted"><ins><em>switch to 
turn</em></ins></span> this <span class="removed"><del><strong>information, but 
if</strong></del></span> <span class="inserted"><ins><em>off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data
-      <span class="removed"><del><strong>and hand</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    snoops on</em></ins></span> other
+      <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware in the car.&lt;/p&gt;&lt;/li&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span> <span class="inserted"><ins><em>stop this, but any
-    product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine the car's location at</strong></del></span> <span 
class="inserted"><ins><em>stop this, but</em></ins></span> any <span 
class="removed"><del><strong>time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store</strong></del></span>
+    <span class="inserted"><ins><em>product could spy</em></ins></span> this 
<span class="removed"><del><strong>information, but if the state orders 
it</strong></del></span> <span class="inserted"><ins><em>way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span class="removed"><del><strong>data about 
the user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+  &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera</em></ins></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the 
<span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people who 
are watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT cameras --&gt;
   &lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is</em></ins></span> a <span 
class="removed"><del><strong>woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>surveillance device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that</strong></del></span>
+    manufacturer can communicate with it, is a surveillance 
device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera</em></ins></span> is <span 
class="removed"><del><strong>viewed</strong></del></span> <span 
class="inserted"><ins><em>an example&lt;/a&gt;.&lt;/p&gt;
+    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</em></ins></span> on <span class="removed"><del><strong>them, and not 
just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span>
-    the <span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>fact that the device</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>tethered to a server.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on
+    the fact that the device is tethered to a server.&lt;/p&gt;
 
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
-    proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;More</em></ins></span> about
+    <span class="inserted"><ins><em>proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates that</em></ins></span> the <span 
class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>device 
gives</em></ins></span> the <span class="removed"><del><strong>TV reports what 
it is. The existence</strong></del></span> <span 
class="inserted"><ins><em>company
-    surveillance capability.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>device gives the company
+    surveillance capability.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to
-    <span class="removed"><del><strong>disable the 
surveillance,</strong></del></span> <span class="inserted"><ins><em>watch 
through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,</em></ins></span>
-    even <span class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>when the &ldquo;owner&rdquo; 
switches</em></ins></span> it <span class="removed"><del><strong>were not 
hidden</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT toys --&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't 
act</em></ins></span> as <span class="inserted"><ins><em>a
-    listening device, remote changes to the code could surely 
convert</em></ins></span> it
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act 
as</em></ins></span> a <span class="removed"><del><strong>woman came 
up</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>code could surely 
convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;A remote-control sex toy</em></ins></span> was
+<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span class="inserted"><ins><em>its 
users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>found to make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through</em></ins></span> the <span 
class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span 
class="inserted"><ins><em>temperature</em></ins></span> of <span 
class="removed"><del><strong>a way to
+    disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>vibrator minute by
+    minute (thus, indirectly, whether</em></ins></span> it was <span 
class="removed"><del><strong>in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>surrounded by a person's
+    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements 
about</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
@@ -2107,66 +2095,57 @@
     &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
     user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
-
-    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
-      the 600 millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the company <span class="removed"><del><strong>already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement</strong></del></span> <span class="inserted"><ins><em>has 
been ordered to pay a total of C$4m&lt;/a&gt; to its
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span class="inserted"><ins><em>microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
+    Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could 
listen</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201612060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
-      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
     company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can
-      <span class="removed"><del><strong>correlate ads</strong></del></span> 
<span class="inserted"><ins><em>remotely control the toys</em></ins></span> 
with <span class="removed"><del><strong>Web activity,</strong></del></span> 
<span class="inserted"><ins><em>a mobile phone. This would enable
-    crackers to listen in on a child's speech,</em></ins></span> and
-      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even speak into the
-    toys themselves.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control the toys</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>a mobile 
phone. This would enable
+    crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2177,13 +2156,19 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT drones --&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is</em></ins></span> in
+      <span class="removed"><del><strong>range so as to determine that they 
are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -2192,8 +2177,13 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT home --&gt;
   &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
+    &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and
+      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if it isn't a TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>thermostats communicate
     only through the company's server. They have
     all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
       watching</strong></del></span>
@@ -2253,7 +2243,7 @@
     a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
       &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying
-    on you.  Even if</em></ins></span> it <span class="inserted"><ins><em>is 
air-gapped, it could be saving up records
+    on you.  Even if it is air-gapped,</em></ins></span> it <span 
class="inserted"><ins><em>could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2278,6 +2268,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT wearables --&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
@@ -2294,6 +2285,7 @@
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT watches --&gt;
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
@@ -2330,6 +2322,7 @@
 &lt;li&gt;&lt;p&gt;Users</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT cars --&gt;
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
@@ -2360,25 +2353,25 @@
 If</strong></del></span> <span class="inserted"><ins><em>do 
because</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>system has no 
authentication
     when accessed through</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
 would that make</strong></del></span> <span class="inserted"><ins><em>modem.  
However, even if</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
-    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal to design</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the 
cell phone modem
-    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track the car's movements all</em></ins></span> the 
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</em></ins></span> to the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>time;
-    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it is possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
@@ -2425,6 +2418,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT virtual --&gt;
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
     creates the potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
@@ -2462,6 +2456,7 @@
   &lt;li&gt;&lt;p&gt;When</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT websites --&gt;
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
@@ -2550,125 +2545,136 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger that
-      &lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT javascript --&gt;
   &lt;li id="M201807190"&gt;
-    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-       activates microphones and transmits audio</strong></del></span>
+    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends Google every URL</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site</em></ins></span> to <span 
class="inserted"><ins><em>give other companies personal data 
on</em></ins></span>
-    its <span 
class="removed"><del><strong>servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>customers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    JavaScript on its web site to give other companies personal data on
+    its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome makes it 
easy for an extension to do</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201712300"&gt;
-    &lt;p&gt;Some JavaScript malware</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+  &lt;li id="M201712300"&gt;
+    &lt;p&gt;Some JavaScript malware &lt;a
+    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712210"&gt;
     &lt;p&gt;Many web sites use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop</em></ins></span> on <span class="inserted"><ins><em>information 
that users have typed into a
-    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
+    to snoop on information that users have</em></ins></span> typed <span 
class="removed"><del><strong>in&lt;/a&gt;, one key at</strong></del></span> 
<span class="inserted"><ins><em>into</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>form but not sent&lt;/a&gt;, in order to 
learn their identity. Some are &lt;a
     
