www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-adobe.fr.html malware-a...


From: GNUN
Subject: www/proprietary malware-adobe.fr.html malware-a...
Date: Wed, 17 Oct 2018 06:01:41 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/17 06:01:37

Modified files:
        proprietary    : malware-adobe.fr.html malware-adobe.ru.html 
                         malware-amazon.es.html malware-amazon.fr.html 
                         malware-amazon.ru.html malware-apple.es.html 
                         malware-apple.fr.html malware-apple.ru.html 
                         malware-appliances.fr.html 
                         malware-appliances.ru.html malware-cars.fr.html 
                         malware-cars.ru.html malware-games.fr.html 
                         malware-games.ru.html malware-google.fr.html 
                         malware-google.ru.html 
                         malware-microsoft.fr.html 
                         malware-microsoft.ru.html 
                         malware-mobiles.fr.html malware-mobiles.ru.html 
                         malware-webpages.fr.html 
                         malware-webpages.ru.html 
                         potential-malware.de.html 
                         potential-malware.fr.html 
                         potential-malware.ru.html 
                         proprietary-back-doors.fr.html 
                         proprietary-back-doors.ru.html 
                         proprietary-censorship.de.html 
                         proprietary-censorship.es.html 
                         proprietary-censorship.fr.html 
                         proprietary-censorship.ru.html 
                         proprietary-coverups.de.html 
                         proprietary-coverups.fr.html 
                         proprietary-coverups.ru.html 
                         proprietary-deception.fr.html 
                         proprietary-deception.ru.html 
                         proprietary-drm.fr.html proprietary-drm.ru.html 
                         proprietary-incompatibility.fr.html 
                         proprietary-incompatibility.ru.html 
                         proprietary-insecurity.fr.html 
                         proprietary-insecurity.ru.html 
                         proprietary-interference.fr.html 
                         proprietary-interference.ru.html 
                         proprietary-jails.fr.html 
                         proprietary-jails.ru.html 
                         proprietary-sabotage.fr.html 
                         proprietary-sabotage.ru.html 
                         proprietary-subscriptions.fr.html 
                         proprietary-subscriptions.ru.html 
                         proprietary-surveillance.fr.html 
                         proprietary-surveillance.ru.html 
                         proprietary-tethers.fr.html 
                         proprietary-tethers.ru.html 
                         proprietary-tyrants.fr.html 
                         proprietary-tyrants.ru.html proprietary.fr.html 
                         proprietary.pt-br.html proprietary.ru.html 
        proprietary/po : malware-adobe.de-diff.html 
                         malware-adobe.fr-en.html 
                         malware-adobe.ja-diff.html 
                         malware-adobe.ru-en.html 
                         malware-amazon.es-en.html 
                         malware-amazon.fr-en.html 
                         malware-amazon.it-diff.html 
                         malware-amazon.ja-diff.html 
                         malware-amazon.ru-en.html 
                         malware-apple.de-diff.html 
                         malware-apple.es-en.html 
                         malware-apple.fr-en.html 
                         malware-apple.it-diff.html 
                         malware-apple.ja-diff.html 
                         malware-apple.nl-diff.html 
                         malware-apple.ru-en.html 
                         malware-appliances.de-diff.html 
                         malware-appliances.fr-en.html 
                         malware-appliances.ru-en.html 
                         malware-cars.de-diff.html 
                         malware-cars.fr-en.html malware-cars.ru-en.html 
                         malware-games.fr-en.html 
                         malware-games.ja-diff.html 
                         malware-games.ru-en.html 
                         malware-google.fr-en.html 
                         malware-google.ru-en.html 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.fr-en.html 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ru-en.html 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.fr-en.html 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ru-en.html 
                         malware-webpages.de-diff.html 
                         malware-webpages.fr-en.html 
                         malware-webpages.ru-en.html 
                         potential-malware.de-en.html 
                         potential-malware.fr-en.html 
                         potential-malware.ru-en.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ru-en.html 
                         proprietary-censorship.de-en.html 
                         proprietary-censorship.es-en.html 
                         proprietary-censorship.fr-en.html 
                         proprietary-censorship.it-diff.html 
                         proprietary-censorship.ja-diff.html 
                         proprietary-censorship.ru-en.html 
                         proprietary-coverups.de-en.html 
                         proprietary-coverups.fr-en.html 
                         proprietary-coverups.ja-diff.html 
                         proprietary-coverups.ru-en.html 
                         proprietary-deception.fr-en.html 
                         proprietary-deception.ja-diff.html 
                         proprietary-deception.ru-en.html 
                         proprietary-drm.fr-en.html 
                         proprietary-drm.it-diff.html 
                         proprietary-drm.ja-diff.html 
                         proprietary-drm.ru-en.html 
                         proprietary-incompatibility.fr-en.html 
                         proprietary-incompatibility.ru-en.html 
                         proprietary-insecurity.fr-en.html 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ru-en.html 
                         proprietary-interference.fr-en.html 
                         proprietary-interference.ja-diff.html 
                         proprietary-interference.ru-en.html 
                         proprietary-jails.fr-en.html 
                         proprietary-jails.it-diff.html 
                         proprietary-jails.ja-diff.html 
                         proprietary-jails.ru-en.html 
                         proprietary-sabotage.fr-en.html 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ru-en.html 
                         proprietary-subscriptions.fr-en.html 
                         proprietary-subscriptions.ja-diff.html 
                         proprietary-subscriptions.ru-en.html 
                         proprietary-surveillance.fr-en.html 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ru-en.html 
                         proprietary-tethers.fr-en.html 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ru-en.html 
                         proprietary-tyrants.fr-en.html 
                         proprietary-tyrants.it-diff.html 
                         proprietary-tyrants.ja-diff.html 
                         proprietary-tyrants.ru-en.html 
                         proprietary.fr-en.html proprietary.it-diff.html 
                         proprietary.ja-diff.html 
                         proprietary.nl-diff.html 
                         proprietary.pl-diff.html 
                         proprietary.pt-br-en.html 
                         proprietary.ru-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-adobe.ru.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.fr.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.ru.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.fr.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.fr.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ru.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.de.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.fr.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/potential-malware.ru.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.de.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.es.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.fr.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.ru.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.de.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-coverups.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.fr.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.fr.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-incompatibility.ru.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.fr.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-interference.ru.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.fr.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.ru.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ru.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.ru.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.fr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.ru.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.pt-br.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.de-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.fr-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.ja-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.ru-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.de-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.fr-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.ru-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.de-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.es-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ja-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.ru-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.de-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.fr-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ja-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-coverups.ru-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.fr-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-incompatibility.ru-en.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja-diff.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru-en.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru-en.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ja-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.29&r2=1.30

Patches:
Index: malware-adobe.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-adobe.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-adobe.fr.html       9 Oct 2018 13:30:39 -0000       1.11
+++ malware-adobe.fr.html       17 Oct 2018 10:01:33 -0000      1.12
@@ -47,12 +47,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT adobe -->
-<li id="M201701110">
+  <li id="M201701110">
     <p>Un logiciel de mise à jour pour Acrobat Reader <a
 
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>modifie
 Chrome sans prévenir</a>.</p>
@@ -185,7 +183,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-adobe.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-adobe.ru.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- malware-adobe.ru.html       9 Oct 2018 13:30:39 -0000       1.10
+++ malware-adobe.ru.html       17 Oct 2018 10:01:33 -0000      1.11
@@ -46,12 +46,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT adobe -->
-<li id="M201701110">
+  <li id="M201701110">
     <p>Обновление пакета Acrobat Reader <a
 
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>втиÑ
…ую
 подменяет Chrome</a>.</p>
@@ -186,7 +184,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-amazon.es.html      12 Oct 2018 07:58:36 -0000      1.12
+++ malware-amazon.es.html      17 Oct 2018 10:01:33 -0000      1.13
@@ -62,9 +62,7 @@
 <h4 id="back-doors">Puertas traseras</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-back-door -->
-<li id="M201503210">
+  <li id="M201503210">
     <p>Amazon <a
 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>hizo
 una actualización regresiva en el software de los dispositivos Swindle de
@@ -97,9 +95,7 @@
 <h4 id="surveillance">Vigilancia</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-surv -->
-<li id="M201212031">
+  <li id="M201212031">
     <p>La <cite>Electronic Frontier Foundation</cite> ha examinado y 
encontrado <a
 href="https://www.eff.org/pages/reader-privacy-chart-2012";>diversos tipos de
 vigilancia en el Swindle y otros lectores de libros electrónicos</a>.</p>
@@ -110,9 +106,7 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-dr -->
-<li id="M201704131">
+  <li id="M201704131">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> El 
Kindle
 de Amazon tiene DRM</a>. Ese artículo es erróneo, ya que no trata el DRM
 como una cuestión ética; da por hecho que todo lo que Amazon podría hacer a
@@ -129,9 +123,7 @@
 <h4 id="echo-back-doors">Puertas traseras</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT echo-back-door -->
-<li id="M201606060">
+  <li id="M201606060">
     <p>El Amazon Echo parece tener una puerta trasera universal, ya que <a
 href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";> instala
 «actualizaciones» automáticamente</a>.</p>
@@ -147,9 +139,7 @@
 <h4 id="echo-surveillance">Vigilancia</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT echo-surv -->
-<li id="M201808120">
+  <li id="M201808120">
     <p>Unos <cite>crackers</cite> encontraron la manera de sortear las medidas 
de
 seguridad de un dispositivo de Amazon y <a
 href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";> convertirlo
@@ -172,9 +162,7 @@
 <h3 id="misc"> <cite>Malware</cite> en otros productos</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT amazon-misc -->
-<li id="M201711200">
+  <li id="M201711200">
     <p>Recientemente Amazon embaucó a los consumidores para que <a
 
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>permitieran
 a su personal que abriera la puerta de entrada al sistema</a>. Por si no lo
@@ -264,7 +252,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-amazon.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.fr.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-amazon.fr.html      12 Oct 2018 07:58:36 -0000      1.14
+++ malware-amazon.fr.html      17 Oct 2018 10:01:33 -0000      1.15
@@ -60,9 +60,7 @@
 <h4 id="back-doors">Portes dérobées</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-back-door -->
-<li id="M201503210">
+  <li id="M201503210">
     <p>Amazon <a
 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
 a fait une mise à jour régressive du logiciel installé dans les Swindles des
@@ -95,9 +93,7 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-surv -->
-<li id="M201212031">
+  <li id="M201212031">
     <p>L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a
 href="https://www.eff.org/pages/reader-privacy-chart-2012";>différents
 mécanismes de surveillance dans le Swindle et autres liseuses</a>.</p>
@@ -108,9 +104,7 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-dr -->
-<li id="M201704131">
+  <li id="M201704131">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>Le 
Kindle
 d'Amazon a des menottes numériques</a>. Cet article a un défaut : il 
néglige
 la dimension éthique des DRM ; il prend pour acquis que tout ce qu'Amazon
@@ -127,9 +121,7 @@
 <h4 id="echo-back-doors">Portes dérobées</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT echo-back-door -->
-<li id="M201606060">
+  <li id="M201606060">
     <p>L'Echo d'Amazon semble avoir une porte dérobée universelle puisque <a
 href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>les
 « mises à jour » s'installent automatiquement</a>.</p>
@@ -144,9 +136,7 @@
 <h4 id="echo-surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT echo-surv -->
-<li id="M201808120">
+  <li id="M201808120">
     <p>Des crackers ont trouvé moyen de contourner les dispositifs de 
sécurité d'un
 appareil d'Amazon et de <a
 href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>le transformer
@@ -168,9 +158,7 @@
 <h3 id="misc"> Malveillance d'autres produits</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT amazon-misc -->
-<li id="M201711200">
+  <li id="M201711200">
     <p>Amazon a récemment invité ses clients à se faire pigeonner en <a
 
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>permettant
 aux livreurs d'ouvrir leurs portes d'entrée</a>. Et vous savez quoi ? Le
@@ -262,7 +250,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-amazon.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.ru.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-amazon.ru.html      12 Oct 2018 07:58:36 -0000      1.13
+++ malware-amazon.ru.html      17 Oct 2018 10:01:33 -0000      1.14
@@ -60,9 +60,7 @@
 <h4 id="back-doors">Лазейки</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-back-door -->
-<li id="M201503210">
+  <li id="M201503210">
     <p>Amazon <a
 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
 откатила назад программы в Kindle 
пользователей</a> так, что устройства, в
@@ -94,9 +92,7 @@
 <h4 id="surveillance">Слежка</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-surv -->
-<li id="M201212031">
+  <li id="M201212031">
     <p>Фонд электронных рубежей обследовал и 
нашел <a
 href="https://www.eff.org/pages/reader-privacy-chart-2012";> разного 
рода
 слежку в Swindle и других устройствах чтения 
электронных книг</a>.</p>
@@ -107,9 +103,7 @@
 <h4 id="drm">Цифровое управление 
ограничениями</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT swindle-dr -->
-<li id="M201704131">
+  <li id="M201704131">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> В 
Amazon
 Kindle есть цифровое управление 
ограничениями</a>. Недостаток этой
 статьи&nbsp;&mdash; в том, что цифровое 
управление ограничениями не
@@ -129,9 +123,7 @@
 <h4 id="echo-back-doors">Лазейки</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT echo-back-door -->
-<li id="M201606060">
+  <li id="M201606060">
     <p>Оказывается, что в Amazon Echo есть 
универсальная лазейка, поскольку <a
 href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
 &ldquo;обновления&rdquo; там устанавливаются 
автоматически</a>.</p>
@@ -146,9 +138,7 @@
 <h4 id="echo-surveillance">Слежка</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT echo-surv -->
-<li id="M201808120">
+  <li id="M201808120">
     <p>Взломщики нашли способ пробить защиту 
устройства Amazon и <a
 href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";> 
превратить
 его в устройство, подслушивающее</a> для них
.</p>
@@ -169,9 +159,7 @@
 <h3 id="misc"> Вредоносные программы в продуктах
</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT amazon-misc -->
-<li id="M201711200">
+  <li id="M201711200">
     <p>Компания Amazon недавно пригласила 
потребителей быть простофилями и <a
 href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
 позволить сотрудникам служб доставки 
открывать их входные двери</a>. Вот вам
@@ -262,7 +250,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-apple.es.html       10 Oct 2018 11:57:41 -0000      1.58
+++ malware-apple.es.html       17 Oct 2018 10:01:33 -0000      1.59
@@ -81,9 +81,7 @@
 <h3 id="back-doors">Puertas traseras de Apple</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-back-door -->
-<li id="M201607284">
+  <li id="M201607284">
     <p>La aplicación Dropbox para Macintosh <a
 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
 toma el control, de los elementos presentes en la interfaz de usuario una
@@ -123,9 +121,7 @@
 <h3 id="deception">Trampas de Apple</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-decept -->
-<li id="M201308290">
+  <li id="M201308290">
     <p>«<cite>Dark patterns</cite>» se refiere a <a
 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>interfaces
 de usuario que están diseñadas para engañar a los usuarios o hacer que sea
@@ -140,9 +136,7 @@
 <h3 id="drm">Gestión digital de restricciones en Apple</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-dr -->
-<li id="M201704071">
+  <li id="M201704071">
     <p>El DRM hace que el iPhone 7 sea prácticamente <a
 href="#iphone7-sabotage">irreparable</a> por nadie que no sea Apple.</p>
   </li>
@@ -187,9 +181,7 @@
 ejecuta el software.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-incompat -->
-<li id="M201803300">
+  <li id="M201803300">
     <p>En MacOS e iOS, el procedimiento para <a
 
