www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-appliances.de-diff.h...


From: GNUN
Subject: www/proprietary/po malware-appliances.de-diff.h...
Date: Sun, 7 Oct 2018 16:58:35 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/07 16:58:34

Modified files:
        proprietary/po : malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.fr.po malware-cars.pot 
                         malware-cars.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.14&r2=1.15

Patches:
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-appliances.de-diff.html     5 Oct 2018 21:01:56 -0000       1.9
+++ malware-appliances.de-diff.html     7 Oct 2018 20:58:30 -0000       1.10
@@ -26,7 +26,7 @@
 &lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
 malware&lt;/a&gt;&lt;/p&gt;
 
-&lt;div class="highlight-para"&gt;
+&lt;div <span 
class="removed"><del><strong>class="highlight-para"&gt;</strong></del></span> 
<span class="inserted"><ins><em>class="comment"&gt;</em></ins></span>
 &lt;p&gt;
 &lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -43,185 +43,197 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
-<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
-here, please write
-to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.&lt;/p&gt;</em></ins></span>
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;
 
-&lt;p&gt;Here are examples of malware in appliances.&lt;/p&gt;
+&lt;p&gt;Here are</strong></del></span>
 
-<span class="removed"><del><strong>&lt;ul&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;p&gt;Some</em></ins></span> examples of 
malware in <span class="removed"><del><strong>appliances.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT appliances --&gt;</em></ins></span>
-  &lt;li <span class="removed"><del><strong>id="nest-thermometers"&gt;
+&lt;ul&gt;
+  &lt;li id="nest-thermometers"&gt;
     &lt;p&gt;Nest thermometers
-      send</strong></del></span> <span 
class="inserted"><ins><em>id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices:</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-      lot</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger</em></ins></span> of <span 
class="removed"><del><strong>data about</strong></del></span> <span 
class="inserted"><ins><em>sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>risk of an outage (which is what
-    just happened).&lt;/p&gt;
+      send &lt;a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+      lot</strong></del></span> <span class="inserted"><ins><em>appliances are 
listed below.&lt;/p&gt;
 
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
+&lt;div class="important"&gt;
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how</em></ins></span> to <span 
class="removed"><del><strong>make</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy was found</strong></del></span> <span 
class="inserted"><ins><em>an example that ought to be in this page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>make</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>conversation between</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span> 
two <span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer 
can</strong></del></span>
+<span class="inserted"><ins><em>to present the specifics.&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201807050"&gt;
-    &lt;p&gt;The Jawbone fitness tracker was tethered to</em></ins></span> a 
<span class="removed"><del><strong>surveillance device.</strong></del></span> 
<span class="inserted"><ins><em>proprietary phone
-    app.  In 2017, the company shut down and made the app stop 
working.</em></ins></span> &lt;a
+&lt;ul class="blurbs"&gt;
+&lt;!-- INSERT appliances --&gt;
+  &lt;li id="M201809260"&gt;
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats</em></ins></span> 
communicate <span class="removed"><del><strong>with it,
+      is a surveillance device.</strong></del></span>
+    <span class="inserted"><ins><em>only through the company's server. They 
have
+    all the nasty characteristics of such devices:</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
-    the existing trackers stopped working 
forever&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The article <span class="removed"><del><strong>describes 
wrongdoing by the manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>focuses</em></ins></span> on <span 
class="removed"><del><strong>the fact</strong></del></span> <span 
class="inserted"><ins><em>a further nasty fillip,</em></ins></span> that <span 
class="inserted"><ins><em>sales of</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span>
-    <span class="inserted"><ins><em>broken devices continued. But I think 
that</em></ins></span> is <span class="removed"><del><strong>tethered 
to</strong></del></span> a <span class="removed"><del><strong>server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span> <span 
class="inserted"><ins><em>secondary issue;</em></ins></span>
-    it <span class="removed"><del><strong>also demonstrates 
that</strong></del></span> <span 
class="inserted"><ins><em>made</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>nasty consequences extend to some additional people.
-    The fundamental wrong was to design</em></ins></span> the <span 
class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>devices to depend on something
-    else that didn't respect users' freedom.&lt;/p&gt;</em></ins></span>
+       Canary camera is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
+    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
+    all users at once), as well as the risk of</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</strong></del></span> <span 
class="inserted"><ins><em>outage (which is what
+    just happened).&lt;/p&gt;
+
+    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can do it
+    using controls right</em></ins></span> on the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
   &lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  &lt;li id="M201809240"&gt;
+    &lt;p&gt;Researchers have discovered how to &lt;a
+    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+    hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="removed"><del><strong>the device is</strong></del></span> <span 
class="inserted"><ins><em>people cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807050"&gt;
+    &lt;p&gt;The Jawbone fitness tracker was</em></ins></span> tethered to a 
<span class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span> proprietary <span 
class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates that the device 
gives</strong></del></span> <span class="inserted"><ins><em>phone
+    app.  In 2017,</em></ins></span> the company
+      <span class="removed"><del><strong>surveillance capability.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="removed"><del><strong>&ldquo;smart&rdquo; 
intravenous pump designed for
-    hospitals is connected to the internet. Naturally</strong></del></span> 
<span class="inserted"><ins><em>medical insurance company</em></ins></span> 
&lt;a
+&lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
+    hospitals is connected to</strong></del></span> <span 
class="inserted"><ins><em>shut down and made</em></ins></span> the <span 
class="removed"><del><strong>internet. Naturally</strong></del></span> <span 
class="inserted"><ins><em>app stop working.</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> <span 
class="inserted"><ins><em>snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>term &lt;a
+  &lt;p&gt;Note that this article misuses</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All</em></ins></span>
+    the <span class="removed"><del><strong>term &lt;a
 