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711150"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome includes 
a module that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711150"&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all</em></ins></span> the user's <span 
class="removed"><del><strong>browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>input, &lt;a
-    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    JavaScript code to collect all the user's input,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;</em></ins></span>
+    code.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInFlash"&gt;Spyware in 
Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInFlash"&gt;Flash&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT flash --&gt;
   &lt;li id="M201310110"&gt;
-    &lt;p&gt;Flash and JavaScript are used for &lt;a
+    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>transmits audio</strong></del></span> <span 
class="inserted"><ins><em>JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201003010"&gt;
-    &lt;p&gt;Flash</em></ins></span> Player's &lt;a
+    &lt;p&gt;Flash Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash is also used for
-      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
-&lt;/ul&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
-is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-&lt;!-- #SpywareEverywhere --&gt;</strong></del></span>
+&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT chrome --&gt;
+  &lt;li id="M201507280"&gt;
+    &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware in Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The natural</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201507280"&gt;
-    &lt;p&gt;Google Chrome makes it easy for an</em></ins></span> extension 
<span class="removed"><del><strong>of monitoring people through 
-      &ldquo;their&rdquo; phones is &lt;a 
-      
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software</strong></del></span> to <span 
class="removed"><del><strong>make sure they can't 
&ldquo;fool&rdquo;</strong></del></span> <span class="inserted"><ins><em>do 
&lt;a
-    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on</em></ins></span> the 
-      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Flash Player's
+      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
+      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will be able</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Flash is also used for</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
-    &lt;p&gt;Google Chrome includes a module that &lt;a
-    
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>listen for speech all the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;p&gt;&lt;a href="/philosophy/javascript-trap.html"&gt;Javascript 
code&lt;/a&gt;
+is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
+
+
+&lt;!-- #SpywareEverywhere --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareEverywhere"&gt;Spyware Everywhere&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-  &lt;li id="M201308040"&gt;
-    &lt;p&gt;Google Chrome &lt;a
-    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
+      &ldquo;their&rdquo; phones is</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
+    &lt;p&gt;Google Chrome</em></ins></span> &lt;a 
+      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+      proprietary software to make sure they can't &ldquo;fool&rdquo; the 
+      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
-    software.&lt;/p&gt;
+    software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200809060"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will be able to listen for speech all the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200809060"&gt;
     &lt;p&gt;Google Chrome contains a key logger that &lt;a
     href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
     sends Google every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</em></ins></span>
@@ -2692,6 +2698,7 @@
       real</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT networks --&gt;
   &lt;li id="M201606030"&gt;
     &lt;p&gt;Investigation Shows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
       software as malicious as many other programs listed in this
@@ -2775,7 +2782,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 09:59:22 $
+$Date: 2018/10/01 19:58:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary/po/proprietary-surveillance.it.po       1 Oct 2018 09:59:22 
-0000       1.244
+++ proprietary/po/proprietary-surveillance.it.po       1 Oct 2018 19:58:10 
-0000       1.245
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1986,8 +1986,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Following is a non-exhaustive list of proprietary VPN apps from the research "
-"paper that tracks and infringes the privacy of users:"
+"Following is a non-exhaustive list, taken from the research paper, of some "
+"proprietary VPN apps that track users and infringe their privacy:"
 msgstr ""
 
 #. type: Content of: <ul><li><dl><dt>
@@ -2072,7 +2072,7 @@
 # | Injects JavaScript code into HTML pages, and also uses roughly [-5-]
 # | {+five+} tracking libraries. Developers of this app have confirmed that
 # | the non-premium version of the app does JavaScript injection for tracking
-# | and display ads.
+# | {+the user+} and [-display-] {+displaying+} ads.
 #, fuzzy
 #| msgid ""
 #| "Injects JavaScript code into HTML pages, and also uses roughly 5 tracking "
@@ -2081,7 +2081,8 @@
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly five tracking "
 "libraries. Developers of this app have confirmed that the non-premium "
-"version of the app does JavaScript injection for tracking and display ads."
+"version of the app does JavaScript injection for tracking the user and "
+"displaying ads."
 msgstr ""
 "Inserisce codice JavaScript nelle pagine HTML inviate agli utenti; usa circa "
 "5 librerie di tracciamento. Gli sviluppatori hanno confermato che la "