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>convertir
 imágenes del formato Photos</a> a un formato libre es tan tedioso y lleva
@@ -228,9 +220,7 @@
 que el software privativo de prestigio está libre de graves fallos.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-insec -->
-<li id="M201607220">
+  <li id="M201607220">
     <p>Una vulnerabilidad en la interfaz de programación (API) <cite>Image
 I/O</cite> de Apple permitía a un atacante <a
 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>ejecutar
@@ -288,9 +278,7 @@
 <h4>Ejemplos de censura por prisiones de Apple</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-jail -->
-<li id="M201710130">
+  <li id="M201710130">
     <p>Apple está <a
 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
 censurando aplicaciones también a petición del Gobierno de
@@ -404,9 +392,7 @@
 venta agresiva y otras tácticas comerciales injustas de Apple. </p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-press -->
-<li id="M201510270">
+  <li id="M201510270">
     <p>La aplicación Siri de Apple <a
 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>rechaza
 ofrecerle información</a> sobre listas musicales si usted no está suscrito a
@@ -421,9 +407,7 @@
 para intervenir directamente de maneras que los dañan u obstruyen su 
labor.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-sab -->
-<li id="M201805310">
+  <li id="M201805310">
     <p>Apple ha <a
 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>bloqueado
 las actualizaciones de su aplicación de Telegram durante un mes</a>.</p>
@@ -517,9 +501,7 @@
 <h3 id="surveillance">Vigilancia de Apple</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-surv -->
-<li id="M201809070">
+  <li id="M201809070">
     <p>Adware Doctor, un bloqueador de anuncios para MacOS, <a
 
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>recoge
 y transmite el historial de navegación del usuario</a>.</p>
@@ -702,9 +684,7 @@
 <h3 id="tyrants">Tiranos de Apple</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-tyrant -->
-<li id="M201412010">
+  <li id="M201412010">
     <p>Apple <a
 href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>bloquea
 arbitrariamente a los usuarios impidiéndoles que instalen versiones antiguas
@@ -796,7 +776,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/10/10 11:57:41 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.fr.html       9 Oct 2018 13:30:39 -0000       1.63
+++ malware-apple.fr.html       17 Oct 2018 10:01:33 -0000      1.64
@@ -78,9 +78,7 @@
 <h3 id="back-doors">Portes dérobées</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-back-door -->
-<li id="M201607284">
+  <li id="M201607284">
     <p>L'appli Dropbox pour MacIntosh <a
 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>prend
 le contrôle des éléments de l'interface utilisateur après avoir piégé ce
@@ -121,9 +119,7 @@
 <h3 id="deception">Pratiques trompeuses</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-decept -->
-<li id="M201308290">
+  <li id="M201308290">
     <p>Les <cite>Dark Patterns</cite> sont <a
 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>des
 interfaces web conçues pour piéger les utilisateurs ou rendre certains
@@ -139,9 +135,7 @@
 <h3 id="drm">DRM</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-dr -->
-<li id="M201704071">
+  <li id="M201704071">
     <p>Un DRM rend l'iPhone7 presque <a 
href="#iphone7-sabotage">irréparable</a>
 par quelqu'un d'autre qu'Apple.</p>
   </li>
@@ -186,9 +180,7 @@
 l'appareil sur lequel tourne le logiciel.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-incompat -->
-<li id="M201803300">
+  <li id="M201803300">
     <p>Dans MacOS et iOS, la <a
 
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>procédure
 de conversion d'images au format Photos</a> vers un format libre est si
@@ -227,9 +219,7 @@
 que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-insec -->
-<li id="M201607220">
+  <li id="M201607220">
     <p>Une vulnérabilité dans l'interface de programmation (API) <cite>Image
 I/O</cite> d'Apple permettait à un attaquant <a
 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>
@@ -287,9 +277,7 @@
 <h4>Exemples de censure par les prisons d'Apple</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-jail -->
-<li id="M201710130">
+  <li id="M201710130">
     <p>Cette société <a
 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>censure
 également des applis pour le gouvernement américain</a>. Plus précisément,
@@ -406,9 +394,7 @@
 agressives et autres tactiques injustes de la part d'Apple.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-press -->
-<li id="M201510270">
+  <li id="M201510270">
     <p>Siri <a
 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuse
 de vous donner des renseignements</a> sur la popularité des chansons si vous
@@ -424,9 +410,7 @@
 bloque leur travail.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-sab -->
-<li id="M201805310">
+  <li id="M201805310">
     <p>Apple a <a
 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>empêché
 Telegram de mettre à jour son appli pendant un mois</a>.</p>
@@ -519,9 +503,7 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-surv -->
-<li id="M201809070">
+  <li id="M201809070">
     <p>Adware Doctor, un bloqueur de pubs pour MacOS, <a
 
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>envoie
 l'historique de navigation de l'utilisateur à sa maison mère</a>. </p>
@@ -706,9 +688,7 @@
 <h3 id="tyrants">Tyrans</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-tyrant -->
-<li id="M201412010">
+  <li id="M201412010">
     <p>Apple <a
 href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>empêche
 arbitrairement les utilisateurs de revenir aux anciennes versions 
d'iOS</a>.</p>
@@ -801,7 +781,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.ru.html       9 Oct 2018 13:30:39 -0000       1.59
+++ malware-apple.ru.html       17 Oct 2018 10:01:33 -0000      1.60
@@ -75,9 +75,7 @@
 <h3 id="back-doors">Лазейки</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-back-door -->
-<li id="M201607284">
+  <li id="M201607284">
     <p>Приложение Dropbox для Macintosh <a
 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
 берет под свой контроль элементы 
пользовательского интерфейса после того,
@@ -117,9 +115,7 @@
 <h3 id="deception">Обман</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-decept -->
-<li id="M201308290">
+  <li id="M201308290">
     <p>&ldquo;Темные тактики&rdquo; представляют <a
 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>элементы
 интерфейса пользователя, 
спроектированные так, чтобы вводить 
пользователей в
@@ -135,9 +131,7 @@
 <h3 id="drm">Цифровое управление 
ограничениями</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-dr -->
-<li id="M201704071">
+  <li id="M201704071">
     <p>Цифровое управление ограничение 
делает iPhone&nbsp;7 почти <a
 href="#iphone7-sabotage">неремонтопригодным</a> для 
всех, кроме Apple.</p>
   </li>
@@ -182,9 +176,7 @@
 которые могут освободить устройство, на 
котором программы работают.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-incompat -->
-<li id="M201803300">
+  <li id="M201803300">
     <p>В MacOS и iOS процедура <a
 
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
 преобразования изображений из формата 
Photos</a> в свободный формат
@@ -223,9 +215,7 @@
 предположение, что в престижных 
несвободных программах нет серьезных 
ошибок.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-insec -->
-<li id="M201607220">
+  <li id="M201607220">
     <p>Уязвимость в интерфейсе Apple Image I/O 
позволила взломщику <a
 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>выполнять
 вредоносные программы из любого 
приложения, которое пользуется этим
@@ -279,9 +269,7 @@
 <h4>Примеры цензуры средствами тюрем Apple</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-jail -->
-<li id="M201710130">
+  <li id="M201710130">
     <p>Apple также <a
 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
 подвергает цензуре приложения для органов 
США</a>. В частности, компания
@@ -398,9 +386,7 @@
 нечестная коммерческая тактика Apple.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-press -->
-<li id="M201510270">
+  <li id="M201510270">
     <p>Apple Siri <a
 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>отказывается
 выдавать вам сведения</a> о популярности 
музыки, если вы не подписаны на
@@ -416,9 +402,7 @@
 работать.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-sab -->
-<li id="M201805310">
+  <li id="M201805310">
     <p>Компания Apple <a
 
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>заблокировала
 обновление Telegram  на месяц</a>.</p>
@@ -511,9 +495,7 @@
 <h3 id="surveillance">Слежка</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-surv -->
-<li id="M201809070">
+  <li id="M201809070">
     <p>Adware Doctor, блокировщик рекламы для MacOS, <a
 
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>докладывает
 об истории посещений сайтов 
пользователем</a>.</p>
@@ -694,9 +676,7 @@
 <h3 id="tyrants">Тираны</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple-tyrant -->
-<li id="M201412010">
+  <li id="M201412010">
     <p>Apple по своему произволу <a
 
href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>блокирует
 установку пользователями старых версий 
iOS</a>.</p>
@@ -788,7 +768,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- malware-appliances.fr.html  9 Oct 2018 13:30:39 -0000       1.47
+++ malware-appliances.fr.html  17 Oct 2018 10:01:33 -0000      1.48
@@ -50,12 +50,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT appliances -->
-<li id="M201809260">
+  <li id="M201809260">
     <p>Les thermostats « intelligents » d'Honeywell communiquent par
 l'intermédiaire du serveur de la société. Ils ont toutes les
 caractéristiques de ce genre d'appareil : <a
@@ -840,7 +838,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-appliances.ru.html  9 Oct 2018 13:30:39 -0000       1.43
+++ malware-appliances.ru.html  17 Oct 2018 10:01:33 -0000      1.44
@@ -48,12 +48,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT appliances -->
-<li id="M201809260">
+  <li id="M201809260">
     <p>&ldquo;Интеллектуальные&rdquo; термостаты 
Honeywell связываются только с
 сервером компании. У них есть все скверные 
черты таких устройств: <a
 
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9";>
@@ -828,7 +826,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-cars.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.fr.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-cars.fr.html        9 Oct 2018 13:30:39 -0000       1.9
+++ malware-cars.fr.html        17 Oct 2018 10:01:33 -0000      1.10
@@ -49,12 +49,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT cars -->
-<li id="M201711230">
+  <li id="M201711230">
     <p>Les applis d'aide à la conduite intégrant de l'intelligence 
artificielle
 peuvent <a
 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>suivre
@@ -292,7 +290,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-cars.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- malware-cars.ru.html        9 Oct 2018 13:30:39 -0000       1.8
+++ malware-cars.ru.html        17 Oct 2018 10:01:33 -0000      1.9
@@ -48,12 +48,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT cars -->
-<li id="M201711230">
+  <li id="M201711230">
     <p>Программы с искусственным 
интеллектом, ограничивающие пользование 
телефоном
 во время вождения, могут <a
 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -289,7 +287,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-games.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-games.fr.html       14 Oct 2018 12:58:19 -0000      1.18
+++ malware-games.fr.html       17 Oct 2018 10:01:33 -0000      1.19
@@ -49,12 +49,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT games -->
-<li id="M201807310">
+  <li id="M201807310">
     <p>Un jeu vidéo non libre accessible au moyen du client Steam non libre <a
 
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>comprenait
 un « mineur »</a>, c'est-à-dire un exécutable qui pirate le processeur de
@@ -293,7 +291,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-games.ru.html       14 Oct 2018 09:58:12 -0000      1.15
+++ malware-games.ru.html       17 Oct 2018 10:01:33 -0000      1.16
@@ -48,12 +48,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT games -->
-<li id="M201807310">
+  <li id="M201807310">
     <p>Несвободная видеоигра, доступная 
через несвободный клиент Steam, <a
 
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
 содержала &ldquo;майнера&rdquo;</a>, т.е. 
программу, которая захватывала
@@ -292,7 +290,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.fr.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-google.fr.html      9 Oct 2018 13:30:39 -0000       1.27
+++ malware-google.fr.html      17 Oct 2018 10:01:33 -0000      1.28
@@ -75,9 +75,7 @@
 <h3 id="back-doors">Portes dérobées</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-back-door -->
-<li id="M201809140">
+  <li id="M201809140">
     <p>Android a une <a
 
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>porte
 dérobée permettant de modifier à distance la configuration
@@ -122,9 +120,7 @@
 <h3 id="censorship">Censure</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-censor -->
-<li id="M201703160">
+  <li id="M201703160">
     <p>Google <a
 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>propose
 des logiciels de censure</a>, soi-disant pour que les parents les installent
@@ -166,9 +162,7 @@
 <h3 id="drm">DRM</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-dr -->
-<li id="M201705150">
+  <li id="M201705150">
     <p>Google permet maintenant aux applis Android de détecter si un appareil 
a été
 « rooté » et <a
 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>de
@@ -208,9 +202,7 @@
 que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-insec -->
-<li id="M201311120">
+  <li id="M201311120">
     <p><a
 
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>La
 NSA peut aller chercher des données dans les smartphones, que ce soit les
@@ -234,9 +226,7 @@
 font du tort aux utilisateurs de certains programmes de Google.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-sab -->
-<li id="M201605150">
+  <li id="M201605150">
     <p>Revolv est un appareil de l'Internet des objets qui gérait les « 
maisons
 intelligentes » : éclairage, détecteurs de mouvements, régulation de
 température, etc. Le 15 mai 2016, Google a annoncé qu'il supprimerait le
@@ -275,9 +265,7 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-surv -->
-<li id="M201808030">
+  <li id="M201808030">
     <p>Certaines applis Android <a
 
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>enregistrent
 la position de l'utilisateur même quand il désactive la 
géolocalisation</a>.</p>
@@ -399,9 +387,7 @@
 <h3 id="tyrants">Tyrans</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-tyrant -->
-<li id="M201304080">
+  <li id="M201304080">
     <p>Motorola, lorsqu'elle était une filiale de Google, a fabriqué <a
 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>des
 téléphones Android qui sont des tyrans</a> (bien que quelqu'un ait trouvé
@@ -486,7 +472,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-google.ru.html      9 Oct 2018 13:30:39 -0000       1.25
+++ malware-google.ru.html      17 Oct 2018 10:01:33 -0000      1.26
@@ -73,9 +73,7 @@
 <h3 id="back-doors">Лазейки</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-back-door -->
-<li id="M201809140">
+  <li id="M201809140">
     <p>В системе Android есть <a
 
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
 лазейка для удаленного изменения настроек 
&ldquo;пользователя&rdquo;</a>.</p>
@@ -116,9 +114,7 @@
 <h3 id="censorship">Цензура</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-censor -->
-<li id="M201703160">
+  <li id="M201703160">
     <p>Google <a
 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
 предлагает программу для цензуры</a>, якобы 
для родителей, которые
@@ -159,9 +155,7 @@
 <h3 id="drm">Цифровое управление 
ограничениями</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-dr -->
-<li id="M201705150">
+  <li id="M201705150">
     <p>Теперь Google позволяет приложениям Android 
обнаруживать, что пользователь
 получил права администратора, и <a
 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/";>отказываться
@@ -204,9 +198,7 @@
 предположение, что в престижных 
несвободных программах нет серьезных 
ошибок.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-insec -->
-<li id="M201311120">
+  <li id="M201311120">
     <p><a
 
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
 АНБ может заглядывать в данные на 
смартфонах, в том числе на iPhone, Android
@@ -229,9 +221,7 @@
 конкретных программ Google.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-sab -->
-<li id="M201605150">
+  <li id="M201605150">
     <p>Revolv&nbsp;&mdash; устройство Интернета вещей, 
которое управляло операциями
 &ldquo;умных домов&rdquo;: включением света, 
датчиками движения,
 регулировкой температуры и т.д. На 15 мая 
2016&nbsp;года Google объявил, что
@@ -268,9 +258,7 @@
 <h3 id="surveillance">Слежка</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-surv -->
-<li id="M201808030">
+  <li id="M201808030">
     <p>Некоторые приложения Google в системе 
Android <a
 
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
 записывают местоположение пользователя, 
даже когда пользователи отключают
@@ -392,9 +380,7 @@
 <h3 id="tyrants">Тираны</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google-tyrant -->
-<li id="M201304080">
+  <li id="M201304080">
     <p>Motorola, когда она принадлежала Google, 
выпустила <a
 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
 телефоны с Android, которые 
являютсятиранами</a> (хотя кто-то нашел 
способ
@@ -480,7 +466,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-microsoft.fr.html   10 Oct 2018 10:57:51 -0000      1.64
+++ malware-microsoft.fr.html   17 Oct 2018 10:01:33 -0000      1.65
@@ -75,9 +75,7 @@
 <h3 id="back-doors">Portes dérobées</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-back-door -->
-<li id="M201608172">
+  <li id="M201608172">
     <p id="windows-update">Microsoft Windows a une porte dérobée universelle 
qui permet <a
 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>d'imposer
 un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -134,9 +132,7 @@
 <h3 id="drm">DRM</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-dr -->
-<li id="M200708131">
+  <li id="M200708131">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>Un DRM 
dans
 Windows</a>, introduit pour répondre aux besoins des disques <a
 href="/proprietary/proprietary-drm.html#bluray">Blu-ray</a>. (L'article
@@ -154,9 +150,7 @@
 que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-insec -->
-<li id="M201705120">
+  <li id="M201705120">
     <p>Des exploits utilisant certains bogues de Windows, développés par la 
NSA
 puis divulgués par le groupe Shadowbrokers, servent maintenant à <a
 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>attaquer
@@ -190,9 +184,7 @@
 Microsoft est responsable.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-interf -->
-<li id="M201809120">
+  <li id="M201809120">
     <p>Une des versions de Windows 10 <a
 