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-     referring to crackers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+     referring to crackers.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>existing 
trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet of Stings devices
+    allows &lt;a 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop</strong></del></span> <span class="inserted"><ins><em>article 
focuses</em></ins></span> on <span class="removed"><del><strong>the people that 
use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be</strong></del></span> a <span 
class="removed"><del><strong>sucker&mdash;reject all</strong></del></span> 
<span class="inserted"><ins><em>further nasty fillip, that sales 
of</em></ins></span> the <span class="removed"><del><strong>stings.&lt;/p&gt;
+  &lt;p&gt;It is unfortunate</strong></del></span>
+    <span class="inserted"><ins><em>broken devices continued. But I 
think</em></ins></span> that <span class="inserted"><ins><em>is a secondary 
issue;
+    it made</em></ins></span> the <span class="removed"><del><strong>article 
uses</strong></del></span> <span class="inserted"><ins><em>nasty consequences 
extend to some additional people.
+    The fundamental wrong was to design</em></ins></span> the
+  <span class="removed"><del><strong>term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>devices to depend on something
+    else that didn't respect users' freedom.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;The bad security in many Internet of Stings devices
-    allows</strong></del></span>
+  &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
+  They have login accounts with hard-coded passwords, which can't be
+  changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way to
+  delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and 
other</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A</em></ins></span> medical <span 
class="removed"><del><strong>devices is</strong></del></span> <span 
class="inserted"><ins><em>insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose 
for</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>use them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't be</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> a <span 
class="removed"><del><strong>sucker&mdash;reject all</strong></del></span> 
<span class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>stings.&lt;/p&gt;
-  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>article 
for the facts it presents. It</em></ins></span>
-    is <span class="removed"><del><strong>unfortunate</strong></del></span> 
<span class="inserted"><ins><em>too bad</em></ins></span> that the article 
<span class="removed"><del><strong>uses</strong></del></span> <span 
class="inserted"><ins><em>finishes by advocating</em></ins></span> the
-  <span class="removed"><del><strong>term</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness of surrendering to Netflix. 
The Netflix app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;We link to the article</em></ins></span> for <span 
class="removed"><del><strong>its headphones&lt;/a&gt;.
+Specifically,</strong></del></span> the <span class="removed"><del><strong>app 
would record</strong></del></span> <span class="inserted"><ins><em>facts it 
presents. It
+    is too bad that</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the 
<span class="removed"><del><strong>audio files</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness of surrendering to Netflix. 
The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users in &lt;a
+  &lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock</em></ins></span> users <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>in &lt;a
     
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by being designed to be incompatible
-    with all other options, ethical or unethical.&lt;/p&gt;
+    solely</em></ins></span> to <span 
class="removed"><del><strong>along</strong></del></span> <span 
class="inserted"><ins><em>Apple services&lt;/a&gt; by being designed to be 
incompatible</em></ins></span>
+    with <span class="inserted"><ins><em>all other options, ethical or 
unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras are tremendously 
insecure.
-  They have login accounts</strong></del></span> <span 
class="inserted"><ins><em>the dangers of the &ldquo;internet of stings&rdquo;
+    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>dangers 
of</em></ins></span> the <span class="removed"><del><strong>fine 
print</strong></del></span> <span class="inserted"><ins><em>&ldquo;internet of 
stings&rdquo;
     is that, if you lose your internet service, you also &lt;a
     
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
+    lose control</em></ins></span> of <span class="inserted"><ins><em>your 
house and appliances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For your safety, don't use any appliance</em></ins></span> with 
<span class="removed"><del><strong>hard-coded passwords, which 
can't</strong></del></span> <span class="inserted"><ins><em>a connection to the
-    real internet.&lt;/p&gt;
+    &lt;p&gt;For your safety, don't use any appliance with a connection 
to</em></ins></span> the <span class="removed"><del><strong>app said that users 
gave consent for this,
+would that make it acceptable? No way! It should</strong></del></span>
+    <span class="inserted"><ins><em>real internet.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers to</em></ins></span> be
-  <span class="removed"><del><strong>changed,</strong></del></span> <span 
class="inserted"><ins><em>suckers</em></ins></span> and &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way</strong></del></span>
+    &lt;p&gt;Amazon recently invited consumers to</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>suckers and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff</em></ins></span> to
-  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system has a grave security flaw.&lt;/p&gt;</em></ins></span>
+    allow delivery staff</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. Wouldn't you know
+    it,</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>system has a grave security flaw.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings</em></ins></span> of <span class="removed"><del><strong>gross 
security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose 
for</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711080"&gt;
+  &lt;li <span class="removed"><del><strong>id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking</strong></del></span> <span 
class="inserted"><ins><em>id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing a spyware app for its headphones&lt;/a&gt;.
-Specifically, the app would record</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span class="removed"><del><strong>names 
of</strong></del></span> <span class="inserted"><ins><em>server through 
which</em></ins></span> the <span class="removed"><del><strong>audio files
-users listen to along</strong></del></span> <span 
class="inserted"><ins><em>products' supposed owners
-    communicate</em></ins></span> with <span class="removed"><del><strong>the 
headphone's unique serial number.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>suit accuses 
that</strong></del></span> <span class="inserted"><ins><em>owners 
suspect</em></ins></span> this <span class="removed"><del><strong>was done 
without the users' consent.</strong></del></span> <span 
class="inserted"><ins><em>is to pressure them to buy a newer 
model.</em></ins></span> If <span class="removed"><del><strong>the fine print 
of the app said</strong></del></span>
-    <span class="inserted"><ins><em>they are wise, they will learn, rather, to 
distrust any product</em></ins></span> that
-    <span class="inserted"><ins><em>requires</em></ins></span> users <span 
class="removed"><del><strong>gave consent for this,
-would that make it acceptable? No way! It should be flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal to design the app</strong></del></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>talk with 
them through some specialized service.&lt;/p&gt;</em></ins></span>
+    all Harmony Link household control</em></ins></span> devices <span 
class="inserted"><ins><em>by &lt;a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off the server through which the products' supposed owners
+    communicate</em></ins></span> with <span class="removed"><del><strong>a 
downgrade that
+  tethered</strong></del></span> <span 
class="inserted"><ins><em>them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The owners suspect this is to pressure</em></ins></span> them to 
<span class="inserted"><ins><em>buy</em></ins></span> a <span 
class="removed"><del><strong>remote server. &lt;a 
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless</strong></del></span>
 <span class="inserted"><ins><em>newer model. If
+    they are wise, they will learn, rather, to distrust any product that
+    requires</em></ins></span> users <span class="removed"><del><strong>create 
an account on Anova's servers, their
+  cookers won't function.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to talk with them through some specialized 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices</strong></del></span> <span 
class="inserted"><ins><em>id="M201710040"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;When Miele's Internet of Stings hospital disinfectant 
dishwasher</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate</em></ins></span> with <span 
class="inserted"><ins><em>it, is</em></ins></span> a <span 
class="removed"><del><strong>downgrade that
-  tethered them to a remote server.</strong></del></span> <span 
class="inserted"><ins><em>surveillance device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create</strong></del></span>
+    manufacturer can communicate with it,</em></ins></span> is <span 
class="inserted"><ins><em>a surveillance device.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera is</em></ins></span> an <span 
class="removed"><del><strong>account</strong></del></span> <span 
class="inserted"><ins><em>example&lt;/a&gt;.&lt;/p&gt;
+    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</em></ins></span> on <span class="removed"><del><strong>Anova's servers, 
their
-  cookers won't function.&lt;/a&gt;&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span>
-    the <span class="removed"><del><strong>Internet,
-its security</strong></del></span> <span class="inserted"><ins><em>fact that 
the device</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the <span 
class="removed"><del><strong>Internet,
+its security</strong></del></span> <span 
class="inserted"><ins><em>manufacturer, based on
+    the fact that the device</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>tethered</em></ins></span> to <span 
class="removed"><del><strong>the dishwasher's filesystem,
  infect</strong></del></span> <span class="inserted"><ins><em>a 
server.&lt;/p&gt;
 