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/proprietary-surveillance.ja-diff.html        1 Oct 2018 
09:59:22 -0000       1.82
+++ proprietary/po/proprietary-surveillance.ja-diff.html        1 Oct 2018 
19:58:10 -0000       1.83
@@ -206,6 +206,7 @@
   &lt;li&gt;&lt;p&gt;By</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT windows --&gt;
   &lt;li id="M201712110"&gt;
     &lt;p&gt;HP's proprietary operating system &lt;a
     href="http://www.bbc.com/news/technology-42309371"&gt;includes a
@@ -303,24 +304,16 @@
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-    Intel devices will be able</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span 
class="removed"><del><strong>users' files, text input, voice input,
-  location info, contacts, calendar records and web browsing
-  history, as well as automatically connecting the machines to open
-  hotspots and showing targeted ads.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;
-  &lt;a</strong></del></span> <span class="inserted"><ins><em>time, even
+    Intel devices will be able</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>listen for speech all</em></ins></span> the <span 
class="removed"><del><strong>users' files, text</strong></del></span> <span 
class="inserted"><ins><em>time, even
     when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508130"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
     Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
-    the privacy-protection <span 
class="removed"><del><strong>settings.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>settings.&lt;/p&gt;
+    the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507300"&gt;
@@ -328,9 +321,17 @@
     
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
     ships with default settings that show no regard for the privacy of
     its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
-    the users' files, text input, voice input, location info, contacts,
+    the users' files, text</em></ins></span> input, voice input, location 
info, contacts,
     calendar records and web browsing history, as well as automatically
-    connecting the machines to open hotspots and showing targeted 
ads.&lt;/p&gt;
+    connecting the machines to open hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+  Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if a 
user
+  turns off its Bing search and Cortana features, and activates the
+  privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ads.&lt;/p&gt;
 
     &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="inserted"><ins><em>look at users' files for the US government
     on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
@@ -410,6 +411,7 @@
       edited&lt;/a&gt;. The</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT macos --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
@@ -489,6 +491,7 @@
   behavioral</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT bios --&gt;
   &lt;li id="M201509220"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
@@ -557,6 +560,7 @@
       lots</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT phones --&gt;
   &lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
@@ -573,8 +577,7 @@
     them <span class="removed"><del><strong>from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app</strong></del></span> <span 
class="inserted"><ins><em>to turn the phones</em></ins></span> on <span 
class="removed"><del><strong>iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone</strong></del></span> <span 
class="inserted"><ins><em>and off, listen to the microphone,
+  &lt;li&gt;&lt;p&gt;The iMessage app</strong></del></span> <span 
class="inserted"><ins><em>to turn the phones on and off, listen to the 
microphone,
     retrieve geo-location data from the GPS, take photographs, read
     text messages, read call, location and web browsing history, and
     read the contact list. This malware is designed to disguise itself
@@ -609,6 +612,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT ithings --&gt;
   &lt;li id="M201711250"&gt;
     &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
@@ -641,9 +645,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
+    &lt;p&gt;The iMessage app</em></ins></span> on iThings &lt;a
     
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone</em></ins></span> number that the user types into 
it&lt;/a&gt;; the
+    a server every phone number that the user types into it&lt;/a&gt;; the
     server records these numbers for at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -684,7 +688,9 @@
     security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:
+      the &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      iBeacon&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -704,15 +710,15 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
     Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the &lt;a
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"</em></ins></span>
+    &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    iBeacon&lt;/a&gt;</em></ins></span> lets stores determine exactly where 
the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -781,6 +787,7 @@
   &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT android --&gt;
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
       by</strong></del></span>
@@ -902,6 +909,7 @@
         movements before</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT e-readers --&gt;
   &lt;li id="M201603080"&gt;
     &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
 
@@ -955,6 +963,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT apps --&gt;
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>various sites 
       such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
@@ -1001,70 +1010,114 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
+      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
       2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
+      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span 
class="removed"><del><strong>submit</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
       are starting to realize that it is nasty.&lt;/p&gt;
 