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>sermonne
 les utilisateurs s'ils essaient d'installer Firefox (ou Chrome)</a>.</p>
@@ -275,9 +267,7 @@
 font du tort aux utilisateurs de logiciels Microsoft particuliers.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-sab -->
-<li id="M201704194">
+  <li id="M201704194">
     <p>Microsoft a fait en sorte que Windows 7 et 8 ne fonctionnent plus sur
 certains nouveaux ordinateurs, <a
 
href="https://support.microsoft.com/fr-fr/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>ce
@@ -366,9 +356,7 @@
 <h3 id="subscriptions">Abonnements</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-subscript -->
-<li id="M201507150">
+  <li id="M201507150">
     <p>Microsoft Office force ses utilisateurs <a
 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>Ã
 
 s'abonner à Office 365 pour pouvoir créer ou éditer des documents</a>.</p>
@@ -379,9 +367,7 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-surv -->
-<li id="M201710134">
+  <li id="M201710134">
     <p>Le programme de télémétrie de Windows 10 envoie à Microsoft des 
informations
 sur l'ordinateur de l'utilisateur et la manière dont il l'utilise.</p>
 
@@ -531,9 +517,7 @@
 <h3 id="jails">Prisons</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-jail -->
-<li id="M201706130">
+  <li id="M201706130">
     <p>Windows 10 S était une prison : <a
 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>Seuls
 les programmes du magasin de Windows pouvaient être installés et
@@ -558,9 +542,7 @@
 <h3 id="tyrants">Tyrans</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-tyrant -->
-<li id="M201607150">
+  <li id="M201607150">
     <p>Microsoft avait accidentellement laissé aux utilisateurs un moyen
 d'installer GNU/Linux sur les tablettes fonctionnant sous Windows RT, mais
 désormais <a
@@ -656,7 +638,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-microsoft.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ru.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-microsoft.ru.html   11 Oct 2018 06:59:25 -0000      1.59
+++ malware-microsoft.ru.html   17 Oct 2018 10:01:33 -0000      1.60
@@ -73,9 +73,7 @@
 <h3 id="back-doors">Лазейки</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-back-door -->
-<li id="M201608172">
+  <li id="M201608172">
     <p id="windows-update">В Microsoft Windows есть 
универсальный черный ход, по которому <a
 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
 пользователям можно навязывать какие 
угодно изменения</a>.</p>
@@ -132,9 +130,7 @@
 <h3 id="drm">Цифровое управление 
ограничениями</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-dr -->
-<li id="M200708131">
+  <li id="M200708131">
     <p><a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>Цифровое
 управление ограничениями в Windows</a> введено 
в угоду дискам <a
 href="/proprietary/proprietary-drm.html#bluray"> Bluray</a> (в статье
@@ -151,9 +147,7 @@
 предположение, что в престижных 
несвободных программах нет серьезных 
ошибок.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-insec -->
-<li id="M201705120">
+  <li id="M201705120">
     <p>Критические ошибки в Windows, которые 
накапливались в НАБ а затем были
 разглашены группой Shadowbrokers, теперь 
применяются, чтобы <a
 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/";>заражать
@@ -186,9 +180,7 @@
 неправильно. В этом разделе описаны 
примеры помех со стороны Microsoft.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-interf -->
-<li id="M201809120">
+  <li id="M201809120">
     <p>Одна из версий Windows 10 <a
 
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
 распекает пользователей, если они 
пытаются установить Firefox (или
@@ -269,9 +261,7 @@
 конкретных программ Microsoft.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-sab -->
-<li id="M201704194">
+  <li id="M201704194">
     <p>Компания Microsoft сделала так, чтобы 
Windows&nbsp;7 и 8 прекратили работать
 на некоторых новых компьютерах, <a
 
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that";>фактически
@@ -358,9 +348,7 @@
 <h3 id="subscriptions">Подписка</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-subscript -->
-<li id="M201507150">
+  <li id="M201507150">
     <p>Microsoft Office принуждает пользователей <a
 
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>подписываться
 на Office 365, чтобы получить возможность 
редактировать документы</a>.</p>
@@ -371,9 +359,7 @@
 <h3 id="surveillance">Слежка</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-surv -->
-<li id="M201710134">
+  <li id="M201710134">
     <p>Программа телеметрии Windows 10 посылает в 
Microsoft информацию о компьютере
 пользователя и о том, как используется 
компьютер.</p>
 
@@ -524,9 +510,7 @@
 <h3 id="jails">Тюрьмы</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-jail -->
-<li id="M201706130">
+  <li id="M201706130">
     <p>Windows 10 S была тюрьмой: <a        
 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
 можно было установить и выполнять только 
программы из Windows
@@ -551,9 +535,7 @@
 <h3 id="tyrants">Тираны</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft-tyrant -->
-<li id="M201607150">
+  <li id="M201607150">
     <p>Microsoft случайно оставила пользователям 
способ установить GNU/Linux на
 планшетах RT с Windows, но теперь они <a
 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>&ldquo;исправили&rdquo;
@@ -649,7 +631,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-mobiles.fr.html     9 Oct 2018 13:30:39 -0000       1.45
+++ malware-mobiles.fr.html     17 Oct 2018 10:01:33 -0000      1.46
@@ -66,37 +66,46 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
 
 <ul class="blurbs">
-  <li><p>Le réseau téléphonique <a
+  <li id="M201502100">
+    <p>Le réseau téléphonique <a
 href="https://ssd.eff.org/en/module/problem-mobile-phones";>suit les
 mouvements de chaque téléphone</a>.</p>
+
     <p>C'est inhérent à la conception du réseau téléphonique : aussi 
longtemps que
 le téléphone est en communication avec lui, il n'y a aucun moyen d'empêcher
 le réseau d'enregistrer sa position. De nombreux pays (y compris les
 États-Unis et l'Union européenne) exigent que le réseau conserve toutes ces
 données de localisation pendant des mois ou des années.</p>
   </li>
-  <li><p id="universal-back-door">Le processeur de communication de chaque 
téléphone a une porte dérobée
+
+  <li id="M201311121">
+    <p id="universal-back-door">
+    Le processeur de communication de chaque téléphone a une porte dérobée
 universelle qui est <a
 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>souvent
 utilisée pour forcer le téléphone à transmettre toutes les conversations
 qu'il entend</a>.</p>
+
     <p>Cette porte dérobée <a
 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>peut
 prendre la forme de bogues qui sont restés  non corrigés pendant 20
 ans</a>. Le choix de laisser ces failles de sécurité en place est
 l'équivalent moral de la création d'une porte dérobée.</p>
+
     <p>La porte dérobée est dans le « processeur du modem », dont le 
rôle est de
 communiquer avec le réseau hertzien. Dans la plupart des téléphones, le
 processeur du modem a le contrôle du micro et en général il a aussi la
 capacité de réécrire le logiciel du processeur principal.</p>
+
     <p>Quelques modèles de téléphone sont spécialement conçus pour que le
 processeur du modem ne contrôle pas le micro et par conséquent ne puisse pas
 changer le logiciel du processeur principal. Ils ont tout de même une porte
 dérobée, mais au moins elle est incapable de transformer le téléphone en
 appareil d'écoute.</p>
+
     <p>Il semble que la porte dérobée universelle soit également utilisée 
pour
 forcer les téléphones à <a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>transmettre
@@ -141,9 +150,7 @@
 </ul>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-back-door -->
-<li id="M201609130">
+  <li id="M201609130">
     <p>Les téléphones Xiaomi sont livrés avec une <a
 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered";>porte
 dérobée universelle à l'usage de Xiaomi</a> dans le processeur
@@ -186,9 +193,7 @@
 <h3 id="drm">DRM</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-dr -->
-<li id="M201501030">
+  <li id="M201501030">
     <p id="netflix-app-geolocation-drm">L'appli Netflix pour Android <a
 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>force
 la connexion à utiliser les DNS de Google</a>. C'est l'une des méthodes
@@ -206,9 +211,7 @@
 que les logiciels privateurs prestigieux n'ont pas de bogue grave.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-insec -->
-<li id="M201807100">
+  <li id="M201807100">
     <p>Siri, Alexa et tous les autres systèmes de commande vocale peuvent 
être
 piratés par des programmes qui <a
 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>envoient
@@ -343,9 +346,7 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-surv -->
-<li id="M201806110">
+  <li id="M201806110">
     <p>L'appli pour la retransmission en direct du football espagnol <a
 
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>suit
 les déplacements de l'utilisateur et écoute via le micro</a>.</p>
@@ -808,9 +809,7 @@
 <h3 id="jails">Prisons</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-jail -->
-<li id="M201210080">
+  <li id="M201210080">
     <p><a
 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Feu
 Windows 8 pour « appareils mobiles » était une prison</a> : il 
censurait le
@@ -822,9 +821,7 @@
 <h3 id="tyrants">Tyrans</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-tyrant -->
-<li id="M201110110">
+  <li id="M201110110">
     <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Les
 appareils mobiles utilisant Windows 8 sont des tyrans</a>.</p>
   </li>
@@ -909,7 +906,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-mobiles.ru.html     9 Oct 2018 13:30:39 -0000       1.42
+++ malware-mobiles.ru.html     17 Oct 2018 10:01:33 -0000      1.43
@@ -64,35 +64,44 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
 
 <ul class="blurbs">
-  <li><p>Телефонная сеть <a
+  <li id="M201502100">
+    <p>Телефонная сеть <a
 href="https://ssd.eff.org/en/module/problem-mobile-phones";> 
отслеживает
 перемещения каждого телефона</a>.</p>
+
     <p>Это заложено в схеме телефонной сети: 
пока телефон связывается с сетью,
 помешать сети записывать его 
местоположение невозможно. Многие страны 
(в том
 числе США и Евросоюз) требуют, чтобы сеть х
ранила эти данные о
 местоположении в течение месяцев или 
лет.</p>
   </li>
-  <li><p id="universal-back-door">В коммуникационном 
процессоре почти любого телефона есть 
универсальный
+
+  <li id="M201311121">
+    <p id="universal-back-door">
+    В коммуникационном процессоре почти 
любого телефона есть универсальный
 черный ход, который <a
 href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
 часто применяется, чтобы заставить 
телефон передавать все разговоры, которые
 он слышит</a>.</p>
+
     <p>Лазейка <a
 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>может
 принимать форму ошибок, которые остаются 
неисправленными по 20
 лет</a>. Решение оставить прорехи в защите 
незаделанными нравственно
 эквивалентно написанию лазейки.</p>
+
     <p>Лазейка находится в &ldquo;модемном 
процессоре&rdquo;, который отвечает за
 связь с радиосетью. В большинстве 
телефонов модемный процессор контролирует
 работу микрофона. В большинстве телефонов 
он может переписывать программы и
 в главном процессоре.</p>
+
     <p>Есть модели телефонов, специально 
спроектированные, чтобы микрофон не
 контролировался модемным процессором и 
чтобы он не мог изменять программы в
 главном процессоре. Лазейка в них есть, но 
по крайней мере с ее помощью
 невозможно превратить телефон в 
подслушивающее устройство.</p>
+
     <p>Универсальный черный ход, очевидно, 
применяется также, чтобы заставлять
 телефоны <a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
@@ -136,9 +145,7 @@
 </ul>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-back-door -->
-<li id="M201609130">
+  <li id="M201609130">
     <p>Телефоны Xiaomi поставляются с <a
 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered";>универсальным
 черным ходом для пользования Xiaomi в 
процессоре для приложений</a>.</p>
@@ -180,9 +187,7 @@
 <h3 id="drm">Цифровое управление 
ограничениями</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-dr -->
-<li id="M201501030">
+  <li id="M201501030">
     <p id="netflix-app-geolocation-drm">Приложение Android Netflix <a
 
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
 принудительно использует Google DNS</a>. Это 
один из методов, применяемых
@@ -199,9 +204,7 @@
 предположение, что в престижных 
несвободных программах нет серьезных 
ошибок.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-insec -->
-<li id="M201807100">
+  <li id="M201807100">
     <p>Siri, Alexa и все другие системы голосового 
управления могут быть <a
 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>взяты
 под контроль программами, которые 
воспроизводят команды в неслышимом людьми
@@ -330,9 +333,7 @@
 <h3 id="surveillance">Слежка</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-surv -->
-<li id="M201806110">
+  <li id="M201806110">
     <p>Испанское приложение трансляций 
футбола <a
 href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>
 отслеживает перемещения пользователя и 
подслушивает через микрофон</a>.</p>
@@ -788,9 +789,7 @@
 <h3 id="jails">Тюрьмы</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-jail -->
-<li id="M201210080">
+  <li id="M201210080">
     <p><a
 
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
 Windows 8 на &ldquo;мобильных устройствах&rdquo; 
(более не действующая) была
@@ -802,9 +801,7 @@
 <h3 id="tyrants">Тираны</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT mobiles-tyrant -->
-<li id="M201110110">
+  <li id="M201110110">
     <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
 Мобильные устройства с предустановленной 
Windows 8&nbsp;&mdash; тираны</a>.</p>
   </li>
@@ -887,7 +884,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:39 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-webpages.fr.html    14 Oct 2018 12:58:19 -0000      1.12
+++ malware-webpages.fr.html    17 Oct 2018 10:01:33 -0000      1.13
@@ -54,12 +54,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT webpages -->
-<li id="M201807190">
+  <li id="M201807190">
     <p>British Airways a utilisé du <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>JavaScript
 non libre sur son site web pour donner aux autres compagnies des données
@@ -288,7 +286,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-webpages.ru.html    14 Oct 2018 13:28:27 -0000      1.11
+++ malware-webpages.ru.html    17 Oct 2018 10:01:33 -0000      1.12
@@ -53,12 +53,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT webpages -->
-<li id="M201807190">
+  <li id="M201807190">
     <p>British Airways пользовались на своем сайте <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>несвободными
 программами на JavaScript, чтобы выдавать 
персональные данные своих клиентов
@@ -287,7 +285,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/14 13:28:27 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: potential-malware.de.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.de.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- potential-malware.de.html   9 Oct 2018 13:30:40 -0000       1.6
+++ potential-malware.de.html   17 Oct 2018 10:01:33 -0000      1.7
@@ -28,12 +28,10 @@
 verwenden wird. Bislang spricht nichts dafür, dass sie bereits genutzt
 werden.</p>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT potential -->
-<li id="M201712130">
+  <li id="M201712130">
     <p>Patentanmeldungen zeigen, dass Google und Amazon daran interessiert 
sind <a
 
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>„digitale
 Assistenten“ dazu zu bringen Aktivitäten von Menschen zu studieren, um alles
@@ -138,7 +136,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: potential-malware.fr.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.fr.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- potential-malware.fr.html   9 Oct 2018 13:30:40 -0000       1.7
+++ potential-malware.fr.html   17 Oct 2018 10:01:33 -0000      1.8
@@ -24,12 +24,10 @@
 dans le futur à des fins malveillantes. Nous n'avons pas la preuve qu'elles
 soient déjà employées actuellement.</p>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT potential -->
-<li id="M201712130">
+  <li id="M201712130">
     <p>Si l'on en juge d'après leurs dépôts de brevets, Google et Amazon 
envisagent
 de faire des <a
 
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>«Â
 assistants
@@ -129,7 +127,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: potential-malware.ru.html
===================================================================
RCS file: /web/www/www/proprietary/potential-malware.ru.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- potential-malware.ru.html   9 Oct 2018 13:30:40 -0000       1.6
+++ potential-malware.ru.html   17 Oct 2018 10:01:33 -0000      1.7
@@ -25,12 +25,10 @@
 могли бы применять в будущем во целях 
вредительства. У нас нет свидетельств,
 что они уже применяются.</p>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT potential -->
-<li id="M201712130">
+  <li id="M201712130">
     <p>Заявки на патенты показывают, что Google и 
Amazon заинтересованы в том,
 чтобы <a
 