@@ -258,24 +270,25 @@
       report everything that is viewed</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
     to snoop</em></ins></span> on <span class="removed"><del><strong>them, and 
not just broadcasts
-      and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer,</strong></del></span> the <span class="removed"><del><strong>TV 
reports what it is. The existence of</strong></del></span> <span 
class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
+      and cable&lt;/a&gt;. Even if</strong></del></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>way to
-    disable</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>coming 
from</strong></del></span> <span class="inserted"><ins><em>unfortunate 
that</em></ins></span> the <span class="removed"><del><strong>user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>article 
uses</em></ins></span> the <span class="removed"><del><strong>TV reports what 
it is. The existence of a way</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201708230"&gt;
+  &lt;li id="M201708230"&gt;
     &lt;p&gt;Sonos &lt;a
     
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
-    told</em></ins></span> all <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs</strong></del></span> 
<span class="inserted"><ins><em>its customers, &ldquo;Agree&rdquo;
-    to snooping or the product will stop working&lt;/a&gt;.</em></ins></span>  
&lt;a
+    told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
+    to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>snooping or</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden as it was 
in
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span> <span 
class="inserted"><ins><em>product will stop 
working&lt;/a&gt;.</em></ins></span>  &lt;a
 <span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
@@ -408,54 +421,54 @@
 &ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: 
it</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
     users create an account on Anova's servers, their 
cookers</em></ins></span> won't <span class="removed"><del><strong>accept
-third-party printing materials.  It is the Keurig</strong></del></span>
+third-party printing materials.  It</strong></del></span>
     <span class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703270"&gt;
-    &lt;p&gt;When Miele's Internet</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it</strong></del></span>
-    <span class="inserted"><ins><em>Stings hospital disinfectant 
dishwasher</em></ins></span> is
+    &lt;p&gt;When Miele's Internet of
+    Stings hospital disinfectant dishwasher</em></ins></span> is <span 
class="inserted"><ins><em>&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it</strong></del></span> 
<span class="inserted"><ins><em>Internet, its security</em></ins></span> is
 <span class="removed"><del><strong>being discontinued, which means that 
eventually authorized materials won't
-be available and the printers may become unusable.&lt;/p&gt;
+be available</strong></del></span> <span 
class="inserted"><ins><em>crap&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;With a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
-even be</strong></del></span> <span class="inserted"><ins><em>Internet, its 
security is crap&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;For example,</em></ins></span> a <span 
class="removed"><del><strong>remote possibility.&lt;/p&gt;
-
-&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>cracker can gain access to</em></ins></span> the 
<span class="removed"><del><strong>author of that article says that there was
-&ldquo;nothing wrong&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>dishwasher's
-    filesystem, infect it</em></ins></span> with <span 
class="removed"><del><strong>designing</strong></del></span> <span 
class="inserted"><ins><em>malware, and force</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>dishwasher</em></ins></span> to <span 
class="removed"><del><strong>restrict users</strong></del></span> <span 
class="inserted"><ins><em>launch
-    attacks on other devices</em></ins></span> in the <span 
class="removed"><del><strong>first place.  This is like putting a &ldquo;cheat 
me and mistreat me&rdquo;
-sign</strong></del></span> <span class="inserted"><ins><em>network. Since 
these dishwashers are
+    &lt;p&gt;For example, a cracker can gain access to the dishwasher's
+    filesystem, infect it with malware,</em></ins></span> and <span 
class="inserted"><ins><em>force</em></ins></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
+
+&lt;p&gt;With a</strong></del></span> <span 
class="inserted"><ins><em>dishwasher to launch
+    attacks on other devices in the network. Since these dishwashers are
     used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span class="removed"><del><strong>your 
chest.  We should know better: we should condemn all companies
-that take advantage</strong></del></span> <span class="inserted"><ins><em>its 
users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>people like him.  Indeed,</strong></del></span> 
<span class="inserted"><ins><em>the vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was surrounded by a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>acceptance of</strong></del></span> <span 
class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
-
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements 
about</em></ins></span> their <span class="removed"><del><strong>unjust 
practice</strong></del></span>
-    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked
-    and changed.&lt;/p&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
+even be a remote possibility.&lt;/p&gt;
+
+&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>author</strong></del></span> <span 
class="inserted"><ins><em>temperature</em></ins></span> of <span 
class="removed"><del><strong>that article says that there</strong></del></span> 
<span class="inserted"><ins><em>the vibrator minute by
+    minute (thus, indirectly, whether it</em></ins></span> was
+<span class="removed"><del><strong>&ldquo;nothing wrong&rdquo; with 
designing</strong></del></span> <span class="inserted"><ins><em>surrounded by a 
person's
+    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>device to restrict users in</strong></del></span> 
<span class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
+
+    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like 
putting</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response:</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;cheat me</strong></del></span> <span 
class="inserted"><ins><em>labeling
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have 
checked</em></ins></span>
+    and <span class="removed"><del><strong>mistreat me&rdquo;
+sign on your chest.  We should know better: we should condemn all 
companies</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
 