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether</strong></del></span> <span class="inserted"><ins><em>its users. 
 Furthermore,</em></ins></span> they <span class="removed"><del><strong>want 
that. This is a typical example of
-      the attitude</strong></del></span> <span class="inserted"><ins><em>could
-    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    and</em></ins></span> the proprietary <span 
class="removed"><del><strong>software industry towards
       those they have subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary apps 
<span class="removed"><del><strong>for mobile devices report 
which</strong></del></span> <span class="inserted"><ins><em>whose
-    source code they cannot look at.  The</em></ins></span> other apps <span 
class="removed"><del><strong>the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span> <span class="inserted"><ins><em>might 
be snooping</em></ins></span>
-    in <span class="removed"><del><strong>a way that at 
least</strong></del></span> <span class="inserted"><ins><em>other 
ways.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>visible and
+  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>by 
getting</em></ins></span> apps <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.</strong></del></span> <span class="inserted"><ins><em>free 
software
+    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>at 
least is visible and
     optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
+    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary</em></ins></span> apps 
<span class="removed"><del><strong>snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>generally work 
against
-    their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to <span class="inserted"><ins><em>get rid 
of</em></ins></span> the <span class="removed"><del><strong>snooping 
done</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android</em></ins></span> by <span class="removed"><del><strong>the phone 
company,</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>perhaps by the OS 
in</strong></del></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps</em></ins></span> by <span 
class="inserted"><ins><em>getting apps from</em></ins></span> the <span 
class="removed"><del><strong>question of whether</strong></del></span> <span 
class="inserted"><ins><em>free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="inserted"><ins><em>user if an</em></ins></span> app <span 
class="removed"><del><strong>developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did</strong></del></span>
+    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span>
     <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should</em></ins></span> not
-      <span class="removed"><del><strong>ask</strong></del></span> <span 
class="inserted"><ins><em>have so much information</em></ins></span> about 
<span class="removed"><del><strong>sending it to other companies.  This shows 
the
-      weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get</strong></del></span> <span class="inserted"><ins><em>designed 
so that</em></ins></span> users <span class="inserted"><ins><em>communicate 
such info</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>each
+    other but not to the server's database.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass</em></ins></span> app <span 
class="inserted"><ins><em>and dis-service
+    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store</em></ins></span> by 
<span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708270"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Sarahah</em></ins></span> app <span 
class="removed"><del><strong>because it asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>zero price.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>the app developer but</strong></del></span> 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google</em></ins></span> did not
+      <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary,</em></ins></span> it
+    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>prevent that, and 
deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+
+    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
       app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1076,102 +1129,108 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
 <span class="inserted"><ins><em>its users.
-    It could be designed so that</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends personal data 
about them</strong></del></span> <span class="inserted"><ins><em>communicate 
such info</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>each
-    other but not to the server's database.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span> <span 
class="inserted"><ins><em>inspect executable</em></ins></span> proprietary 
<span class="removed"><del><strong>GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
+  &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
+      spies</strong></del></span> <span class="inserted"><ins><em>see what 
they do.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>the NSA takes advantage to</strong></del></span> 
<span class="inserted"><ins><em>dis-service</em></ins></span>
-    spy <span class="removed"><del><strong>through it too&lt;/a&gt;.
-      Here's information</strong></del></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>users even</em></ins></span> more <span 
class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google could demand the source code</em></ins></span> for <span 
class="removed"><del><strong>companies,</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="inserted"><ins><em>study</em></ins></span>
+    the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>source code 
somehow</em></ins></span> to <span class="removed"><del><strong>spy 
through</strong></del></span> <span class="inserted"><ins><em>determine whether 
they mistreat users in
+    various ways. If</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>did a good job of this, it 
could</em></ins></span> more <span class="removed"><del><strong>spyware 
apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+      More about NSA</strong></del></span> <span class="inserted"><ins><em>or 
less
+    prevent such snooping, except when the</em></ins></span> app <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>popular Android 
apps
-    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots of personal information about how
-    people use it&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
+   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201708270"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>company's 
statement</strong></del></span> <span class="inserted"><ins><em>Sarahah app 
&lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the data may be
-        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>this article misuses</em></ins></span> the 
<span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>words
-    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span class="removed"><del><strong>a
-        data broker, the data broker can figure out who the user 
is.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>zero 
price.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
+    on users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>makes 
internet-controlled vibrators</strong></del></span> <span 
class="inserted"><ins><em>they
+    don't snoop.&lt;/p&gt;
+
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span>
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears to do</em></ins></span> lots of <span 
class="removed"><del><strong>personal information about</strong></del></span> 
<span class="inserted"><ins><em>surveillance, judging by &lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;</em></ins></span>
+    how
+    <span class="removed"><del><strong>people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement that it anonymizes the data may be
+        true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>much access</em></ins></span> it <span 
class="removed"><del><strong>sells the data</strong></del></span> <span 
class="inserted"><ins><em>demands</em></ins></span> to <span 
class="removed"><del><strong>a
+        data broker, the</strong></del></span> <span 
class="inserted"><ins><em>personal</em></ins></span> data <span 
class="removed"><del><strong>broker can figure out who</strong></del></span> 
<span class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>its users through</strong></del></span> 
the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span>
 