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
@@ -131,7 +129,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-back-doors.fr.html      9 Oct 2018 13:30:40 -0000       1.54
+++ proprietary-back-doors.fr.html      17 Oct 2018 10:01:33 -0000      1.55
@@ -55,9 +55,7 @@
 <h3 id='spy'>Espionner</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT spy -->
-<li id="M201706202">
+  <li id="M201706202">
     <p id="InternetCameraBackDoor">De nombreux modèles de caméras 
connectées contiennent une porte dérobée
 caractérisée. Elles ont des comptes utilisateurs avec des mots de passe
 codés en dur, non modifiables, et qui <a
@@ -105,9 +103,7 @@
 <h3 id='alter-data'>Altérer les données ou préférences de 
l'utilisateur</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT alter-data -->
-<li id="M201809140">
+  <li id="M201809140">
     <p>Android a une <a
 
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>porte
 dérobée permettant de modifier à distance la configuration
@@ -215,9 +211,7 @@
 <h3 id='install-delete'>Installer ou supprimer des programmes</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT install-delete -->
-<li id="M201804010">
+  <li id="M201804010">
     <p>Certains téléviseurs « intelligents » téléchargent 
automatiquement des <a
 
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>mises
 à jour régressives qui installent une appli de surveillance</a>.</p>
@@ -287,9 +281,7 @@
 <h3 id='universal'>Contrôle total</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT universal -->
-<li id="M201711244">
+  <li id="M201711244">
     <p>Le jouet <cite>Furby Connect</cite> a une <a
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>porte
 dérobée universelle</a>. Même si ce produit, tel qu'il est livré, n'est pas
@@ -409,9 +401,7 @@
 <h3 id='other'>Autre ou non défini</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT other -->
-<li id="M201711204">
+  <li id="M201711204">
     <p>La porte dérobée intentionnelle du « Moteur de gestion Intel » a 
aussi des
 <a
 
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>portes
@@ -558,7 +548,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-back-doors.ru.html      9 Oct 2018 13:30:40 -0000       1.50
+++ proprietary-back-doors.ru.html      17 Oct 2018 10:01:33 -0000      1.51
@@ -53,9 +53,7 @@
 <h3 id='spy'>Шпионаж</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT spy -->
-<li id="M201706202">
+  <li id="M201706202">
     <p id="InternetCameraBackDoor">Во многих моделях 
видеокамер с подключением к Интернету есть 
чудовищная
 лазейка&nbsp;&mdash; у них есть учетная запись с 
неизменяемым паролем, и <a
 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
@@ -100,9 +98,7 @@
 <h3 id='alter-data'>Изменение данных или настроек 
пользователя</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT alter-data -->
-<li id="M201809140">
+  <li id="M201809140">
     <p>В системе Android есть <a
 
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
 лазейка для удаленного изменения настроек 
&ldquo;пользователя&rdquo;</a>.</p>
@@ -206,9 +202,7 @@
 <h3 id='install-delete'>Установка или удаление 
программ</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT install-delete -->
-<li id="M201804010">
+  <li id="M201804010">
     <p>Некоторые &ldquo;интеллектуальные&rdquo; 
телевизоры автоматически <a
 
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
 загружают устарения, которые 
устанавливают программу слежки</a>.</p>
@@ -278,9 +272,7 @@
 <h3 id='universal'>Полный контроль</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT universal -->
-<li id="M201711244">
+  <li id="M201711244">
     <p>В Furby Connect есть <a
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
 универсальный черный ход</a>. Если продукт в 
том виде, в каком он
@@ -399,9 +391,7 @@
 <h3 id='other'>Прочие и неопределенные</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT other -->
-<li id="M201711204">
+  <li id="M201711204">
     <p>В преднамеренном черном ходе в 
&ldquo;машине управления&rdquo; Intel есть
 также <a
 href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
@@ -547,7 +537,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.de.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-censorship.de.html      12 Oct 2018 07:58:36 -0000      1.22
+++ proprietary-censorship.de.html      17 Oct 2018 10:01:33 -0000      1.23
@@ -55,9 +55,7 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google -->
-<li id="M201703160">
+  <li id="M201703160">
     <p><a
 
href="https://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";
 title=" Google 'Family Link' gives parents a way to monitor preteens'
@@ -103,9 +101,7 @@
 <h3 id="consoles">Spielkonsolen</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT consoles -->
-<li id="M201408290">
+  <li id="M201408290">
     <p>Nintendo: <a
 
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";
 title="Nintendo's New 3DS Charges 30 Cents to Remove an Internet Browser
@@ -193,7 +189,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.es.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-censorship.es.html      12 Oct 2018 07:58:36 -0000      1.26
+++ proprietary-censorship.es.html      17 Oct 2018 10:01:33 -0000      1.27
@@ -52,9 +52,7 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google -->
-<li id="M201703160">
+  <li id="M201703160">
     <p>Google <a
 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
 ofrece software de censura</a>, supuestamente para que los padres lo
@@ -94,9 +92,7 @@
 <h3 id="consoles">Juegos para consolas</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT consoles -->
-<li id="M201408290">
+  <li id="M201408290">
     <p>La consola <a
 
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>Nintendo
 3DS</a> censura el acceso a Internet. Esta censura se puede inhabilitar,
@@ -180,7 +176,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.fr.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-censorship.fr.html      12 Oct 2018 07:58:36 -0000      1.33
+++ proprietary-censorship.fr.html      17 Oct 2018 10:01:33 -0000      1.34
@@ -53,9 +53,7 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google -->
-<li id="M201703160">
+  <li id="M201703160">
     <p>Google <a
 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>propose
 des logiciels de censure</a>, soi-disant pour que les parents les installent
@@ -97,9 +95,7 @@
 <h3 id="consoles">Consoles de jeu</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT consoles -->
-<li id="M201408290">
+  <li id="M201408290">
     <p>La <a
 
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>Nintendo
 3DS</a> censure la navigation sur le web ; il est possible de désactiver
@@ -184,7 +180,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.ru.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-censorship.ru.html      12 Oct 2018 07:58:36 -0000      1.24
+++ proprietary-censorship.ru.html      17 Oct 2018 10:01:33 -0000      1.25
@@ -52,9 +52,7 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT google -->
-<li id="M201703160">
+  <li id="M201703160">
     <p>Google <a
 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
 предлагает программу для цензуры</a>, якобы 
для родителей, которые
@@ -95,9 +93,7 @@
 <h3 id="consoles">Игровые приставки</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT consoles -->
-<li id="M201408290">
+  <li id="M201408290">
     <p><a
 
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>Nintendo
 3DS</a> подвергает цензуре просмотр страниц 
Интернета; цензуру можно
@@ -183,7 +179,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-coverups.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.de.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-coverups.de.html        9 Oct 2018 13:30:40 -0000       1.7
+++ proprietary-coverups.de.html        17 Oct 2018 10:01:33 -0000      1.8
@@ -40,12 +40,10 @@
 zwei) an, um die Einzelheiten aufzuzeigen.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT coverups -->
-<li id="M201612120">
+  <li id="M201612120">
     <p>Price Waterhouse Coopers versuchte <a
 
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/";
 title="PwC sends 'cease and desist' letters to researchers who found
@@ -132,7 +130,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-coverups.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-coverups.fr.html        9 Oct 2018 13:30:40 -0000       1.10
+++ proprietary-coverups.fr.html        17 Oct 2018 10:01:33 -0000      1.11
@@ -39,12 +39,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT coverups -->
-<li id="M201612120">
+  <li id="M201612120">
     <p>Price Waterhouse Coopers a essayé d'empêcher que la présence d'une 
faille de
 sécurité ne s'ébruite en <a
 
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/";>menaçant
@@ -129,7 +127,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-coverups.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-coverups.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-coverups.ru.html        9 Oct 2018 13:30:40 -0000       1.8
+++ proprietary-coverups.ru.html        17 Oct 2018 10:01:33 -0000      1.9
@@ -39,12 +39,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT coverups -->
-<li id="M201612120">
+  <li id="M201612120">
     <p>Компания PwC пыталась заглушить знание 
об уязвимости, <a
 
href="http://www.zdnet.com/article/pwc-sends-security-researchers-cease-and-desist-letter-instead-of-fixing-security-flaw/";>угрожая
 судебным преследованием аналитикам 
безопасности, обнаружившим
@@ -129,7 +127,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-deception.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.fr.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-deception.fr.html       9 Oct 2018 13:30:40 -0000       1.19
+++ proprietary-deception.fr.html       17 Oct 2018 10:01:33 -0000      1.20
@@ -38,12 +38,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT deception -->
-<li id="M201611060">
+  <li id="M201611060">
     <p><a
 
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>Pour
 truander les tests antipollution, Le logiciel privateur d'Audi a employé une
@@ -176,7 +174,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-deception.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-deception.ru.html       9 Oct 2018 13:30:40 -0000       1.18
+++ proprietary-deception.ru.html       17 Oct 2018 10:01:33 -0000      1.19
@@ -38,12 +38,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT deception -->
-<li id="M201611060">
+  <li id="M201611060">
     <p><a
 
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
 В несвободных программах Audi применялся 
простой метод обмана тестов
@@ -175,7 +173,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-drm.fr.html     9 Oct 2018 13:30:40 -0000       1.28
+++ proprietary-drm.fr.html     17 Oct 2018 10:01:33 -0000      1.29
@@ -50,12 +50,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT drm -->
-<li id="M201806250">
+  <li id="M201806250">
     <p>Le jeu <cite>Metal Gear Rising</cite> pour MacOS dépendait d'un 
serveur. La
 société <a
 
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>a
@@ -370,7 +368,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-drm.ru.html     9 Oct 2018 13:30:40 -0000       1.25
+++ proprietary-drm.ru.html     17 Oct 2018 10:01:33 -0000      1.26
@@ -51,12 +51,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT drm -->
-<li id="M201806250">
+  <li id="M201806250">
     <p>Игра Metal Gear Rising для MacOS привязана к 
серверу. Компания <a
 
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
 выключила сервер, и все копии перестали 
работать</a>.</p>
@@ -376,7 +374,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-incompatibility.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.fr.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-incompatibility.fr.html 9 Oct 2018 13:30:40 -0000       1.10
+++ proprietary-incompatibility.fr.html 17 Oct 2018 10:01:33 -0000      1.11
@@ -45,12 +45,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT incompatibility -->
-<li id="M201803300">
+  <li id="M201803300">
     <p>Dans MacOS et iOS, la <a
 
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>procédure
 de conversion d'images au format Photos</a> vers un format libre est si
@@ -156,7 +154,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-incompatibility.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-incompatibility.ru.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-incompatibility.ru.html 9 Oct 2018 13:30:40 -0000       1.8
+++ proprietary-incompatibility.ru.html 17 Oct 2018 10:01:33 -0000      1.9
@@ -44,12 +44,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT incompatibility -->
-<li id="M201803300">
+  <li id="M201803300">
     <p>В MacOS и iOS процедура <a
 
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
 преобразования изображений из формата 
Photos</a> в свободный формат
@@ -157,7 +155,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary-insecurity.fr.html      9 Oct 2018 13:30:40 -0000       1.73
+++ proprietary-insecurity.fr.html      17 Oct 2018 10:01:33 -0000      1.74
@@ -56,12 +56,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT insecurity -->
-<li id="M201809240">
+  <li id="M201809240">
     <p>Des chercheurs ont découvert un moyen de <a
 
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>cacher
 des commandes vocales dans d'autres flux audio</a>. Elles sont inaudibles
@@ -672,7 +670,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-insecurity.ru.html      9 Oct 2018 13:30:40 -0000       1.62
+++ proprietary-insecurity.ru.html      17 Oct 2018 10:01:33 -0000      1.63
@@ -56,12 +56,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT insecurity -->
-<li id="M201809240">
+  <li id="M201809240">
     <p>Исследователи открыли способ <a
 
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
 скрывать голосовые команды в других 
звукозаписях</a>, так что люди эти
@@ -656,7 +654,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-interference.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.fr.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-interference.fr.html    14 Oct 2018 12:58:19 -0000      1.32
+++ proprietary-interference.fr.html    17 Oct 2018 10:01:33 -0000      1.33
@@ -39,12 +39,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT interference -->
-<li id="M201809120">
+  <li id="M201809120">
     <p>Une des versions de Windows 10 <a
 
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>sermonne
 les utilisateurs s'ils essaient d'installer Firefox (ou Chrome)</a>.</p>
@@ -260,7 +258,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-interference.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-interference.ru.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-interference.ru.html    14 Oct 2018 13:28:27 -0000      1.26
+++ proprietary-interference.ru.html    17 Oct 2018 10:01:33 -0000      1.27
@@ -39,12 +39,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT interference -->
-<li id="M201809120">
+  <li id="M201809120">
     <p>Одна из версий Windows 10 <a
 
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
 распекает пользователей, если они 
пытаются установить Firefox (или
@@ -257,7 +255,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/14 13:28:27 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-jails.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.fr.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-jails.fr.html   9 Oct 2018 13:30:40 -0000       1.27
+++ proprietary-jails.fr.html   17 Oct 2018 10:01:33 -0000      1.28
@@ -76,9 +76,7 @@
 <h4>Exemples de censure par les prisons d'Apple</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple -->
-<li id="M201710130">
+  <li id="M201710130">
     <p>Cette société <a
 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>censure
 également des applis pour le gouvernement américain</a>. Plus précisément,
@@ -190,9 +188,7 @@
 <h3 id="microsoft">Prisons de Microsoft</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft -->
-<li id="M201706130">
+  <li id="M201706130">
     <p>Windows 10 S était une prison : <a
 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>Seuls
 les programmes du magasin de Windows pouvaient être installés et
@@ -297,7 +293,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:33 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-jails.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.ru.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-jails.ru.html   9 Oct 2018 13:30:40 -0000       1.24
+++ proprietary-jails.ru.html   17 Oct 2018 10:01:34 -0000      1.25
@@ -75,9 +75,7 @@
 <h4>Примеры церзуры в тюрьмах Apple</h4>
 
 <ul class="blurbs">
-
-  <!-- INSERT apple -->
-<li id="M201710130">
+  <li id="M201710130">
     <p>Apple <a
 
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
 налагает цензуру и от лица правщего режима 
США</a>. В частности, компания
@@ -188,9 +186,7 @@
 <h3 id="microsoft">Тюрьмы Microsoft</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT microsoft -->
-<li id="M201706130">
+  <li id="M201706130">
     <p>Windows 10 S была тюрьмой: <a        
 
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
 можно было установить и выполнять только 
программы из Windows
@@ -291,7 +287,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-sabotage.fr.html        10 Oct 2018 10:57:51 -0000      1.55
+++ proprietary-sabotage.fr.html        17 Oct 2018 10:01:34 -0000      1.56
@@ -38,12 +38,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT sabotage -->
-<li id="M201807050">
+  <li id="M201807050">
     <p>Le « traqueur d'activité » de Jawbone était couplé à une 
appli mobile
 privatrice. En 2017, la société a fermé et a rendu l'appli inopérante. <a
 
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which";>Tous
@@ -556,7 +554,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ru.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-sabotage.ru.html        11 Oct 2018 06:59:25 -0000      1.47
+++ proprietary-sabotage.ru.html        17 Oct 2018 10:01:34 -0000      1.48
@@ -38,12 +38,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT sabotage -->
-<li id="M201807050">
+  <li id="M201807050">
     <p>Физкультурное устройство Jawbone было 
привязано к несвободному телефонному
 приложению. В 2017&nbsp;году компания 
закрылась и прекратила работу
 приложения. <a
@@ -549,7 +547,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-subscriptions.fr.html   9 Oct 2018 13:30:40 -0000       1.15
+++ proprietary-subscriptions.fr.html   17 Oct 2018 10:01:34 -0000      1.16
@@ -42,12 +42,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT subscriptions -->
-<li id="M201711010">
+  <li id="M201711010">
     <p>Sony a ressorti son robot de compagnie Aibo, cette fois-ci <a
 