-    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>teaches</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>take advantage</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about 
how</em></ins></span> people <span 
class="removed"><del><strong>to</strong></del></span>
+    was sued for collecting lots</em></ins></span> of <span 
class="inserted"><ins><em>personal information about how</em></ins></span> 
people <span class="removed"><del><strong>like him.  
Indeed,</strong></del></span>
     <span class="inserted"><ins><em>used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data 
may</em></ins></span> be <span class="removed"><del><strong>doormats.&lt;/p&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>acceptance of
+their unjust practice that teaches people to</strong></del></span> <span 
class="inserted"><ins><em>data may</em></ins></span> be <span 
class="removed"><del><strong>doormats.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -530,64 +543,63 @@
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything</em></ins></span> that <span 
class="removed"><del><strong>this</strong></del></span> is <span 
class="removed"><del><strong>an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>viewed on them, and 
not just broadcasts and
     cable&lt;/a&gt;. Even if</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>fault</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,
-    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>app developers. That is clearly 
true</strong></del></span> <span class="inserted"><ins><em>a way to disable the
-    surveillance, even</em></ins></span> if <span class="inserted"><ins><em>it 
were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612230"&gt;
-    &lt;p&gt;VR equipment, measuring every slight motion,
-    creates the potential for</em></ins></span> the <span 
class="removed"><del><strong>apps are proprietary software.&lt;/p&gt;
+<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>fault of app developers. That is clearly true 
if</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
+    the <span class="removed"><del><strong>apps are proprietary 
software.&lt;/p&gt;
 
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is</strong></del></span> 
most <span class="removed"><del><strong>likely going</strong></del></span> 
<span class="inserted"><ins><em>intimate
-    surveillance ever. All it takes</em></ins></span> to
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely 
going</strong></del></span> <span class="inserted"><ins><em>TV reports what it 
is. The existence of a way</em></ins></span> to
 <span class="removed"><del><strong>screw you.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;
-Malware found on</strong></del></span> <span class="inserted"><ins><em>make 
this potential real</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+Malware found on &lt;a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
 security cameras available through Amazon&lt;/a&gt;.
 &lt;/p&gt;
 
 &lt;p&gt;A camera that records locally on physical media, and has no network
 connection, does not threaten people with surveillance&mdash;neither
-by watching people through the camera, nor through 
malware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
-    software as malicious as many other programs listed</em></ins></span> in 
<span class="inserted"><ins><em>this
-    page&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the
-<span class="removed"><del><strong>camera.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt; &lt;a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
-    surveillance on Oculus Rift devices. The moral is, never 
trust</em></ins></span> a <span class="removed"><del><strong>Bluetooth 
vulnerability&lt;/a&gt; that allows
-attackers to send malware to the devices, which can subsequently
-spread to computers and other FitBit trackers that 
interact</strong></del></span> <span class="inserted"><ins><em>VR
-    system</em></ins></span> with
-<span class="removed"><del><strong>them.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nonfree software in it.&lt;/p&gt;</em></ins></span>
+by watching people through</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>camera, nor through malware</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
+    does not legitimize</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
-proprietary firmware so you can't trust it.  Western 
Digital's</strong></del></span>
+&lt;p&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612200"&gt;
-    &lt;p&gt;The developer of Ham Radio Deluxe</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612230"&gt;
+    &lt;p&gt;VR equipment, measuring every slight motion,
+    creates the potential for the most intimate
+    surveillance ever. All it takes to make this potential 
real</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit fitness trackers have a Bluetooth vulnerability&lt;/a&gt; that allows
+attackers to send malware to the devices, which can subsequently
+spread to computers and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software as malicious as many</em></ins></span> other <span 
class="removed"><del><strong>FitBit trackers that interact with
+them.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
<span class="inserted"><ins><em>programs listed in this
+    page&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>encryption with
+proprietary firmware so you can't</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
+    surveillance on Oculus Rift devices. The moral is, never</em></ins></span> 
trust <span class="removed"><del><strong>it.  Western Digital's &lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+&ldquo;My Passport&rdquo; drives have</strong></del></span> a <span 
class="removed"><del><strong>back 
door&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>VR
+    system with nonfree software in it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Hospira infusion pumps, which are used to administer drugs 
to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged</em></ins></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612200"&gt;
+    &lt;p&gt;The developer of Ham Radio Deluxe &lt;a
+    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged</em></ins></span>
     a <span class="removed"><del><strong>patient, were rated &ldquo;&lt;a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
 least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>customer's 
installation as punishment for posting</em></ins></span> a <span 
class="removed"><del><strong>security
@@ -612,17 +624,23 @@
     necessary. This would enable crackers</em></ins></span> to <span 
class="removed"><del><strong>bad security</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> in <span 
class="inserted"><ins><em>on</em></ins></span> a <span 
class="removed"><del><strong>drug pump, crackers</strong></del></span> <span 
class="inserted"><ins><em>child's
     conversations, and even speak into the toys themselves.&lt;/p&gt;
 