-      &lt;p&gt;The app reports</strong></del></span> <span 
class="inserted"><ins><em>contrary, it
-    worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>users through</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      &lt;p&gt;The</strong></del></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>would record</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
       minute (thus, indirectly, whether it is surrounded by a person's
-      body),</strong></del></span> <span class="inserted"><ins><em>other hand, 
Google redistributes nonfree Android apps,</em></ins></span> and
-    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+      body), and</strong></del></span> <span class="inserted"><ins><em>audio 
files users listen to
+    along with</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>responsibility for</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>injustice 
of</em></ins></span> their <span class="removed"><del><strong>products, rather 
than free software which users can check
+    &lt;p&gt;The suit accuses that this was done without</em></ins></span> the 
<span class="removed"><del><strong>totally inadequate proposed response: a 
labeling
+      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    If the fine print of the app said that users gave consent for 
this,</em></ins></span>
+    would <span class="inserted"><ins><em>that</em></ins></span> make <span 
class="removed"><del><strong>statements about
+      their products, rather than free software which users can check
       and change.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
-    to <span class="removed"><del><strong>spy on children and 
adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>spy on children 
and adults.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span> 
to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>design
+    the app</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> at <span 
class="removed"><del><strong>Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -1183,28 +1242,37 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code for these 
apps,</em></ins></span> and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt; on Windows installs.
-Note that</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used</strong></del></span> <span class="inserted"><ins><em>source code somehow 
to determine whether they mistreat users in
-    various ways. If it</em></ins></span> did <span 
class="removed"><del><strong>not affect
-GNU/Linux; also,</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean</strong></del></span> <span class="inserted"><ins><em>good job of this, 
it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;But</em></ins></span> since <span 
class="removed"><del><strong>&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
+  &lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201703300"&gt;
+    &lt;p&gt;Verizon &lt;a
+    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
+    on <span class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>some of its phones. 
The app will give Verizon the same information
+    about the users' searches</em></ins></span> that <span 
class="inserted"><ins><em>Google normally gets when they use
+    its search engine.&lt;/p&gt;
+
+    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> is <span 
class="removed"><del><strong>not really
+clean since</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>protect us. We must 
demand release of source code to the
-    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1214,27 +1282,19 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
-    on users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
-    don't snoop.&lt;/p&gt;
-
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>collect the emails of members of Parliament
-  this way, because</strong></del></span> <span class="inserted"><ins><em>only 
hope that</em></ins></span> they <span class="removed"><del><strong>pass it 
through Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and</em></ins></span> the 
<span class="removed"><del><strong>emails of members</strong></del></span> 
<span class="inserted"><ins><em>user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>don't.&lt;/p&gt;</em></ins></span>
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>spyware is
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1250,8 +1310,8 @@
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
       Microsoft changed Skype</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
       specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1260,8 +1320,8 @@
 
 &lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
-    to <span class="removed"><del><strong>place new items on top under each 
subsection --&gt;
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
@@ -1270,65 +1330,57 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed</em></ins></span> in 
<span class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</strong></del></span> 
<span class="inserted"><ins><em>stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a
+  &lt;li id="M201611280"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Uber app tracks</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access</em></ins></span> it <span 
class="inserted"><ins><em>demands</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user's
+    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>using it to outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span> 
<span class="inserted"><ins><em>personal data</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span> <span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses that</em></ins></span> this <span 
class="removed"><del><strong>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle:</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span> <span class="inserted"><ins><em>was done 
without</em></ins></span> the
-      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
       they report even which page</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
-    the <span class="removed"><del><strong>user reads</strong></del></span> 
<span class="inserted"><ins><em>app to snoop</em></ins></span> at <span 
class="removed"><del><strong>what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span class="inserted"><ins><em>privacy 
and security of
+    283 Android VPN apps concluded that &ldquo;in spite of</em></ins></span> 
the <span class="removed"><del><strong>e-reader used</strong></del></span> 
<span class="inserted"><ins><em>promises
+    for privacy, security, and anonymity given</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude</em></ins></span>
-    to <span class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>transmit 
users' personal data</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+      send lots</strong></del></span> <span class="inserted"><ins><em>the 
majority</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span class="inserted"><ins><em>VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1338,114 +1390,74 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span 
class="inserted"><ins><em>servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf has a 
built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
+    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>phones. The app will give Verizon</em></ins></span> 
the <span class="removed"><del><strong>system has no authentication when
-    accessed through</strong></del></span> <span 
class="inserted"><ins><em>same information
-    about</em></ins></span> the <span class="removed"><del><strong>modem.  
However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> <span 
class="inserted"><ins><em>users' searches</em></ins></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>Google normally gets when they use
-    its search engine.&lt;/p&gt;
-
-    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only</em></ins></span> one <span 
class="removed"><del><strong>connects to the car remotely, the cell phone
-    modem enables</strong></del></span> <span 
class="inserted"><ins><em>phone&lt;/a&gt;, and</em></ins></span> the <span 
class="removed"><del><strong>phone company to track</strong></del></span> <span 
class="inserted"><ins><em>user must
-    explicitly opt-in before</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the 
<span class="removed"><del><strong>time; it</strong></del></span> <span 
class="inserted"><ins><em>app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</em></ins></span> is <span class="removed"><del><strong>possible to 
physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies, and
-      others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201611280"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article,</strong></del></span> <span 
class="inserted"><ins><em>Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>not
-      really</strong></del></span> <span class="inserted"><ins><em>inadequate 
as</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>protection against
-    massive surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201611160"&gt;
-    &lt;p&gt;A &lt;a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy and 
security</em></ins></span> of <span class="removed"><del><strong>proprietary 
surveillance. These systems are an
-      intolerable invasion</strong></del></span>
-    <span class="inserted"><ins><em>283 Android VPN apps concluded that 
&ldquo;in spite</em></ins></span> of <span class="inserted"><ins><em>the 
promises
-    for</em></ins></span> privacy, <span 
class="inserted"><ins><em>security,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>anonymity given</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>majority of VPN
-    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>extract data remotely</strong></del></span> 
<span class="inserted"><ins><em>poor security
-    guarantees</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>abusive practices inflicted by VPN 
apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps 
from</em></ins></span>
-    the <span class="removed"><del><strong>car's</strong></del></span> <span 
class="inserted"><ins><em>research paper that tracks and infringes the privacy 
of users:&lt;/p&gt;
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>infringe their
+    privacy:&lt;/p&gt;
 