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>avec
 une porte dérobée universelle, ainsi qu'une dépendance à un serveur avec
@@ -167,7 +165,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-subscriptions.ru.html   9 Oct 2018 13:30:40 -0000       1.12
+++ proprietary-subscriptions.ru.html   17 Oct 2018 10:01:34 -0000      1.13
@@ -41,12 +41,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT subscriptions -->
-<li id="M201711010">
+  <li id="M201711010">
     <p>Sony снова выпустила свою собачку-робота 
Aibo, на этот раз <a
 
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
 с универсальным черным ходом, и привязала 
к серверу, который требует
@@ -167,7 +165,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-surveillance.fr.html    7 Oct 2018 22:29:11 -0000       1.136
+++ proprietary-surveillance.fr.html    17 Oct 2018 10:01:34 -0000      1.137
@@ -182,9 +182,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT windows -->
-<li id="M201712110">
+  <li id="M201712110">
     <p>Dans le système d'exploitation privateur de HP, on trouve <a
 href="http://www.bbc.com/news/technology-42309371";>un pilote pour le clavier
 qui contient un enregistreur de frappe <cite>[key logger]</cite></a>.</p>
@@ -355,9 +353,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT macos -->
-<li id="M201809070">
+  <li id="M201809070">
     <p>Adware Doctor, un bloqueur de pubs pour MacOS, <a
 
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>envoie
 l'historique de navigation de l'utilisateur à sa maison mère</a>. </p>
@@ -422,9 +418,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT bios -->
-<li id="M201509220">
+  <li id="M201509220">
     <p><a
 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>Lenovo
 a installé furtivement des logiciels promotionnels et espions via le
@@ -452,9 +446,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT phones -->
-<li id="M201601110">
+  <li id="M201601110">
     <p>L'extension naturelle de la surveillance des gens au moyen de « leur 
»
 téléphone est <a
 
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html";>le
@@ -503,9 +495,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT ithings -->
-<li id="M201711250">
+  <li id="M201711250">
     <p>La DMCA et la directive de l'UE relative au droit d'auteur rendent <a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>illégal
 d'étudier la manière dont les applis sous iOS espionnent l'utilisateur</a>
@@ -629,9 +619,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT android -->
-<li id="M201711210">
+  <li id="M201711210">
     <p>Android fait de la géolocalisation pour Google <a
 
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>même
 quand les « services de localisation » sont désactivés, et même quand le
@@ -728,9 +716,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT e-readers -->
-<li id="M201603080">
+  <li id="M201603080">
     <p>Les livres électroniques peuvent contenir du code JavaScript et <a
 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>quelquefois
 ce code espionne les utilisateurs</a>.</p>
@@ -774,9 +760,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT apps -->
-<li id="M201808030">
+  <li id="M201808030">
     <p>Certaines applis Android <a
 
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>enregistrent
 la position de l'utilisateur même quand il désactive la 
géolocalisation</a>.</p>
@@ -1197,9 +1181,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT skype -->
-<li id="M201307110">
+  <li id="M201307110">
     <p>Skype aussi <a
 
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>contient
 un espiogiciel</a> ; Microsoft l'a modifié <a
@@ -1216,9 +1198,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT games -->
-<li id="M201806240">
+  <li id="M201806240">
     <p>Red Shell est un espiogiciel présent dans beaucoup de jeux privateurs. 
Il <a
 
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/";>récupère
 des données sur l'ordinateur de l'utilisateur et les envoie à des 
tiers</a>.</p>
@@ -1301,9 +1281,7 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT stings -->
-<li id="M201708280">
+  <li id="M201708280">
     <p>La mauvaise sécurisation de beaucoup d'appareils de l'Internet des 
dangers
 permet aux <a
 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>fournisseurs
@@ -1330,9 +1308,7 @@
 téléviseurs « intelligents » ou « connectés ».</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT tvsets -->
-<li id="M201804010">
+  <li id="M201804010">
     <p>Certains téléviseurs « intelligents » téléchargent 
automatiquement des <a
 
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>mises
 à jour régressives qui installent une appli de surveillance</a>.</p>
@@ -1488,9 +1464,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT cameras -->
-<li id="M201603220">
+  <li id="M201603220">
     <p>Plus de 70 modèles de caméras de surveillance connectées au réseau 
ont <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>des
 failles de sécurité qui permettent à n'importe qui de s'en servir pour
@@ -1515,9 +1489,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT toys -->
-<li id="M201711244">
+  <li id="M201711244">
     <p>Le jouet <cite>Furby Connect</cite> a une <a
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>porte
 dérobée universelle</a>. Même si ce produit, tel qu'il est livré, n'est pas
@@ -1599,9 +1571,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT drones -->
-<li id="M201708040">
+  <li id="M201708040">
     <p>Pendant que vous utilisez un drone DJI pour espionner d'autres 
personnes, le
 DJI est dans la plupart des cas <a
 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>en
@@ -1616,9 +1586,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT home -->
-<li id="M201808120">
+  <li id="M201808120">
     <p>Des crackers ont trouvé moyen de contourner les dispositifs de 
sécurité d'un
 appareil d'Amazon et de <a
 href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>le transformer
@@ -1675,9 +1643,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT wearables -->
-<li id="M201807260">
+  <li id="M201807260">
     <p>Les vêtements de Tommy Hilfiger <a
 
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>vont
 surveiller combien de fois ils sont portés</a>.</p>
@@ -1691,9 +1657,7 @@
 <h5 id="SpywareOnSmartWatches">Montres « intelligentes »</h5>
 
 <ul class="blurbs">
-
-  <!-- INSERT watches -->
-<li id="M201603020">
+  <li id="M201603020">
     <p>Une « montre intelligente » très bon marché est livrée avec une 
appli
 Android <a
 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>qui
@@ -1720,9 +1684,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT cars -->
-<li id="M201711230">
+  <li id="M201711230">
     <p>Les applis d'aide à la conduite intégrant de l'intelligence 
artificielle
 peuvent <a
 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>suivre
@@ -1789,9 +1751,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT virtual -->
-<li id="M201612230">
+  <li id="M201612230">
     <p>L'équipement de réalité virtuelle, en mesurant chaque petit 
mouvement, rend
 possible la plus intime des surveillances. Pour réaliser ce potentiel il
 suffit d'un <a
@@ -1820,9 +1780,7 @@
 mais ce flicage constitue malgré tout un abus.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT websites -->
-<li id="M201805170">
+  <li id="M201805170">
     <p>Le program Storyful <a
 
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>espionne
 les journalistes qui l'utilisent</a>.</p>
@@ -1891,9 +1849,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT javascript -->
-<li id="M201807190">
+  <li id="M201807190">
     <p>British Airways a utilisé du <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>JavaScript
 non libre sur son site web pour donner aux autres compagnies des données
@@ -1935,9 +1891,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT flash -->
-<li id="M201310110">
+  <li id="M201310110">
     <p>Flash et JavaScript sont employés dans <a
 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>des
 dispositifs de « profilage »</a> destinés à identifier les 
utilisateurs.</p>
@@ -1959,9 +1913,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT chrome -->
-<li id="M201507280">
+  <li id="M201507280">
     <p>Dans Google Chrome, les extensions ont toute facilité pour <a
 
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>espionner
 en détail la navigation de l'utilisateur</a>, et beaucoup ne s'en privent
@@ -1999,9 +1951,7 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT networks -->
-<li id="M201606030">
+  <li id="M201606030">
     <p>Une enquête a montré <a
 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>que
 le GCHQ se servait de sociétés américaines et de la NSA pour contourner les
@@ -2099,7 +2049,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/07 22:29:11 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary-surveillance.ru.html    7 Oct 2018 22:29:11 -0000       1.137
+++ proprietary-surveillance.ru.html    17 Oct 2018 10:01:34 -0000      1.138
@@ -183,9 +183,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT windows -->
-<li id="M201712110">
+  <li id="M201712110">
     <p>В состав несвободной операционной 
системы HP <a
 href="http://www.bbc.com/news/technology-42309371";>входит 
несвободный
 драйвер клавиатуры, который записывает 
все нажатия на клавиши</a>.</p>
@@ -356,9 +354,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT macos -->
-<li id="M201809070">
+  <li id="M201809070">
     <p>Adware Doctor, блокировщик рекламы для MacOS, <a
 
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>докладывает
 об истории посещений сайтов 
пользователем</a>.</p>
@@ -421,9 +417,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT bios -->
-<li id="M201509220">
+  <li id="M201509220">
     <p><a
 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
 Lenovo скрытно устанавливала 
программы-шпионы и другой мусор через BIOS</a>
@@ -451,9 +445,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT phones -->
-<li id="M201601110">
+  <li id="M201601110">
     <p>Естественное продолжение надзора за 
людьми при посредстве &ldquo;их&rdquo;
 телефонов&nbsp;&mdash; <a
 
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html";>
@@ -501,9 +493,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT ithings -->
-<li id="M201711250">
+  <li id="M201711250">
     <p>DMCA и Директива об автоском праве 
Евросоюза делают <a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>
 незаконным изучение того, как приложения 
iOS шпионят за пользователями</a>,
@@ -625,9 +615,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT android -->
-<li id="M201711210">
+  <li id="M201711210">
     <p>Android отслеживает перемещения для Google, <a
 
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>даже
 когда &ldquo;службы местоположения&rdquo; 
выключены, даже когда в телефоне
@@ -725,9 +713,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT e-readers -->
-<li id="M201603080">
+  <li id="M201603080">
     <p>В электронных книгах могут 
содержаться <a
 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>программы
 на JavaScript, которые иногда подглядывают за 
читателями</a>.</p>
@@ -772,9 +758,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT apps -->
-<li id="M201808030">
+  <li id="M201808030">
     <p>Некоторые приложения Google в системе 
Android <a
 
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
 записывают местоположение пользователя, 
даже когда пользователи отключают
@@ -1189,9 +1173,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT skype -->
-<li id="M201307110">
+  <li id="M201307110">
     <p><a
 
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>Skype
 содержит программы-шпионы</a>. В Microsoft 
изменили Skype <a
@@ -1208,9 +1190,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT games -->
-<li id="M201806240">
+  <li id="M201806240">
     <p>Red Shell&nbsp;&mdash; программа-шпион, 
заложенная во многих несвободных
 играх. Она <a
 
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/";>
@@ -1295,9 +1275,7 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT stings -->
-<li id="M201708280">
+  <li id="M201708280">
     <p>Отвратительная безопасность во многих 
устройствах Интернета клещей позволяет
 <a
 
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>операторам
@@ -1324,9 +1302,7 @@
 &ldquo;умных&rdquo; телевизоров Amazon.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT tvsets -->
-<li id="M201804010">
+  <li id="M201804010">
     <p>Некоторые &ldquo;интеллектуальные&rdquo; 
телевизоры автоматически <a
 
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>загружают
 устарение, которое устанавливает 
приложение слежки</a>.</p>
@@ -1477,9 +1453,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT cameras -->
-<li id="M201603220">
+  <li id="M201603220">
     <p>В камерах наблюдения более 70 марок 
обнаружены <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>недочеты
 безопасности, позволяющие кому угодно 
подглядывать через них</a>.</p>
@@ -1503,9 +1477,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT toys -->
-<li id="M201711244">
+  <li id="M201711244">
     <p>В Furby Connect есть <a
 
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
 универсальный черный ход</a>. Если продукт в 
том виде, в каком он
@@ -1585,9 +1557,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT drones -->
-<li id="M201708040">
+  <li id="M201708040">
     <p>Пока вы пользуетесь беспилотником DJI, 
чтобы подглядывать за другими, <a
 
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity";>DJI
 во многих случаях подглядывает за 
вами</a>.</p>
@@ -1601,9 +1571,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT home -->
-<li id="M201808120">
+  <li id="M201808120">
     <p>Взломщики нашли способ пробить защиту 
устройства Amazon и <a
 href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";> 
превратить
 его в устройство, подслушивающее</a> для них
.</p>
@@ -1658,9 +1626,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT wearables -->
-<li id="M201807260">
+  <li id="M201807260">
     <p>Одежда Томми Гилфингера <a
 
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>отслеживает,
 как часто люди ее надевают</a>.</p>
@@ -1674,9 +1640,7 @@
 <h5 id="SpywareOnSmartWatches">&ldquo;Интеллектуальные&rdquo; 
часы</h5>
 
 <ul class="blurbs">
-
-  <!-- INSERT watches -->
-<li id="M201603020">
+  <li id="M201603020">
     <p>Очень дешевые &ldquo;интеллектуальные 
часы&rdquo; входят в состав приложения
 Android, которое <a
 
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>подключается
@@ -1702,9 +1666,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT cars -->
-<li id="M201711230">
+  <li id="M201711230">
     <p>Программы с искусственным 
интеллектом, ограничивающие пользование 
телефоном
 во время вождения, могут <a
 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -1768,9 +1730,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT virtual -->
-<li id="M201612230">
+  <li id="M201612230">
     <p>Оборудование для виртуальной 
реальности, измеряющее самые небольшие
 движения, создает возможноть для 
беспрецедентно строгой слежки за
 пользователем. Все, что нужно для 
реализации этой возможности&nbsp;&mdash;
@@ -1801,9 +1761,7 @@
 смысла</a>, но все равно слежка является 
злоупотреблением.</p>
 
 <ul class="blurbs">
-
-  <!-- INSERT websites -->
-<li id="M201805170">
+  <li id="M201805170">
     <p>Программа Storyful <a
 
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>шпионит
 за репортерами, которые ею пользуются</a>.</p>
@@ -1871,9 +1829,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT javascript -->
-<li id="M201807190">
+  <li id="M201807190">
     <p>British Airways пользовались на своем сайте <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>несвободными
 программами на JavaScript, чтобы выдавать 
персональные данные своих клиентов
@@ -1915,9 +1871,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT flash -->
-<li id="M201310110">
+  <li id="M201310110">
     <p>Flash и JavaScript применяют для <a
 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
 снятия &ldquo;отпечатков пальцев&rdquo; 
устройств</a> с целью идентификации
@@ -1939,9 +1893,7 @@
 </div>
 
 <ul class="blurbs">
-
-  <!-- INSERT chrome -->
-<li id="M201507280">
+  <li id="M201507280">
     <p>Google Chrome легко позволяет расширению 
вести <a
 
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>полную
 слежку за пользованием браузером</a>, и 
многие из них так и делают.</p>
@@ -1977,9 +1929,7 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT networks -->
-<li id="M201606030">
+  <li id="M201606030">
     <p>Расследование показывает, что <a
 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>Центр
 правительственной связи Великобритании 
пользуется компаниями США и НАБ для
@@ -2074,7 +2024,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/07 22:29:11 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-tethers.fr.html 9 Oct 2018 13:30:40 -0000       1.25
+++ proprietary-tethers.fr.html 17 Oct 2018 10:01:34 -0000      1.26
@@ -39,12 +39,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT tethers -->
-<li id="M201809260">
+  <li id="M201809260">
     <p>Les thermostats « intelligents » d'Honeywell communiquent par
 l'intermédiaire du serveur de la société. Ils ont toutes les
 caractéristiques de ce genre d'appareil : <a
@@ -247,7 +245,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tethers.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.ru.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-tethers.ru.html 9 Oct 2018 13:30:40 -0000       1.18
+++ proprietary-tethers.ru.html 17 Oct 2018 10:01:34 -0000      1.19
@@ -39,12 +39,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT tethers -->
-<li id="M201809260">
+  <li id="M201809260">
     <p>&ldquo;Интеллектуальные&rdquo; термостаты 
Honeywell связываются только с
 сервером компании. У них есть все скверные 
черты таких устройств: <a
 
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9";>
@@ -246,7 +244,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tyrants.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.fr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-tyrants.fr.html 9 Oct 2018 13:30:40 -0000       1.21
+++ proprietary-tyrants.fr.html 17 Oct 2018 10:01:34 -0000      1.22
@@ -42,12 +42,10 @@
 décrivant le problème.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT tyrants -->
-<li id="M201607150">
+  <li id="M201607150">
     <p>Microsoft avait accidentellement laissé aux utilisateurs un moyen
 d'installer GNU/Linux sur les tablettes fonctionnant sous Windows RT, mais
 désormais <a
@@ -188,7 +186,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tyrants.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.ru.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-tyrants.ru.html 9 Oct 2018 13:30:40 -0000       1.19
+++ proprietary-tyrants.ru.html 17 Oct 2018 10:01:34 -0000      1.20
@@ -42,12 +42,10 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
 