-    &lt;p&gt;This means a burglar</em></ins></span> could <span 
class="removed"><del><strong>use it to &lt;a
+    &lt;p&gt;This means a burglar</em></ins></span> could <span 
class="removed"><del><strong>use it</strong></del></span> <span 
class="inserted"><ins><em>speak into the toys and ask the 
child</em></ins></span>
+    to <span class="removed"><del><strong>&lt;a
 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+kill patients&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unlock the front door while Mommy's not 
looking.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a
 href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly 
vulnerable</strong></del></span> <span class="inserted"><ins><em>speak into the 
toys and ask the child</em></ins></span>
-    to
-<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>unlock the front door while Mommy's not 
looking.&lt;/p&gt;</em></ins></span>
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly 
vulnerable</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609200"&gt;
+    &lt;p&gt;HP's firmware downgrade &lt;a
+    
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
+    DRM on some printers, which now refuse</em></ins></span> to
+<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>function with third-party
+    ink cartridges&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
@@ -645,100 +663,62 @@
 <span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
 kill</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-    unauthorized</em></ins></span> people <span 
class="removed"><del><strong>by taking</strong></del></span> <span 
class="inserted"><ins><em>can remotely</em></ins></span> control <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;
+    unauthorized</em></ins></span> people <span 
class="removed"><del><strong>by taking</strong></del></span> <span 
class="inserted"><ins><em>can remotely</em></ins></span> control <span 
class="removed"><del><strong>of medical implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC 
News&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
-    problem is partly the fault</em></ins></span> of <span 
class="removed"><del><strong>medical implants by radio&lt;/a&gt;.  More
-information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app developers. That is clearly true
+    problem is partly the fault of app developers. That is clearly true
     if the apps are proprietary software.&lt;/p&gt;
 
     &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going
-    to screw you.&lt;/p&gt;</em></ins></span>
+    to screw you.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Lots of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604110"&gt;
-    &lt;p&gt;Malware was found on</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;, and it can be fatal.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken 
over&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+  &lt;li id="M201604110"&gt;
+    &lt;p&gt;Malware was found on &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
     security cameras available through Amazon&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;A camera that records locally on physical 
media,</em></ins></span> and <span class="removed"><del><strong>turned
-into a botnet for</strong></del></span> <span class="inserted"><ins><em>has no 
network
+    &lt;p&gt;A camera that records locally on physical 
media,</em></ins></span> and <span class="inserted"><ins><em>has no network
     connection, does not threaten people with surveillance&mdash;neither
-    by watching people through</em></ins></span> the <span 
class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>camera, nor through malware in the
-    camera.&lt;/p&gt;</em></ins></span>
+    by watching people through the camera, nor through malware in the
+    camera.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
-&lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>id="M201604050"&gt;
-    &lt;p&gt;Google/Alphabet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-used</strong></del></span>
+  &lt;li id="M201604050"&gt;
+    &lt;p&gt;Google/Alphabet</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
     intentionally broke Revolv home automatic control products that
-    depended on</em></ins></span> a <span 
class="removed"><del><strong>firmware 
&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>make its TVs snoop on what
-users watch&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>function, by shutting down the 
server.</em></ins></span>
-    The <span class="removed"><del><strong>TVs did not 
do</strong></del></span> <span class="inserted"><ins><em>lesson is, reject all 
such products.  Insist on self-contained
-    computers</em></ins></span> that <span class="removed"><del><strong>when 
first sold.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>run 
free software!&lt;/p&gt;</em></ins></span>
+    depended on a server&lt;/a&gt; to function, by shutting down the server.
+    The lesson is, reject all such products.  Insist on self-contained
+    computers that run free software!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;LG</strong></del></span>
+&lt;p&gt;Lots</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
-begin to snoop on them and distribute their personal data.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
-Barbie is going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>spy&lt;/a&gt; on children and adults.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-Cisco TNP IP phones are spying 
devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601100"&gt;</em></ins></span>
+  &lt;li id="M201601100"&gt;
     &lt;p&gt;The &lt;a
-<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam
-&ldquo;smart&rdquo; camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+    href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
     &ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it
-    won't accept third-party printing materials.  It</em></ins></span> is 
<span class="removed"><del><strong>always watching&lt;/a&gt;, even 
when</strong></del></span> the
-<span class="removed"><del><strong>&ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>Keurig of
-    printers.  Now</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-
-&lt;p&gt;A &ldquo;smart&rdquo; device</strong></del></span> <span 
class="inserted"><ins><em>is being discontinued, which</em></ins></span> means 
<span class="inserted"><ins><em>that eventually
-    authorized materials won't be available and</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it to 
outsmart</strong></del></span> <span class="inserted"><ins><em>printers may 
become
+    won't accept third-party printing materials.  It is the 
Keurig</em></ins></span> of
+    <span class="inserted"><ins><em>printers.  Now it is being discontinued, 
which means that eventually
+    authorized materials won't be available and the printers may become
     unusable.&lt;/p&gt;
 
-    &lt;p&gt;With a &lt;a
-    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+    &lt;p&gt;With a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
     printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would
     not even be a remote possibility.&lt;/p&gt;
 
@@ -781,12 +761,10 @@
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart</em></ins></span> you.&lt;/p&gt;
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511198"&gt;
+  &lt;li id="M201511198"&gt;
     &lt;p&gt;ARRIS cable modem has a &lt;a
     