     &lt;dl&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
+      meant</em></ins></span> to <span class="removed"><del><strong>do because 
the system has no authentication when
+    accessed through the modem.  However, even if</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to users'
+      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that 
Nissan</strong></del></span> has <span class="removed"><del><strong>no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over to the UK government if requested.&lt;/dd&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>stores detailed logs and
+      may turn them over</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>UK 
government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
-      roughly five tracking libraries. Also, it redirects the user's
+      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>HTML pages returned</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span>
+      <span class="inserted"><ins><em>users. The stated purpose 
of</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>JS 
injection</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
+      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Proprietary software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
-      tracking and display ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
+      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> this <span class="removed"><del><strong>article, is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>app have confirmed that
+      the non-premium version</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>the app does JavaScript injection for
+      tracking the user</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
@@ -1459,16 +1471,23 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>picture you take according to who 
is</em></ins></span>
+    in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>be
+    sent across</em></ins></span> the <span class="removed"><del><strong>car's 
location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> and 
<span class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
+    even</em></ins></span> if the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="inserted"><ins><em>service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
@@ -1482,38 +1501,82 @@
   &lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+    spy on many sorts of</em></ins></span> data <span 
class="inserted"><ins><em>in the phone,</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,</em></ins></span>
+    it <span class="removed"><del><strong>over, the 
state</strong></del></span> can <span class="removed"><del><strong>store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>alter them 
too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
 
-  &lt;li id="M201601130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
     &lt;p&gt;Apps that include &lt;a
     
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed to spy</strong></del></span> <span 
class="inserted"><ins><em>what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201511190"&gt;
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to the app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    unrelated</em></ins></span> to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>app's 
functionality,</em></ins></span> was
+<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
 
-    &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other snooping.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The <span class="removed"><del><strong>report 
was</strong></del></span> <span class="inserted"><ins><em>article should not 
have described these apps</em></ins></span> as <span 
class="removed"><del><strong>of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-  &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data</strong></del></span>
+    <span 
class="inserted"><ins><em>&ldquo;free&rdquo;&mdash;they</em></ins></span> are 
<span class="removed"><del><strong>totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV 
will</strong></del></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would</strong></del></span> <span 
class="inserted"><ins><em>free software.  The clear way
+    to</em></ins></span> say <span class="inserted"><ins><em>&ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>the usual analytics tools</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span>
+    <span class="inserted"><ins><em>legitimate, but is that valid? Software 
developers have no right</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span>
+    <span class="inserted"><ins><em>analyze</em></ins></span> what
+      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users are doing or how.  &ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+    &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>other TV manufacturers in spying on 
+      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>73%</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers</strong></del></span> <span class="inserted"><ins><em>47% 
of mobile applications, from Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral and</em></ins></span> location <span 
class="inserted"><ins><em>information&lt;/a&gt; of their users with
+    personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1571,7 +1634,7 @@
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that</em></ins></span> at <span 
class="inserted"><ins><em>least is visible and optional&lt;/a&gt;. Not
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1616,6 +1679,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT skype --&gt;
   &lt;li id="M201307110"&gt;
     &lt;p&gt;Skype contains &lt;a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
@@ -1632,6 +1696,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT games --&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
@@ -1720,6 +1785,7 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT stings --&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -1744,6 +1810,7 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT tvsets --&gt;
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
@@ -1793,7 +1860,10 @@
     to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
+    information with online social media participation, Tivo</em></ins></span> 
can <span class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>now 
&lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
     users to new combined surveillance by default.&lt;/p&gt;
@@ -1826,7 +1896,7 @@
     Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
@@ -1862,7 +1932,7 @@
   &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+    reports what the user watches, and the switch</em></ins></span> to turn 
this <span class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
@@ -1870,8 +1940,8 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, 
but</em></ins></span> any <span class="removed"><del><strong>time. 
(See</strong></del></span>
-    <span class="inserted"><ins><em>product could spy this way.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch to stop 
this,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>any
+    product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -1893,6 +1963,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT cameras --&gt;
   &lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
     manufacturer can communicate with it, is a surveillance device. &lt;a
@@ -1916,148 +1987,109 @@
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712"&gt;always
 watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>state 
orders</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches</em></ins></span> it 
<span class="removed"><del><strong>to get</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>over, the state can store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-    to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT toys --&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act 
as</em></ins></span> a <span class="removed"><del><strong>woman came 
up</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>code could surely 
convert it
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was
-<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>found to 
make</em></ins></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two</em></ins></span> 
users&lt;/a&gt;.&lt;/p&gt;
-  <span class="inserted"><ins><em>&lt;/li&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
     &lt;p&gt;A computerized vibrator &lt;a
     