 <ul class="blurbs">
-
-  <!-- INSERT tyrants -->
-<li id="M201607150">
+  <li id="M201607150">
     <p>Microsoft случайно оставила пользователям 
способ установить GNU/Linux на
 планшетах RT с Windows, но теперь они <a
 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>&ldquo;исправили&rdquo;
@@ -185,7 +183,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary.fr.html 14 Oct 2018 12:58:19 -0000      1.36
+++ proprietary.fr.html 17 Oct 2018 10:01:34 -0000      1.37
@@ -151,9 +151,7 @@
 <h3 id="latest">Ajouts récents</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT proprietary -->
-<li id="M201805080">
+  <li id="M201805080">
     <p>Un cracker a exploité une faille dans un logiciel non mis à jour <a
 
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>pour
 injecter un « mineur » dans les pages web</a> servies aux visiteurs. Ce 
type
@@ -288,7 +286,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.pt-br.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.pt-br.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary.pt-br.html      14 Oct 2018 23:57:58 -0000      1.4
+++ proprietary.pt-br.html      17 Oct 2018 10:01:34 -0000      1.5
@@ -151,9 +151,7 @@
 <h3 id="latest">Últimas adições</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT proprietary -->
-<li id="M201805080">
+  <li id="M201805080">
     <p>Um cracker usou um exploit em software desatualizado para <a
 
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
 injetar um "minerador" em páginas da web</a> servidas aos visitantes. Esse
@@ -286,7 +284,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última atualização: 
 
-$Date: 2018/10/14 23:57:58 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary.ru.html 14 Oct 2018 13:28:27 -0000      1.32
+++ proprietary.ru.html 17 Oct 2018 10:01:34 -0000      1.33
@@ -156,9 +156,7 @@
 <h3 id="latest">Последние добавления</h3>
 
 <ul class="blurbs">
-
-  <!-- INSERT proprietary -->
-<li id="M201805080">
+  <li id="M201805080">
     <p>Взломщик воспользовался брешью в 
необновленной программе для <a
 
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
 вставки &ldquo;майнера&rdquo; на страницах 
сайта</a>, передаваемых
@@ -292,7 +290,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/14 13:28:27 $
+$Date: 2018/10/17 10:01:34 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-adobe.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.de-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-adobe.de-diff.html       9 Oct 2018 13:30:40 -0000       1.5
+++ po/malware-adobe.de-diff.html       17 Oct 2018 10:01:34 -0000      1.6
@@ -49,16 +49,15 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.&lt;/p&gt;
-&lt;/div&gt;</em></ins></span>
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit" id="malware-adobe"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT adobe --&gt;
   &lt;li id="M201701110"&gt;
     &lt;p&gt;An upgrade package for Acrobat Reader &lt;a
     
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/"&gt;silently
@@ -106,7 +105,7 @@
     &lt;p&gt;Adobe applications</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/"&gt;
-    require periodic connection</em></ins></span> to <span 
class="removed"><del><strong>perform a license check&lt;/a&gt;, 
at</strong></del></span> a <span class="removed"><del><strong>random time every 
30
+    require periodic connection</em></ins></span> to <span 
class="removed"><del><strong>perform</strong></del></span> a <span 
class="removed"><del><strong>license check&lt;/a&gt;, at a random time every 30
 days.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;.&lt;/p&gt;
@@ -190,7 +189,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-adobe.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.fr-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-adobe.fr-en.html 9 Oct 2018 13:30:40 -0000       1.9
+++ po/malware-adobe.fr-en.html 17 Oct 2018 10:01:34 -0000      1.10
@@ -40,10 +40,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
 
 <ul class="blurbs">
-<!-- INSERT adobe -->
   <li id="M201701110">
     <p>An upgrade package for Acrobat Reader <a
     
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silently
@@ -158,7 +157,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-adobe.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.ja-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-adobe.ja-diff.html       9 Oct 2018 13:30:40 -0000       1.5
+++ po/malware-adobe.ja-diff.html       17 Oct 2018 10:01:34 -0000      1.6
@@ -49,16 +49,15 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.&lt;/p&gt;
-&lt;/div&gt;</em></ins></span>
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
 &lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+<span class="inserted"><ins><em>&lt;/div&gt;
+&lt;div class="column-limit" id="malware-adobe"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT adobe --&gt;
   &lt;li id="M201701110"&gt;
     &lt;p&gt;An upgrade package for Acrobat Reader &lt;a
     
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/"&gt;silently
@@ -106,7 +105,7 @@
     &lt;p&gt;Adobe applications</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/"&gt;
-    require periodic connection</em></ins></span> to <span 
class="removed"><del><strong>perform a license check&lt;/a&gt;, 
at</strong></del></span> a <span class="removed"><del><strong>random time every 
30
+    require periodic connection</em></ins></span> to <span 
class="removed"><del><strong>perform</strong></del></span> a <span 
class="removed"><del><strong>license check&lt;/a&gt;, at a random time every 30
 days.&lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;.&lt;/p&gt;
@@ -190,7 +189,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-adobe.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.ru-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-adobe.ru-en.html 9 Oct 2018 13:30:40 -0000       1.10
+++ po/malware-adobe.ru-en.html 17 Oct 2018 10:01:34 -0000      1.11
@@ -40,10 +40,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-adobe"></div>
 
 <ul class="blurbs">
-<!-- INSERT adobe -->
   <li id="M201701110">
     <p>An upgrade package for Acrobat Reader <a
     
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/";>silently
@@ -158,7 +157,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-amazon.es-en.html        12 Oct 2018 07:58:36 -0000      1.12
+++ po/malware-amazon.es-en.html        17 Oct 2018 10:01:34 -0000      1.13
@@ -53,7 +53,6 @@
 <h4 id="back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-back-door -->
   <li id="M201503210">
     <p>Amazon <a
     
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
@@ -86,7 +85,6 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-surv -->
   <li id="M201212031">
     <p>The Electronic Frontier Foundation has examined and found <a
     href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
@@ -98,7 +96,6 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-dr -->
   <li id="M201704131">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
     The Amazon Kindle has DRM</a>.  That article is flawed in that it
@@ -117,7 +114,6 @@
 <h4 id="echo-back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-back-door -->
   <li id="M201606060">
     <p>The Amazon Echo appears to have a universal back door, since <a
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
@@ -133,7 +129,6 @@
 <h4 id="echo-surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-surv -->
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -155,7 +150,6 @@
 <h3 id="misc"> Malware in other products</h3>
 
 <ul class="blurbs">
-<!-- INSERT amazon-misc -->
   <li id="M201711200">
     <p>Amazon recently invited consumers to be suckers and <a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
@@ -228,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-amazon.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-amazon.fr-en.html        12 Oct 2018 07:58:36 -0000      1.12
+++ po/malware-amazon.fr-en.html        17 Oct 2018 10:01:34 -0000      1.13
@@ -53,7 +53,6 @@
 <h4 id="back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-back-door -->
   <li id="M201503210">
     <p>Amazon <a
     
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
@@ -86,7 +85,6 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-surv -->
   <li id="M201212031">
     <p>The Electronic Frontier Foundation has examined and found <a
     href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
@@ -98,7 +96,6 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-dr -->
   <li id="M201704131">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
     The Amazon Kindle has DRM</a>.  That article is flawed in that it
@@ -117,7 +114,6 @@
 <h4 id="echo-back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-back-door -->
   <li id="M201606060">
     <p>The Amazon Echo appears to have a universal back door, since <a
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
@@ -133,7 +129,6 @@
 <h4 id="echo-surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-surv -->
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -155,7 +150,6 @@
 <h3 id="misc"> Malware in other products</h3>
 
 <ul class="blurbs">
-<!-- INSERT amazon-misc -->
   <li id="M201711200">
     <p>Amazon recently invited consumers to be suckers and <a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
@@ -228,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- po/malware-amazon.it-diff.html      12 Oct 2018 07:58:36 -0000      1.14
+++ po/malware-amazon.it-diff.html      17 Oct 2018 10:01:34 -0000      1.15
@@ -61,13 +61,13 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.&lt;/p&gt;
-&lt;/div&gt;</em></ins></span>
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;h2</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;p class="c" style="font-size: 1.2em"&gt;
+&lt;p class="c" style="font-size: 1.2em"&gt;
 &nbsp;&lt;a href="#swindle"&gt;Kindle&nbsp;Swindle&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#echo"&gt;Echo&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#misc"&gt;Other&nbsp;products&lt;/a&gt;&nbsp;
@@ -97,7 +97,6 @@
 <span class="inserted"><ins><em>&lt;h4 id="back-doors"&gt;Back Doors&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT swindle-back-door --&gt;
   &lt;li id="M201503210"&gt;
     &lt;p&gt;Amazon &lt;a
     
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml"&gt;
@@ -151,7 +150,6 @@
 <span class="inserted"><ins><em>&lt;h4 
id="surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT swindle-surv --&gt;
   &lt;li id="M201212031"&gt;
     &lt;p&gt;The</em></ins></span> Electronic Frontier Foundation has examined 
and found &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
@@ -167,7 +165,6 @@
 <span class="inserted"><ins><em>&lt;h4 id="drm"&gt;DRM&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT swindle-dr --&gt;
   &lt;li id="M201704131"&gt;
     &lt;p&gt;&lt;a</em></ins></span> 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
     The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
@@ -193,7 +190,6 @@
 &lt;h4 id="echo-back-doors"&gt;Back Doors&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT echo-back-door --&gt;
   &lt;li id="M201606060"&gt;
     &lt;p&gt;The</em></ins></span> Amazon Echo appears to have a universal 
back door, since &lt;a
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
@@ -209,7 +205,6 @@
 <span class="inserted"><ins><em>&lt;h4 
id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT echo-surv --&gt;
   &lt;li id="M201808120"&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
@@ -231,7 +226,6 @@
 &lt;h3 id="misc"&gt; Malware in other products&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT amazon-misc --&gt;
   &lt;li id="M201711200"&gt;
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
@@ -305,7 +299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-amazon.ja-diff.html      12 Oct 2018 07:58:36 -0000      1.13
+++ po/malware-amazon.ja-diff.html      17 Oct 2018 10:01:34 -0000      1.14
@@ -102,7 +102,6 @@
 &lt;h4 id="back-doors"&gt;Back Doors&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT swindle-back-door --&gt;
   &lt;li id="M201503210"&gt;
     &lt;p&gt;Amazon &lt;a
     
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml"&gt;
@@ -146,7 +145,6 @@
 <span class="inserted"><ins><em>&lt;h4 
id="surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT swindle-surv --&gt;
   &lt;li id="M201212031"&gt;
     &lt;p&gt;The</em></ins></span> Electronic Frontier Foundation has examined 
and found &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
@@ -162,7 +160,6 @@
 <span class="inserted"><ins><em>&lt;h4 id="drm"&gt;DRM&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT swindle-dr --&gt;
   &lt;li id="M201704131"&gt;
     &lt;p&gt;&lt;a</em></ins></span> 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
     The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
@@ -182,7 +179,6 @@
 &lt;h4 id="echo-back-doors"&gt;Back Doors&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT echo-back-door --&gt;
   &lt;li id="M201606060"&gt;
     &lt;p&gt;The Amazon Echo appears to have a universal back door, since &lt;a
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
@@ -198,7 +194,6 @@
 &lt;h4 id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT echo-surv --&gt;
   &lt;li id="M201808120"&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
@@ -220,7 +215,6 @@
 &lt;h3 id="misc"&gt; Malware in other products&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT amazon-misc --&gt;
   &lt;li id="M201711200"&gt;
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
@@ -294,7 +288,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:34 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-amazon.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-amazon.ru-en.html        12 Oct 2018 07:58:36 -0000      1.13
+++ po/malware-amazon.ru-en.html        17 Oct 2018 10:01:35 -0000      1.14
@@ -53,7 +53,6 @@
 <h4 id="back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-back-door -->
   <li id="M201503210">
     <p>Amazon <a
     
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
@@ -86,7 +85,6 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-surv -->
   <li id="M201212031">
     <p>The Electronic Frontier Foundation has examined and found <a
     href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
@@ -98,7 +96,6 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-<!-- INSERT swindle-dr -->
   <li id="M201704131">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
     The Amazon Kindle has DRM</a>.  That article is flawed in that it
@@ -117,7 +114,6 @@
 <h4 id="echo-back-doors">Back Doors</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-back-door -->
   <li id="M201606060">
     <p>The Amazon Echo appears to have a universal back door, since <a
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates";>
@@ -133,7 +129,6 @@
 <h4 id="echo-surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-<!-- INSERT echo-surv -->
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -155,7 +150,6 @@
 <h3 id="misc"> Malware in other products</h3>
 
 <ul class="blurbs">
-<!-- INSERT amazon-misc -->
   <li id="M201711200">
     <p>Amazon recently invited consumers to be suckers and <a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo";>
@@ -228,7 +222,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-apple.de-diff.html       9 Oct 2018 13:30:40 -0000       1.11
+++ po/malware-apple.de-diff.html       17 Oct 2018 10:01:35 -0000      1.12
@@ -90,7 +90,6 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-back-door --&gt;
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -144,7 +143,6 @@
   they do not count</strong></del></span> <span 
class="inserted"><ins><em>id="deception"&gt;Apple Deception&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-decept --&gt;
   &lt;li id="M201308290"&gt;
     &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
@@ -152,495 +150,496 @@
     to find&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This allows a company such</em></ins></span> as <span 
class="removed"><del><strong>malware. We mention them</strong></del></span> 
<span class="inserted"><ins><em>Apple</em></ins></span> to <span 
class="removed"><del><strong>refute the
-  supposition that prestigious proprietary software doesn't have grave
+  supposition</strong></del></span> <span class="inserted"><ins><em>say, 
&ldquo;We allow users
+    to turn this off&rdquo; while ensuring</em></ins></span> that <span 
class="removed"><del><strong>prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>say, &ldquo;We 
allow users</em></ins></span>
-    to <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> this <span 
class="removed"><del><strong>API to render
-    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A bug in the iThings Messages
-      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site</strong></del></span> <span 
class="inserted"><ins><em>off&rdquo; while ensuring that few will understand 
how</em></ins></span>
-    to <span class="removed"><del><strong>extract all the user's messaging 
history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>actually 
turn it off.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>few will 
understand how</em></ins></span>
+    to <span class="inserted"><ins><em>actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up</strong></del></span> 
<span class="inserted"><ins><em>id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-dr --&gt;
   &lt;li id="M201704071"&gt;
-    &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like 
sabotage,</strong></del></span> <span class="inserted"><ins><em>iPhone 7 nearly 
&lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone 
else</em></ins></span> but <span class="removed"><del><strong>they are not 
grave enough to qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malicious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</em></ins></span>
-    Apple <span class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>uses DRM software</em></ins></span> to <span 
class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
-    with</em></ins></span> a <span class="removed"><del><strong>system upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;. 
-         Apple did not forcibly install</strong></del></span> <span 
class="inserted"><ins><em>generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200811210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on</em></ins></span> the <span 
class="removed"><del><strong>upgrade</strong></del></span> <span 
class="inserted"><ins><em>fact that a new model of Macbook introduced a
-    requirement for monitors to have malicious hardware,</em></ins></span> but 
<span class="inserted"><ins><em>DRM software
-    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hardware. The software for
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that</em></ins></span> a <span 
class="removed"><del><strong>malicious web site</strong></del></span> <span 
class="inserted"><ins><em>new model of Macbook introduced a
+    requirement for monitors</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>have malicious hardware, but DRM software
+    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>hardware. 
The software for
     accessing iTunes is also responsible.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits</strong></del></span>
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>their use of the software.  This section reports 
examples of hard sell</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows</em></ins></span>
-    and <span class="removed"><del><strong>other unjust commercial tactics by 
Apple.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple Siri
-      &lt;a 
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
 to give you information&lt;/a&gt;
-      about music charts if you're not an</strong></del></span> <span 
class="inserted"><ins><em>said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span class="inserted"><ins><em>Bluray 
disks&lt;/a&gt;.  (The article focused on Windows</em></ins></span>
+    and <span class="removed"><del><strong>wrong. This section describes 
examples of</strong></del></span> <span class="inserted"><ins><em>said that 
MacOS would do the same thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows</em></ins></span> Apple 
<span class="removed"><del><strong>Music 
subscriber.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>to 
&lt;a
-    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
-    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;h3 <span class="removed"><del><strong>id="sabotage"&gt;Apple 
Sabotage&lt;/h3&gt;
-
-&lt;p&gt;These are situations in which</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
-
-&lt;p&gt;In this section, we list characteristics of</em></ins></span> Apple 
<span class="removed"><del><strong>employs its power over</strong></del></span> 
<span class="inserted"><ins><em>programs that block or
-hinder</em></ins></span> users <span class="inserted"><ins><em>from 
switching</em></ins></span> to <span class="removed"><del><strong>directly 
intervene</strong></del></span> <span class="inserted"><ins><em>any alternative 
program&mdash;and,</em></ins></span> in <span class="removed"><del><strong>ways 
that harm them or block their work.&lt;/p&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows</em></ins></span> Apple 
<span class="removed"><del><strong>committing
+interference.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
-    
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
-    changes the file system</strong></del></span>
-<span class="inserted"><ins><em>particular,</em></ins></span> from <span 
class="removed"><del><strong>HFS+</strong></del></span> <span 
class="inserted"><ins><em>switching</em></ins></span> to <span 
class="removed"><del><strong>APFS&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>free software</em></ins></span> which <span 
class="removed"><del><strong>cannot be accessed
-    from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> to 
<span class="removed"><del><strong>download a system 
upgrade</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking the users&lt;/a&gt;. 
+         Apple did not forcibly install the upgrade but</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
+    customers can watch</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>videos 
they purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;Apple will stop &lt;a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
-    model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's the nature of proprietary software.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;h3 <span class="removed"><del><strong>id="pressuring"&gt;Apple 
Pressuring&lt;/h3&gt;
 