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
     back door in the back door&lt;/a&gt;.&lt;/p&gt;
@@ -856,29 +834,38 @@
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>it can be fatal.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
     &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs to a patient, were rated &ldquo;&lt;a
+    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over&lt;/a&gt; and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
     researcher.&lt;/p&gt;
 
-    &lt;p&gt;Depending on what drug is being infused, the insecurity could open
-    the door to murder.&lt;/p&gt;
+    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>insecurity could open
+    the door to murder.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;</em></ins></span>
-    &lt;p&gt;Vizio <span 
class="removed"><del><strong>goes</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;</em></ins></span>
+    &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used</em></ins></span> a <span class="removed"><del><strong>step further 
than</strong></del></span> <span class="inserted"><ins><em>firmware 
&ldquo;upgrade&rdquo; to make its TVs snoop on what
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
@@ -888,8 +875,8 @@
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
     transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the US or 
some</em></ins></span>
-    other <span class="inserted"><ins><em>government.&lt;/p&gt;
+    Nuance can save it and would then have to give it to the US or some
+    other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
@@ -917,7 +904,7 @@
     &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the</em></ins></span> TV 
<span class="removed"><del><strong>manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>will not
+    say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
@@ -930,29 +917,54 @@
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405201"&gt;
+  &lt;li id="M201405201"&gt;</em></ins></span>
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    disabled network features&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>&lt;em&gt;previously purchased&lt;/em&gt;
+    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
     &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
-    to snoop on them and distribute</em></ins></span> their <span 
class="removed"><del><strong>users: their</strong></del></span> <span 
class="inserted"><ins><em>personal data.&lt;/p&gt;
+    to snoop on them and distribute their personal data.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going to spy&lt;/a&gt; on children and adults.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;p&gt;Lots of</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-&ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
-<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> can <span 
class="removed"><del><strong>track you 
-across devices.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam
+&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
+&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>be fatal.&lt;/p&gt;
+&lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+    hospital equipment has lousy security&lt;/a&gt;, and</em></ins></span> it 
<span class="removed"><del><strong>to outsmart
+you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can be 
fatal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Vizio goes a step further than other TV manufacturers in spying on 
+their users: their &lt;a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+&ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+link</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
-    memories have modifiable software&lt;/a&gt;, which makes them 
vulnerable</em></ins></span>
+    memories have modifiable software&lt;/a&gt;, which makes</em></ins></span> 
them <span class="removed"><del><strong>your IP address&lt;/a&gt; so that 
advertisers can track you 
+across devices.&lt;/p&gt;
+
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>vulnerable</em></ins></span>
     to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>viruses.&lt;/p&gt;
 
     &lt;p&gt;We don't call</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;back door&rdquo; because</em></ins></span> 
it <span class="removed"><del><strong>enabled by default</strong></del></span> 
is <span class="removed"><del><strong>an injustice already.&lt;/p&gt;
@@ -1197,7 +1209,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/05 21:01:56 $
+$Date: 2018/10/07 20:58:30 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-appliances.de.po    1 Oct 2018 09:59:21 -0000       1.57
+++ malware-appliances.de.po    7 Oct 2018 20:58:30 -0000       1.58
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -73,7 +73,16 @@
 "sein würden bösartige Funktionen zu beheben, dazu verführt einige "
 "aufzuerlegen."
 
+#  Beispiele für _Programme_mit_Schadwirkung_ in Geräten:
 #. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-appliances.-] {+appliances
+# | are listed below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in appliances."
+msgid "Some examples of malware in appliances are listed below."
+msgstr "Beispiele für Schadsoftware in Geräten:"
+
+#. type: Content of: <div><div><p>
 # || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid ""
@@ -93,11 +102,6 @@
 "die URL einer vertrauenswürdigen Referenz (oder zwei) an, um die "
 "Einzelheiten aufzuzeigen."
 
-#  Beispiele für _Programme_mit_Schadwirkung_ in Geräten:
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr "Beispiele für Schadsoftware in Geräten:"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
@@ -626,6 +630,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"HP's firmware downgrade <a href=\"https://www.theguardian.com/";
+"technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-"
+"update\">imposed DRM on some printers, which now refuse to function with "
+"third-party ink cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ransomware <a href=\"https://www.pentestpartners.com/security-blog/";
 "thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
 "thermostat that uses proprietary software</a>."

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- malware-appliances.fr.po    1 Oct 2018 11:16:18 -0000       1.86
+++ malware-appliances.fr.po    7 Oct 2018 20:58:30 -0000       1.87
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: 2018-10-01 13:15+0200\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -63,6 +64,15 @@
 "fonctionnalité malveillante, est tenté de leur en imposer quelques-unes."
 
 #. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-appliances.-] {+appliances
+# | are listed below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in appliances."
+msgid "Some examples of malware in appliances are listed below."
+msgstr ""
+"Voici quelques exemples de malveillance dans divers appareils et 
équipements."
+
+#. type: Content of: <div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
@@ -75,11 +85,6 @@
 "Merci de fournir les URL d'une ou deux références fiables décrivant le "
 "problème."
 
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr ""
-"Voici quelques exemples de malveillance dans divers appareils et 
équipements."
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
@@ -661,6 +666,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"HP's firmware downgrade <a href=\"https://www.theguardian.com/";
+"technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-"
+"update\">imposed DRM on some printers, which now refuse to function with "
+"third-party ink cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ransomware <a href=\"https://www.pentestpartners.com/security-blog/";
 "thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
 "thermostat that uses proprietary software</a>."