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>enabled</strong></del></span> <span 
class="inserted"><ins><em>was surrounded</em></ins></span> by <span 
class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
+  &lt;li&gt;&lt;p&gt;Tivo's alliance</strong></del></span> <span 
class="inserted"><ins><em>a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
+    standard</em></ins></span> with <span class="removed"><del><strong>Viacom 
adds 2.3 million households</strong></del></span> <span 
class="inserted"><ins><em>which manufacturers would make statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="inserted"><ins><em>information about how people
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing 
the</em></ins></span> data <span class="removed"><del><strong>are totally 
inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>may be
-    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
-    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out who the
+    user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the company <span class="removed"><del><strong>already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>has been ordered to pay a total of 
C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    leak childrens' conversations</em></ins></span> to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could 
listen</em></ins></span> to <span class="removed"><del><strong>be
+      picked up</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
+      range so as</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+  &lt;li id="M201612060"&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>toys</em></ins></span> with <span 
class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>a mobile phone. This would enable
+    conversations</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
+      Internet devices are paired with your TV, 
advertisers</strong></del></span> <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+    company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can
+      <span class="removed"><del><strong>correlate ads</strong></del></span> 
<span class="inserted"><ins><em>remotely control the toys</em></ins></span> 
with <span class="removed"><del><strong>Web activity,</strong></del></span> 
<span class="inserted"><ins><em>a mobile phone. This would enable
     crackers to listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going to spy on children</em></ins></span> and <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2068,14 +2100,10 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT drones --&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is</em></ins></span> in
-      <span class="removed"><del><strong>range so as to determine that they 
are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on</em></ins></span> other <span 
class="inserted"><ins><em>people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -2088,6 +2116,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT home --&gt;
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and
       &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
@@ -2121,39 +2150,39 @@
     easier for Amazon. And if some government such as China 
or</em></ins></span> the US
     <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span> 
or <span class="removed"><del><strong>some other government.&lt;/p&gt;
       &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>cease</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
-    by free software in your own computer.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>switch to turn this off has no effect.  (The 
fact</strong></del></span> <span class="inserted"><ins><em>product 
in</em></ins></span> that <span class="inserted"><ins><em>country,
-    do you think Amazon would have</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing; the server
-      could save that data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>moral fiber to say no?&lt;/p&gt;
+    by free software</strong></del></span> <span 
class="inserted"><ins><em>sell the product</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;These crackers are probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what 
the</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that</em></ins></span> snoops on 
<span class="removed"><del><strong>other devices on</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its</em></ins></span> 
user <span class="removed"><del><strong>watches, and</strong></del></span> 
<span class="inserted"><ins><em>by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>stop this, 
but</strong></del></span> <span class="inserted"><ins><em>everyone in the 
house, all the time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact that</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>server
+      could save</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
+    on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include</em></ins></span> 
any <span class="removed"><del><strong>product</strong></del></span> <span 
class="inserted"><ins><em>way of making
-    a device that can obey your voice commands without potentially spying
-    on you.  Even if it is air-gapped, it</em></ins></span> could <span 
class="removed"><del><strong>spy this way.&lt;/p&gt;
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped,</em></ins></span> it 
<span class="removed"><del><strong>had installed a patch to stop this, but any 
product</strong></del></span> could <span class="removed"><del><strong>spy this 
way.&lt;/p&gt;
 
       &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
     about you for later examination.&lt;/p&gt;
@@ -2180,42 +2209,43 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT wearables --&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often</em></ins></span> people <span 
class="removed"><del><strong>watch, and even</strong></del></span> <span 
class="inserted"><ins><em>wear it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
+<span class="inserted"><ins><em>&lt;h5 
id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201603020"&gt;
+&lt;ul class="blurbs"&gt;</em></ins></span>
+&lt;!-- <span 
class="removed"><del><strong>#SpywareAtPlay</strong></del></span> <span 
class="inserted"><ins><em>INSERT watches</em></ins></span> --&gt;
+<span class="removed"><del><strong>&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    misunderstanding.  However, it is certainly 
surveillance,</em></ins></span> at <span 
class="removed"><del><strong>Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to report its location to someone else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
-
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
@@ -2225,9 +2255,11 @@
   &lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT cars --&gt;
   &lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can &lt;a
-    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2241,15 +2273,14 @@
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely and make changes in various
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;That's easy to do because the system has no authentication
     when accessed through the modem.  However, even if it asked
     for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    has no access.  The software in the car is proprietary, &lt;a
+    href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if no one connects</em></ins></span> to the 
@@ -2305,6 +2336,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT virtual --&gt;
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
     creates</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
@@ -2342,6 +2374,7 @@
   &lt;li&gt;&lt;p&gt;Online</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT websites --&gt;
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
@@ -2425,6 +2458,7 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT javascript --&gt;
   &lt;li id="M201807190"&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
@@ -2451,34 +2485,35 @@
     &lt;p&gt;Some websites send
     JavaScript code to collect all</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;</em></ins></span>
+    code.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
-
 
-<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+&lt;!-- INSERT flash --&gt;
   &lt;li id="M201310110"&gt;
     &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>identify 
users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201003010"&gt;
     &lt;p&gt;Flash Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+    cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items on top under each subsection --&gt;</strong></del></span>
 
 
 &lt;div class="big-subsection"&gt;
@@ -2490,6 +2525,7 @@
   &lt;li&gt;&lt;p&gt;Google</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT chrome --&gt;
   &lt;li id="M201507280"&gt;
     &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
@@ -2571,6 +2607,7 @@
       real</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT networks --&gt;
   &lt;li id="M201606030"&gt;
     &lt;p&gt;Investigation Shows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
       software as malicious as many other programs listed in this
@@ -2654,7 +2691,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/01 09:59:22 $
+$Date: 2018/10/01 19:58:10 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary/po/proprietary-surveillance.ja.po       1 Oct 2018 09:59:22 
-0000       1.217
+++ proprietary/po/proprietary-surveillance.ja.po       1 Oct 2018 19:58:10 
-0000       1.218
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1654,8 +1654,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Following is a non-exhaustive list of proprietary VPN apps from the research "
-"paper that tracks and infringes the privacy of users:"
+"Following is a non-exhaustive list, taken from the research paper, of some "
+"proprietary VPN apps that track users and infringe their privacy:"
 msgstr ""
 