-  &lt;li&gt;
-  &lt;p&gt;The iPhone 7 contains DRM specifically designed to &lt;a
-  
href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
-  brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
-  &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-  &lt;p&gt;The article uses</strong></del></span> <span 
class="inserted"><ins><em>can liberate</em></ins></span> the <span 
class="removed"><del><strong>term &ldquo;lock&rdquo; to 
describe</strong></del></span> <span 
class="inserted"><ins><em>device</em></ins></span>
-the <span class="removed"><del><strong>DRM,
-  but we prefer to use</strong></del></span> <span 
class="inserted"><ins><em>software runs on.&lt;/p&gt;
+&lt;p&gt;In this section, we list characteristics</em></ins></span> of <span 
class="removed"><del><strong>their customers by imposing arbitrary 
limits</strong></del></span> <span class="inserted"><ins><em>Apple programs 
that block or
+hinder users from switching</em></ins></span> to <span 
class="removed"><del><strong>their use of</strong></del></span> <span 
class="inserted"><ins><em>any alternative program&mdash;and, in
+particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>software.  
This section reports examples of hard sell</strong></del></span> <span 
class="inserted"><ins><em>device
+the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-incompat --&gt;
   &lt;li id="M201803300"&gt;
-    &lt;p&gt;In MacOS and iOS,</em></ins></span> the <span 
class="removed"><del><strong>term &lt;a
-  href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
-  digital handcuffs&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
+    &lt;p&gt;In MacOS</em></ins></span> and <span 
class="removed"><del><strong>other unjust commercial tactics by Apple.&lt;/p&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;The Apple Music client
-      program</strong></del></span> <span class="inserted"><ins><em>procedure 
for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple Siri</strong></del></span> <span 
class="inserted"><ins><em>iOS, the procedure for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-    converting images from</em></ins></span> the <span 
class="removed"><del><strong>user's file system for music files, copies 
them</strong></del></span> <span class="inserted"><ins><em>Photos 
format&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>an 
Apple
-      server,</strong></del></span> <span class="inserted"><ins><em>a free 
format is so
-    tedious</em></ins></span> and <span class="removed"><del><strong>deletes 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time-consuming that users just give up if they have a
+    converting images from the Photos format&lt;/a&gt;</em></ins></span> to 
<span class="inserted"><ins><em>a free format is so
+    tedious and time-consuming that users just</em></ins></span> give <span 
class="removed"><del><strong>you information&lt;/a&gt;
+      about music charts</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> if <span 
class="removed"><del><strong>you're not an Apple Music 
subscriber.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they have a
     lot of them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-stops</strong></del></span> <span class="inserted"><ins><em>devices 
lock</em></ins></span> users <span class="removed"><del><strong>from fixing the 
security bugs</strong></del></span> in <span 
class="removed"><del><strong>Quicktime for
-      Windows&lt;/a&gt;, while refusing</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely</em></ins></span> to <span class="removed"><del><strong>fix them 
itself.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple 
services&lt;/a&gt; by being designed to be incompatible
-    with all other options, ethical or unethical.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;These are situations in which Apple employs its power 
over</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock</em></ins></span> users
+<span class="removed"><del><strong>to directly intervene</strong></del></span> 
in <span class="removed"><del><strong>ways that harm them or block their 
work.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</strong></del></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
+    changes the file system from HFS+</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being designed</em></ins></span> to 
<span class="removed"><del><strong>APFS&lt;/a&gt;, which 
cannot</strong></del></span> be <span class="removed"><del><strong>accessed
+    from GNU/Linux, Windows</strong></del></span> <span 
class="inserted"><ins><em>incompatible
+    with all other options, ethical</em></ins></span> or <span 
class="removed"><del><strong>even older versions of 
MacOS.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unethical.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;iOS version 9 for
-    iThings</strong></del></span>
+    &lt;p&gt;Apple will stop</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201605044"&gt;
     &lt;p&gt;iWork (office software that runs on MacOS,
-    iOS and iCloud) uses secret formats and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages</strong></del></span>
+    iOS and iCloud) uses secret formats and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
+    model iThings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, Apple stops people</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means of
-    converting</em></ins></span> them <span 
class="removed"><del><strong>irreparably if</strong></del></span> <span 
class="inserted"><ins><em>to or from Open Document Formats&lt;/a&gt;. iWork
-    formats have changed several times since</em></ins></span> they were <span 
class="removed"><del><strong>repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from the users. However, it has not acknowledged that
-    this was wrong.&lt;/p&gt;
+    converting them to or</em></ins></span> from <span 
class="removed"><del><strong>fixing problems themselves;
+    that's</strong></del></span> <span class="inserted"><ins><em>Open Document 
Formats&lt;/a&gt;. iWork
+    formats have changed several times since they were first
+    introduced. This may have had</em></ins></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>effect</em></ins></span> of <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
-  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones 
that</strong></del></span> <span class="inserted"><ins><em>first
-    introduced. This may have</em></ins></span> had <span 
class="removed"><del><strong>been
-  unlocked.&lt;/a&gt;  The &ldquo;upgrade&rdquo; also deactivated applications
-  not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
-  censorship&lt;/a&gt;.  All this was apparently intentional.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;
+  &lt;p&gt;The iPhone 7 contains DRM specifically designed 
to</strong></del></span> <span 
class="inserted"><ins><em>thwarting</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
+  brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
+  &ldquo;Unauthorized&rdquo; essentially means anyone besides Apple.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple
-  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-  deleted from iPods</strong></del></span> the <span 
class="removed"><del><strong>music that users had got</strong></del></span> 
<span class="inserted"><ins><em>effect of thwarting &lt;a
-    href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
-    efforts&lt;/a&gt;, thus preventing free software</em></ins></span> from 
<span class="removed"><del><strong>internet music
-  stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>fully supporting
+  &lt;p&gt;The article uses the term &ldquo;lock&rdquo; to describe the DRM,
+  but we prefer to use the term</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse
 engineering
+    efforts&lt;/a&gt;, thus preventing free software from fully supporting
     them.&lt;/p&gt;
 
-    &lt;p&gt;iWork formats are considered &lt;a
-    
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+    &lt;p&gt;iWork formats are considered</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
+  digital handcuffs&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
     unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Apple 
Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The Apple Music client
+      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike</em></ins></span> the 
<span class="removed"><del><strong>phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> <span 
class="inserted"><ins><em>rest</em></ins></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>file
-  they do not count as malware. We mention them to refute</em></ins></span> 
the <span class="removed"><del><strong>server records these numbers for at 
least 30
-        days.&lt;/p&gt;
+&lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</em></ins></span> the <span 
class="removed"><del><strong>user's</strong></del></span> file <span 
class="removed"><del><strong>system for music files, 
copies</strong></del></span>
+  <span class="inserted"><ins><em>they do not count as malware. We 
mention</em></ins></span> them to <span class="removed"><del><strong>an Apple
+      server, and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
+stops users from fixing</strong></del></span> <span 
class="inserted"><ins><em>refute</em></ins></span> the <span 
class="removed"><del><strong>security bugs</strong></del></span>
   <span class="inserted"><ins><em>supposition that prestigious proprietary 
software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-insec --&gt;
   &lt;li id="M201607220"&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API 
allowed</em></ins></span> an <span class="removed"><del><strong>Apple ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary</strong></del></span>
 <span class="inserted"><ins><em>attacker</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps&lt;/a&gt;) without giving 
a valid email address and receiving the verification</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious</em></ins></span> code <span class="removed"><del><strong>Apple 
-      sends</strong></del></span> <span class="inserted"><ins><em>from any 
application which uses this API</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>render a
-    certain kind of image file&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A vulnerability</em></ins></span> in <span 
class="removed"><del><strong>Quicktime for
+      Windows&lt;/a&gt;, while refusing</strong></del></span> <span 
class="inserted"><ins><em>Apple's Image I/O API allowed an 
attacker</em></ins></span> to <span class="removed"><del><strong>fix them 
itself.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201604120"&gt;
-    &lt;p&gt;A bug in the iThings Messages app &lt;a
+  &lt;li&gt;
+    &lt;p&gt;iOS version 9 for
+    iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
+    them irreparably if they were repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malicious code</em></ins></span> from <span class="inserted"><ins><em>any 
application which uses</em></ins></span> this <span 
class="removed"><del><strong>policy under
+    criticism from</strong></del></span> <span class="inserted"><ins><em>API 
to render a
+    certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201604120"&gt;
+    &lt;p&gt;A bug in</em></ins></span> the <span 
class="removed"><del><strong>users. However, it has not acknowledged that
+    this was wrong.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iThings Messages app &lt;a
     
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-    a malicious web site</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers</strong></del></span> <span 
class="inserted"><ins><em>extract</em></ins></span> all the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>user's messaging
-    history&lt;/a&gt;.&lt;/p&gt;
+    a malicious web site to extract all the user's messaging
+    history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201311120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
+  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+  unlocked.&lt;/a&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
-    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap data in smart phones, including iPhones,
-    Android,</em></ins></span> and
-      <span class="removed"><del><strong>videos</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</em></ins></span>
+    The <span class="removed"><del><strong>&ldquo;upgrade&rdquo; also 
deactivated applications</strong></del></span> <span 
class="inserted"><ins><em>NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is</em></ins></span> not 
<span class="removed"><del><strong>approved by &lt;a 
href="/proprietary/proprietary-jails.html"&gt;Apple
+  censorship&lt;/a&gt;.  All</strong></del></span> <span 
class="inserted"><ins><em>much
+    detail here, it seems that</em></ins></span> this <span 
class="removed"><del><strong>was apparently intentional.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple
+  &lt;a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+  deleted from iPods</strong></del></span> <span 
class="inserted"><ins><em>does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>music that users had got from 
internet music
+  stores</strong></del></span> <span class="inserted"><ins><em>universal back 
door</em></ins></span> that <span class="removed"><del><strong>competed with 
iTunes&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!--
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;!--</em></ins></span>
+&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Apple 
Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up</em></ins></span> the 
<span class="removed"><del><strong>phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>are not grave 
enough to qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</em></ins></span> and <span class="removed"><del><strong>keeps 
them</strong></del></span> <span class="inserted"><ins><em>wrong. This section 
describes examples of Apple committing
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>user's system. They are like sabotage, but they are 
not grave enough</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>qualify 
+for</em></ins></span> the <span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This section 
describes examples of Apple committing
 interference.&lt;/p&gt; --&gt;
 
 
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system of the Apple iThings, is the prototype
-of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
+iOS, the operating system of</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an</strong></del></span> Apple <span 
class="removed"><del><strong>ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving</strong></del></span> 
<span class="inserted"><ins><em>iThings, is the prototype
+of</em></ins></span> a <span class="removed"><del><strong>valid email address 
and receiving</strong></del></span> <span 
class="inserted"><ins><em>jail&lt;/a&gt;.  It was Apple that 
introduced</em></ins></span> the <span 
class="removed"><del><strong>verification</strong></del></span> <span 
class="inserted"><ins><em>practice of
 designing general purpose computers with censorship of application
 programs.&lt;/p&gt;
 
 &lt;p&gt;Here is an article about the &lt;a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that the iThings use to lock</em></ins></span> up <span 
class="inserted"><ins><em>the user.&lt;/p&gt;
-
-&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>date on all your devices.
-      Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through the
-walls of the iThing jail: users can now install apps built from
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;</em></ins></span>
+code <span class="removed"><del><strong>Apple 
+      sends</strong></del></span> <span 
class="inserted"><ins><em>signing&lt;/a&gt; that the iThings 
use</em></ins></span> to <span class="removed"><del><strong>it.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>lock up the user.&lt;/p&gt;
+
+&lt;p&gt;Curiously, Apple is beginning</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all</strong></del></span> <span 
class="inserted"><ins><em>allow limited passage through</em></ins></span> the 
<span class="removed"><del><strong>photos and
+      videos</strong></del></span>
+<span class="inserted"><ins><em>walls of the iThing jail: users can now 
install apps built from
 source code, provided the source code is written in Swift.  Users
-cannot do this freely because they</em></ins></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
+cannot do this freely because</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make</strong></del></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From</strong></del></span> <span 
class="inserted"><ins><em>required to identify
 themselves.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
       information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span 
class="inserted"><ins><em>href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While this</em></ins></span> is <span 
class="inserted"><ins><em>a crack in the prison walls, it is not
-big enough to mean that the iThings are no longer jails.&lt;/p&gt;
+are details&lt;/a&gt;. While this</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>a crack 
in</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-&lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
+    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>prison walls, it</em></ins></span> is <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>not
+big enough</em></ins></span> to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span> <span 
class="inserted"><ins><em>mean that the iThings are no longer jails.&lt;/p&gt;
+
+&lt;h4&gt;Examples of censorship</em></ins></span> by <span 
class="removed"><del><strong>default so</strong></del></span> <span 
class="inserted"><ins><em>Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-jail --&gt;
   &lt;li id="M201710130"&gt;
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
-    censoring apps for the US government too&lt;/a&gt;. Specifically, it is
-    deleting apps developed by Iranians.&lt;/p&gt;
-
-    &lt;p&gt;The root of these wrongs are in Apple. If Apple had not designed
-    the iMonsters to let Apple censor applications, Apple would not have
-    had the power to stop users from installing whatever kind of 
apps.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201707290"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-    deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
-    own censorship power to strengthen that of the Chinese 
government.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce Russian 
surveillance</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;</em></ins></span>
-    by <span class="removed"><del><strong>the
-      startup</strong></del></span> <span class="inserted"><ins><em>blocking 
distribution</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>the 
LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This is ironic because LinkedIn</em></ins></span> is a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>surveillance system itself.
-    While subjecting its users</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>its own 
surveillance,</em></ins></span> it <span class="removed"><del><strong>still 
counts as a
+    censoring apps for the US government too&lt;/a&gt;. 
Specifically,</em></ins></span> it <span class="removed"><del><strong>still 
counts as a
       surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span 
class="inserted"><ins><em>tries</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span>
-    <span class="inserted"><ins><em>protect its users from Russian 
surveillance, and is therefore subject</em></ins></span>
-    to <span class="removed"><del><strong>break</strong></del></span> <span 
class="inserted"><ins><em>Russian censorship.&lt;/p&gt;
+    &lt;p&gt;Unknown people apparently took advantage of this to
+      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>is
+    deleting apps developed by Iranians.&lt;/p&gt;
 