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-appliances.pot      1 Oct 2018 09:59:21 -0000       1.43
+++ malware-appliances.pot      7 Oct 2018 20:58:30 -0000       1.44
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -50,6 +50,10 @@
 msgstr ""
 
 #. type: Content of: <div><p>
+msgid "Some examples of malware in appliances are listed below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a "
@@ -58,10 +62,6 @@
 "specifics."
 msgstr ""
 
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
@@ -447,6 +447,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"HP's firmware downgrade <a "
+"href=\"https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update\";>imposed
 "
+"DRM on some printers, which now refuse to function with third-party ink "
+"cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ransomware <a "
 
"href=\"https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/\";>
 "
 "has been developed for a thermostat that uses proprietary software</a>."

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- malware-appliances.ru.po    1 Oct 2018 15:58:20 -0000       1.116
+++ malware-appliances.ru.po    7 Oct 2018 20:58:30 -0000       1.117
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: 2018-10-01 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -65,6 +66,14 @@
 "вносить такие функции."
 
 #. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-appliances.-] {+appliances
+# | are listed below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in appliances."
+msgid "Some examples of malware in appliances are listed below."
+msgstr "Вот примеры вредоносных программ в 
бытовой технике."
+
+#. type: Content of: <div><div><p>
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
@@ -76,10 +85,6 @@
 "address@hidden&gt;</a>. Упомяните один-два 
заслуживающих доверия URL, "
 "чтобы проиллюстрировать подробности."
 
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr "Вот примеры вредоносных программ в 
бытовой технике."
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
@@ -656,6 +661,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"HP's firmware downgrade <a href=\"https://www.theguardian.com/";
+"technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-"
+"update\">imposed DRM on some printers, which now refuse to function with "
+"third-party ink cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ransomware <a href=\"https://www.pentestpartners.com/security-blog/";
 "thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
 "thermostat that uses proprietary software</a>."

Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-cars.de-diff.html   5 Oct 2018 21:01:56 -0000       1.4
+++ malware-cars.de-diff.html   7 Oct 2018 20:58:32 -0000       1.5
@@ -23,22 +23,46 @@
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Malware In Cars&lt;/h2&gt;
 
-&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
+malware&lt;/a&gt;&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;div class="highlight-para"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Here</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;div class="comment"&gt;
+&lt;p&gt;
+&lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
+mistreat or harm the user.  (This does not include accidental errors.)
+&lt;/p&gt;
+
+&lt;p&gt;
+Malware and nonfree software</em></ins></span> are <span 
class="inserted"><ins><em>two different issues.  The difference
+between &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt; and
+nonfree software is in &lt;a
+href="/philosophy/free-software-even-more-important.html"&gt;
+whether the users have control of the program or vice versa&lt;/a&gt;.  It's
+not directly a question of what the program &lt;em&gt;does&lt;/em&gt; when it
+runs.  However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+&lt;/p&gt;
+
+&lt;p&gt;Some</em></ins></span> examples of malware in <span 
class="removed"><del><strong>cars.&lt;/p&gt;
+
+&lt;ul&gt;  
+&lt;li&gt;
+&lt;p&gt;Tesla used</strong></del></span> <span class="inserted"><ins><em>cars 
are listed below.&lt;/p&gt;
+
+&lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>universal backdoor</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
 to present the specifics.&lt;/p&gt;
-&lt;/div&gt;</em></ins></span>
-
-&lt;p&gt;Here are examples of malware in cars.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;  
-&lt;li&gt;</strong></del></span>
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
 &lt;!-- INSERT cars --&gt;
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
@@ -47,13 +71,13 @@
   &lt;/li&gt;
 
   &lt;li id="M201709290"&gt;
-    &lt;p&gt;Bad security in some cars makes it possible to &lt;a
+    &lt;p&gt;Bad security</em></ins></span> in <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>some cars makes it possible to &lt;a
     href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
     remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709091"&gt;</em></ins></span>
-    &lt;p&gt;Tesla used <span class="removed"><del><strong>a universal 
backdoor in its</strong></del></span> software to limit <span 
class="removed"><del><strong>customers to
+  &lt;li id="M201709091"&gt;
+    &lt;p&gt;Tesla used</em></ins></span> software to limit <span 
class="removed"><del><strong>customers to
 using just &lt;a 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>the</em></ins></span> part of the battery 
<span class="removed"><del><strong>of</strong></del></span>
     <span class="inserted"><ins><em>that was available to customers 
in</em></ins></span> some <span 
class="removed"><del><strong>cars&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
@@ -317,7 +341,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/05 21:01:56 $
+$Date: 2018/10/07 20:58:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-cars.de.po  30 Sep 2018 20:27:53 -0000      1.9
+++ malware-cars.de.po  7 Oct 2018 20:58:32 -0000       1.10
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -33,6 +33,32 @@
 "<a href=\"/proprietary/\">Weitere Beispiele proprietrer Schadsoftware</a>"
 
 #. type: Content of: <div><p>
+msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user.  (This does not include accidental errors.)"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues.  The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a href=\"/philosophy/free-software-even-more-important.html"
+"\"> whether the users have control of the program or vice versa</a>.  It's "
+"not directly a question of what the program <em>does</em> when it runs.  "
+"However, in practice nonfree software is often malware, because the "
+"developer's awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+
+#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-cars.-] {+cars are listed
+# | below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in cars."
+msgid "Some examples of malware in cars are listed below."
+msgstr "Beispiele für Schadsoftware in Pkws:"
+
+#. type: Content of: <div><div><p>
 # || No change detected.  The change might only be in amounts of spaces.
 #, fuzzy
 #| msgid ""
@@ -52,10 +78,6 @@
 "die URL einer vertrauenswürdigen Referenz (oder zwei) an, um die "
 "Einzelheiten aufzuzeigen."
 