 #. type: Content of: <ul><li><dl><dt>
@@ -1718,7 +1718,8 @@
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly five tracking "
 "libraries. Developers of this app have confirmed that the non-premium "
-"version of the app does JavaScript injection for tracking and display ads."
+"version of the app does JavaScript injection for tracking the user and "
+"displaying ads."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary/po/proprietary-surveillance.pot 1 Oct 2018 09:59:22 -0000       
1.166
+++ proprietary/po/proprietary-surveillance.pot 1 Oct 2018 19:58:10 -0000       
1.167
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1214,8 +1214,8 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Following is a non-exhaustive list of proprietary VPN apps from the research "
-"paper that tracks and infringes the privacy of users:"
+"Following is a non-exhaustive list, taken from the research paper, of some "
+"proprietary VPN apps that track users and infringe their privacy:"
 msgstr ""
 
 #. type: Content of: <ul><li><dl><dt>
@@ -1278,7 +1278,8 @@
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly five tracking "
 "libraries. Developers of this app have confirmed that the non-premium "
-"version of the app does JavaScript injection for tracking and display ads."
+"version of the app does JavaScript injection for tracking the user and "
+"displaying ads."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.405
retrieving revision 1.406
diff -u -b -r1.405 -r1.406
--- proprietary/po/proprietary-surveillance.ru.po       1 Oct 2018 15:58:21 
-0000       1.405
+++ proprietary/po/proprietary-surveillance.ru.po       1 Oct 2018 19:58:10 
-0000       1.406
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2018-09-30 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-01 19:55+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1729,9 +1730,17 @@
 "VPN</a>&rdquo;."
 
 #. type: Content of: <ul><li><p>
+# | Following is a non-exhaustive [-list-] {+list, taken from the research
+# | paper,+} of {+some+} proprietary VPN apps [-from the research paper-] that
+# | [-tracks-] {+track users+} and [-infringes the privacy of users:-]
+# | {+infringe their privacy:+}
+#, fuzzy
+#| msgid ""
+#| "Following is a non-exhaustive list of proprietary VPN apps from the "
+#| "research paper that tracks and infringes the privacy of users:"
 msgid ""
-"Following is a non-exhaustive list of proprietary VPN apps from the research "
-"paper that tracks and infringes the privacy of users:"
+"Following is a non-exhaustive list, taken from the research paper, of some "
+"proprietary VPN apps that track users and infringe their privacy:"
 msgstr ""
 "Далее следует неисчерпывающий список 
несвободных приложений для VPN, которые "
 "следят за пользователями и вторгаются в их
 личную жизнь:"
@@ -1805,10 +1814,21 @@
 msgstr "WiFi Protector VPN"
 
 #. type: Content of: <ul><li><dl><dd>
+# | Injects JavaScript code into HTML pages, and also uses roughly five
+# | tracking libraries. Developers of this app have confirmed that the
+# | non-premium version of the app does JavaScript injection for tracking
+# | {+the user+} and [-display-] {+displaying+} ads.
+#, fuzzy
+#| msgid ""
+#| "Injects JavaScript code into HTML pages, and also uses roughly five "
+#| "tracking libraries. Developers of this app have confirmed that the non-"
+#| "premium version of the app does JavaScript injection for tracking and "
+#| "display ads."
 msgid ""
 "Injects JavaScript code into HTML pages, and also uses roughly five tracking "
 "libraries. Developers of this app have confirmed that the non-premium "
-"version of the app does JavaScript injection for tracking and display ads."
+"version of the app does JavaScript injection for tracking the user and "
+"displaying ads."
 msgstr ""
 "Вставляет программы на JavaScript в страницы 
HTML, а также использует около "
 "пяти библиотек слежки. Разработчики 
приложения подтвердили, что дешевые "

Index: thankgnus/po/2018supporters.de.po
===================================================================
RCS file: /web/www/www/thankgnus/po/2018supporters.de.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- thankgnus/po/2018supporters.de.po   27 Sep 2018 10:28:16 -0000      1.47
+++ thankgnus/po/2018supporters.de.po   1 Oct 2018 19:58:11 -0000       1.48
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: 2018supporters.html\n"
 "Report-Msgid-Bugs-To: <address@hidden>\n"
-"POT-Creation-Date: 2018-09-27 10:26+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: 2018-03-19 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -360,6 +360,10 @@
 msgstr "Kendall Griffith"
 
 #. type: Content of: <ul><li>
+msgid "Kevin Fleming"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Kevin Forsythe"
 msgstr "Kevin Forsythe"
 

Index: thankgnus/po/2018supporters.pot
===================================================================
RCS file: /web/www/www/thankgnus/po/2018supporters.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- thankgnus/po/2018supporters.pot     27 Sep 2018 10:28:16 -0000      1.42
+++ thankgnus/po/2018supporters.pot     1 Oct 2018 19:58:11 -0000       1.43
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: 2018supporters.html\n"
-"POT-Creation-Date: 2018-09-27 10:26+0000\n"
+"POT-Creation-Date: 2018-10-01 19:55+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -324,6 +324,10 @@
 msgstr ""
 
 #. type: Content of: <ul><li>
+msgid "Kevin Fleming"
+msgstr ""
+
+#. type: Content of: <ul><li>
 msgid "Kevin Forsythe"
 msgstr ""
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]