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr "Beispiele für Schadsoftware in Pkws:"
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";

Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-cars.fr.po  30 Sep 2018 21:07:38 -0000      1.12
+++ malware-cars.fr.po  7 Oct 2018 20:58:32 -0000       1.13
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: 2018-09-30 23:07+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -33,6 +34,44 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user.  (This does not include accidental errors.)"
+msgstr ""
+"Un logiciel est dit « malveillant » lorsque son fonctionnement a été 
conçu "
+"pour traiter l'utilisateur de manière inéquitable ou lui faire du tort "
+"(erreurs accidentelles mises à part)."
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues.  The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a href=\"/philosophy/free-software-even-more-important.html"
+"\"> whether the users have control of the program or vice versa</a>.  It's "
+"not directly a question of what the program <em>does</em> when it runs.  "
+"However, in practice nonfree software is often malware, because the "
+"developer's awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+"Logiciel malveillant et logiciel non libre sont deux notions différentes. La 
"
+"différence entre <a href=\"/philosophy/free-sw.html\">logiciel libre</a> et "
+"logiciel non libre réside dans le fait que <a href=\"/philosophy/free-"
+"software-even-more-important.html\">les utilisateurs ont, ou non, le "
+"contrôle du programme</a>. Cela n'a rien à voir avec ce que <em>fait</em> 
le "
+"programme en cours de fonctionnement. Cependant, en pratique, un logiciel "
+"non libre est souvent malveillant parce que le développeur, conscient que "
+"les utilisateurs seraient incapables de corriger une éventuelle "
+"fonctionnalité malveillante, est tenté de leur en imposer quelques-unes."
+
+#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-cars.-] {+cars are listed
+# | below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in cars."
+msgid "Some examples of malware in cars are listed below."
+msgstr "Voici des exemples de voitures malveillantes."
+
+#. type: Content of: <div><div><p>
+msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
@@ -44,10 +83,6 @@
 "Merci de fournir les URL d'une ou deux références fiables décrivant le "
 "problème."
 
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr "Voici des exemples de voitures malveillantes."
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";
@@ -422,33 +457,3 @@
 #~ msgstr ""
 #~ "Ils ont pu suivre les déplacements de la voiture, démarrer et arrêter 
le "
 #~ "moteur, activer et désactiver les freins, et plus encore."
-
-#~ msgid ""
-#~ "<em>Malware</em> means software designed to function in ways that "
-#~ "mistreat or harm the user.  (This does not include accidental errors.)"
-#~ msgstr ""
-#~ "Un logiciel est dit « malveillant » lorsque son fonctionnement a été 
"
-#~ "conçu pour traiter l'utilisateur de manière inéquitable ou lui faire du 
"
-#~ "tort (erreurs accidentelles mises à part)."
-
-#~ msgid ""
-#~ "Malware and nonfree software are two different issues.  The difference "
-#~ "between <a href=\"/philosophy/free-sw.html\">free software</a> and "
-#~ "nonfree software is in <a href=\"/philosophy/free-software-even-more-"
-#~ "important.html\"> whether the users have control of the program or vice "
-#~ "versa</a>.  It's not directly a question of what the program <em>does</"
-#~ "em> when it runs.  However, in practice nonfree software is often "
-#~ "malware, because the developer's awareness that the users would be "
-#~ "powerless to fix any malicious functionalities tempts the developer to "
-#~ "impose some."
-#~ msgstr ""
-#~ "Logiciel malveillant et logiciel non libre sont deux notions différentes. 
"
-#~ "La différence entre <a href=\"/philosophy/free-sw.html\">logiciel libre</"
-#~ "a> et logiciel non libre réside dans le fait que <a href=\"/philosophy/"
-#~ "free-software-even-more-important.html\">les utilisateurs ont, ou non, le "
-#~ "contrôle du programme</a>. Cela n'a rien à voir avec ce que 
<em>fait</em> "
-#~ "le programme en cours de fonctionnement. Cependant, en pratique, un "
-#~ "logiciel non libre est souvent malveillant parce que le développeur, "
-#~ "conscient que les utilisateurs seraient incapables de corriger une "
-#~ "éventuelle fonctionnalité malveillante, est tenté de leur en imposer "
-#~ "quelques-unes."

Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-cars.pot    30 Sep 2018 20:27:53 -0000      1.5
+++ malware-cars.pot    7 Oct 2018 20:58:32 -0000       1.6
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -32,6 +32,29 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user.  (This does not include accidental errors.)"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues.  The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a "
+"href=\"/philosophy/free-software-even-more-important.html\"> whether the "
+"users have control of the program or vice versa</a>.  It's not directly a "
+"question of what the program <em>does</em> when it runs.  However, in "
+"practice nonfree software is often malware, because the developer's "
+"awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid "Some examples of malware in cars are listed below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a "
 "href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to inform "
@@ -39,10 +62,6 @@
 "specifics."
 msgstr ""
 
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr ""
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "AI-powered driving apps can <a "

Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-cars.ru.po  1 Oct 2018 06:58:12 -0000       1.14
+++ malware-cars.ru.po  7 Oct 2018 20:58:32 -0000       1.15
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
 "PO-Revision-Date: 2018-09-20 04:21-0500\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -36,6 +37,32 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user.  (This does not include accidental errors.)"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues.  The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a href=\"/philosophy/free-software-even-more-important.html"
+"\"> whether the users have control of the program or vice versa</a>.  It's "
+"not directly a question of what the program <em>does</em> when it runs.  "
+"However, in practice nonfree software is often malware, because the "
+"developer's awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+
+#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-cars.-] {+cars are listed
+# | below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in cars."
+msgid "Some examples of malware in cars are listed below."
+msgstr "Вот примеры вредоносных программ в 
автомобилях."
+
+#. type: Content of: <div><div><p>
+msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
@@ -46,10 +73,6 @@
 "address@hidden&gt;</a>. Упомяните один-два 
заслуживающих доверия URL, "
 "чтобы проиллюстрировать подробности."
 
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr "Вот примеры вредоносных программ в 
автомобилях."
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/";



reply via email to

[Prev in Thread] Current Thread [Next in Thread]