-    &lt;p&gt;However, the point here is the wrong of</em></ins></span> Apple's
-      <span class="removed"><del><strong>security to get at them, but NSA can 
access any</strong></del></span> <span 
class="inserted"><ins><em>censorship</em></ins></span> of <span 
class="removed"><del><strong>them through
+    &lt;p&gt;The root</em></ins></span> of <span 
class="removed"><del><strong>them through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends</strong></del></span>
-    <span class="inserted"><ins><em>apps.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>Apple servers unsaved documents being
-  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>enforce China's censorship</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
-  things you have not decided to save are even more sensitive 
than</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by blocking distribution of</em></ins></span> the
-  <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>New York Times 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  MacOS automatically sends to Apple servers unsaved documents being
+  edited&lt;/a&gt;. The &lt;a
+  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have not decided to save</strong></del></span> <span 
class="inserted"><ins><em>these wrongs</em></ins></span> are <span 
class="removed"><del><strong>even more sensitive than the
+  things you have stored</strong></del></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple has made 
various</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files to</strong></del></span> <span 
class="inserted"><ins><em>Apple. If</em></ins></span> Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
+  This exposes</strong></del></span> <span class="inserted"><ins><em>had not 
designed</em></ins></span>
+    the <span class="removed"><del><strong>files to Big Brother and 
perhaps</strong></del></span> <span 
class="inserted"><ins><em>iMonsters</em></ins></span> to <span 
class="removed"><del><strong>other snoops.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple censors games,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files to Apple servers without asking 
permission&lt;/a&gt;.
-  This exposes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning some games from</em></ins></span> the <span 
class="removed"><del><strong>files to Big Brother and perhaps to other 
snoops.&lt;/p&gt;
-
-  &lt;p&gt;It also demonstrates how you can't trust proprietary 
software,</strong></del></span> <span class="inserted"><ins><em>cr&hellip;app 
store&lt;/a&gt;</em></ins></span> because <span 
class="removed"><del><strong>even if today's version doesn't have a malicious
+  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
+  because even if today's version doesn't</strong></del></span> <span 
class="inserted"><ins><em>let Apple censor applications, Apple would 
not</em></ins></span> have <span class="removed"><del><strong>a malicious
   functionality, tomorrow's version might add it. The developer won't
-  remove the malfeature unless many users push back hard, and the users
-  can't remove it themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>of which
-    political points they suggest. Some political points are apparently
-    considered acceptable.&lt;/p&gt;</em></ins></span>
+  remove the malfeature unless many users push back hard, 
and</strong></del></span>
+    <span class="inserted"><ins><em>had</em></ins></span> the <span 
class="inserted"><ins><em>power to stop</em></ins></span> users
+  <span class="removed"><del><strong>can't remove it 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>from installing whatever kind of 
apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201509290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-    banned a program from</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>App 
Store&lt;/a&gt; because its developers
-    committed the enormity of disassembling some 
iThings.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201707290"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+  the latest MacOS send reports</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+    deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
+    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of the Chinese 
government.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in 
MacOS:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509230"&gt;
-    &lt;p&gt;As of 2015, Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms to 
Apple.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically bans apps that endorse abortion rights or would help
-    women find abortions&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span>
 
-    &lt;p&gt;This particular political slant &lt;a
-    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201701064"&gt;
+    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
admits</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Apple admits the</strong></del></span> <span 
class="inserted"><ins><em>enforce Russian surveillance</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app</em></ins></span> in <span 
class="inserted"><ins><em>Russia&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201506250"&gt;
-    &lt;p&gt;Apple has banned iThing
-    applications that show</em></ins></span> the <span 
class="inserted"><ins><em>confederate flag.</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-  spying in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it as</em></ins></span> a <span 
class="removed"><del><strong>search facility&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>symbol of racism&lt;/a&gt;,</em></ins></span> 
but <span class="removed"><del><strong>there's a lot
+    &lt;p&gt;This is ironic because LinkedIn is</em></ins></span> a <span 
class="removed"><del><strong>search facility&lt;/a&gt;, but there's a lot
   &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-  more snooping</strong></del></span> <span class="inserted"><ins><em>even
-    strategic games</em></ins></span> that <span 
class="removed"><del><strong>Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-  Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>use it</em></ins></span> to <span 
class="removed"><del><strong>exist for no possible
-  purpose other than surveillance&lt;/a&gt;.  Here is the &lt;a
+  Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>surveillance system itself.
+    While subjecting its users</em></ins></span> to <span 
class="removed"><del><strong>exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here</strong></del></span> <span 
class="inserted"><ins><em>its own surveillance, it tries to
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian censorship.&lt;/p&gt;
+
+    &lt;p&gt;However, the point here</em></ins></span> is the <span 
class="removed"><del><strong>&lt;a
   
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-  Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>wrong of Apple's censorship of
+    apps.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;The &lt;a class="not-a-duplicate"
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce China's 
censorship</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
   
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-  get other info too.&lt;/p&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>iThing is, and
+  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>New York Times 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does, &lt;a
-  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>represent confederate army units
-    fighting in</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Civil 
War.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
 
-    &lt;p&gt;This <span class="removed"><del><strong>may have improved with
+  <span class="inserted"><ins><em>&lt;li id="M201605190"&gt;
+    &lt;p&gt;Apple censors games,</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning</em></ins></span> some <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>games</em></ins></span> from <span 
class="removed"><del><strong>iPhones for</strong></del></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
   &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but
-  &lt;a 
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>ludicrous rigidity illustrates the point that 
Apple should</em></ins></span>
-    not <span class="removed"><del><strong>as much as</strong></del></span> 
<span class="inserted"><ins><em>be allowed to censor apps.  Even 
if</em></ins></span> Apple <span 
class="removed"><del><strong>claims&lt;/a&gt;.&lt;/p&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>cr&hellip;app store&lt;/a&gt; because of which
+    political points they suggest. Some political points are apparently
+    considered acceptable.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  &lt;li id="M201509290"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+    banned a program from the App Store&lt;/a&gt; because its developers
+    committed the enormity of disassembling some 
iThings.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In</strong></del></span> <span class="inserted"><ins><em>carried 
out</em></ins></span> this <span class="removed"><del><strong>section, we list 
characteristics</strong></del></span> <span class="inserted"><ins><em>act of
-    censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power to impose its views
-    about either</em></ins></span> of <span class="removed"><del><strong>Apple 
programs that block</strong></del></span> <span class="inserted"><ins><em>these 
questions,</em></ins></span> or
-<span class="removed"><del><strong>hinder users from switching 
to</strong></del></span> any <span class="removed"><del><strong>alternative 
program&mdash;and, in
+&lt;p&gt;In this section, we list characteristics</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509230"&gt;
+    &lt;p&gt;As</em></ins></span> of <span 
class="inserted"><ins><em>2015,</em></ins></span> Apple <span 
class="removed"><del><strong>programs</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps</em></ins></span> that <span 
class="removed"><del><strong>block</strong></del></span> <span 
class="inserted"><ins><em>endorse abortion rights</em></ins></span> or
+<span class="removed"><del><strong>hinder users from switching to any 
alternative program&mdash;and, in
 particular, from switching to free software which can liberate the device
 the software runs on.&lt;/p&gt;
 
 &lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;Apple devices lock users in</strong></del></span> <span 
class="inserted"><ins><em>would help
+    women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201412110"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201405250"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>devices lock 
users</strong></del></span> <span class="inserted"><ins><em>used this 
censorship power</em></ins></span> in <span class="removed"><del><strong>&lt;a
-href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-solely to Apple services&lt;/a&gt; by being designed</strong></del></span> 
<span class="inserted"><ins><em>2014</em></ins></span> to <span 
class="removed"><del><strong>be incompatible with</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban</em></ins></span> all <span class="inserted"><ins><em>bitcoin 
apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned a game about growing marijuana&lt;/a&gt;, while permitting games
-    about</em></ins></span> other <span class="removed"><del><strong>options, 
ethical or unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crimes such as killing people.  Perhaps Apple 
considers
-    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This particular political slant</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely to Apple services&lt;/a&gt; by being designed to be incompatible with 
all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+    affects</em></ins></span> other <span 
class="removed"><del><strong>options, ethical or 
unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;iWork (office software</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app</em></ins></span> that <span 
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
-formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means
-of converting them to or from Open Document Formats&lt;/a&gt;. iWork formats
+  <span class="inserted"><ins><em>&lt;li id="M201506250"&gt;
+    &lt;p&gt;Apple has banned iThing
+    applications</em></ins></span> that <span 
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
+formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means</strong></del></span> <span class="inserted"><ins><em>show the 
confederate flag.  &lt;a
+    
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
+    Not only those that use it as a symbol</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
+    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. iWork 
formats
 have changed several times since they were first introduced. This may have
-had</strong></del></span> <span 
class="inserted"><ins><em>displayed</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span>
-    of <span class="removed"><del><strong>thwarting &lt;a
+had</strong></del></span> <span class="inserted"><ins><em>represent 
confederate army units
+    fighting in</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
+
+    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
+    not be allowed to censor apps.  Even if Apple carried out this 
act</em></ins></span> of <span class="removed"><del><strong>thwarting &lt;a
 href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
 efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
 
-&lt;p&gt;iWork formats are considered &lt;a
+&lt;p&gt;iWork formats</strong></del></span>
+    <span class="inserted"><ins><em>censorship with some care, it would still 
be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are <span class="removed"><del><strong>considered &lt;a
 
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>not
+    the real issue.  Apple should not have the power to impose its views
+    about either of these questions, or any other.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;In MacOS and iOS,</strong></del></span> <span 
class="inserted"><ins><em>US drone assassinations, giving various excuses. Each
-    time</em></ins></span> the <span class="removed"><del><strong>procedure 
for</strong></del></span> <span class="inserted"><ins><em>developers fixed one 
&ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, 
Apple</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-converting images from</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;In MacOS</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>iOS,</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>procedure</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> for <span 
class="inserted"><ins><em>a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    about other crimes such as killing people.  Perhaps Apple considers
+    killing more acceptable than marijuana.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201402070"&gt;
+    &lt;p&gt;Apple rejected an app that displayed the locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits</em></ins></span> to <span 
class="removed"><del><strong>a free format is so tedious</strong></del></span> 
<span class="inserted"><ins><em>their use of the software.  This section 
reports examples of hard sell</em></ins></span> and <span 
class="removed"><del><strong>time-consuming that users 
just</strong></del></span> <span class="inserted"><ins><em>other unjust 
commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-press --&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple Siri &lt;a
-    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
-    to</em></ins></span> give <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>you information&lt;/a&gt; about music 
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot 
of them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>you're 
not an Apple
+    &lt;p&gt;Apple Siri</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+converting images from the Photos format&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
+    to <span class="removed"><del><strong>a free format is so tedious
+and time-consuming that users just</strong></del></span> give <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>you information&lt;/a&gt; about music 
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot 
of them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>you're 
not an Apple
     Music subscriber.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -654,7 +653,6 @@
 to <span class="inserted"><ins><em>directly intervene in ways that harm them 
or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-sab --&gt;
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where</strong></del></span>
@@ -791,7 +789,6 @@
 &lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-surv --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
@@ -1060,7 +1057,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-tyrant --&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -1152,7 +1148,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/malware-apple.es-en.html 10 Oct 2018 11:57:41 -0000      1.53
+++ po/malware-apple.es-en.html 17 Oct 2018 10:01:35 -0000      1.54
@@ -68,7 +68,6 @@
 <h3 id="back-doors">Apple Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-back-door -->
   <li id="M201607284">
     <p>The Dropbox app for Macintosh <a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
@@ -109,7 +108,6 @@
 <h3 id="deception">Apple Deception</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-decept -->
   <li id="M201308290">
     <p>&ldquo;Dark patterns&rdquo; are <a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
@@ -126,7 +124,6 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-dr -->
   <li id="M201704071">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -171,7 +168,6 @@
 the software runs on.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-incompat -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -213,7 +209,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-insec -->
   <li id="M201607220">
     <p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
@@ -271,7 +266,6 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT apple-jail -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -383,7 +377,6 @@
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-press -->
   <li id="M201510270">
     <p>Apple Siri <a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
@@ -399,7 +392,6 @@
 to directly intervene in ways that harm them or block their work.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-sab -->
   <li id="M201805310">
     <p>Apple has <a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
@@ -494,7 +486,6 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-surv -->
   <li id="M201809070">
     <p>Adware Doctor, an ad blocker for MacOS, <a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
@@ -676,7 +667,6 @@
 <h3 id="tyrants">Apple Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-tyrant -->
   <li id="M201412010">
     <p>Apple arbitrarily <a
     href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
@@ -750,7 +740,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/10 11:57:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/malware-apple.fr-en.html 9 Oct 2018 13:30:40 -0000       1.59
+++ po/malware-apple.fr-en.html 17 Oct 2018 10:01:35 -0000      1.60
@@ -68,7 +68,6 @@
 <h3 id="back-doors">Apple Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-back-door -->
   <li id="M201607284">
     <p>The Dropbox app for Macintosh <a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
@@ -109,7 +108,6 @@
 <h3 id="deception">Apple Deception</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-decept -->
   <li id="M201308290">
     <p>&ldquo;Dark patterns&rdquo; are <a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
@@ -126,7 +124,6 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-dr -->
   <li id="M201704071">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -171,7 +168,6 @@
 the software runs on.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-incompat -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -213,7 +209,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-insec -->
   <li id="M201607220">
     <p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
@@ -271,7 +266,6 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT apple-jail -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -383,7 +377,6 @@
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-press -->
   <li id="M201510270">
     <p>Apple Siri <a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
@@ -399,7 +392,6 @@
 to directly intervene in ways that harm them or block their work.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-sab -->
   <li id="M201805310">
     <p>Apple has <a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
@@ -494,7 +486,6 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-surv -->
   <li id="M201809070">
     <p>Adware Doctor, an ad blocker for MacOS, <a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
@@ -676,7 +667,6 @@
 <h3 id="tyrants">Apple Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-tyrant -->
   <li id="M201412010">
     <p>Apple arbitrarily <a
     href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
@@ -750,7 +740,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/malware-apple.it-diff.html       9 Oct 2018 13:30:40 -0000       1.18
+++ po/malware-apple.it-diff.html       17 Oct 2018 10:01:35 -0000      1.19
@@ -89,7 +89,6 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-back-door --&gt;
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -153,7 +152,6 @@
 &lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-decept --&gt;
   &lt;li id="M201308290"&gt;
     &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
@@ -169,8 +167,9 @@
 by blocking distribution of the LinkedIn app in 
Russia&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;This <span class="removed"><del><strong>is ironic because 
LinkedIn is</strong></del></span> <span 
class="inserted"><ins><em>allows</em></ins></span> a <span 
class="removed"><del><strong>surveillance system
-itself. While subjecting its users to its own surveillance, it 
tries</strong></del></span> <span class="inserted"><ins><em>company such as 
Apple</em></ins></span> to <span class="removed"><del><strong>protect 
its</strong></del></span> <span class="inserted"><ins><em>say, &ldquo;We 
allow</em></ins></span> users <span class="removed"><del><strong>from Russian 
surveillance, and</strong></del></span>
-    <span class="inserted"><ins><em>to turn this off&rdquo; while ensuring 
that few will understand how
+itself. While subjecting its users to its own surveillance, it 
tries</strong></del></span> <span class="inserted"><ins><em>company such as 
Apple</em></ins></span> to <span class="removed"><del><strong>protect 
its</strong></del></span> <span class="inserted"><ins><em>say, &ldquo;We 
allow</em></ins></span> users <span class="removed"><del><strong>from Russian 
surveillance, and is therefore
+subject</strong></del></span>
+    to <span class="removed"><del><strong>Russian</strong></del></span> <span 
class="inserted"><ins><em>turn this off&rdquo; while ensuring that few will 
understand how
     to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -179,7 +178,6 @@
 &lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-dr --&gt;
   &lt;li id="M201704071"&gt;
     &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
     href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
@@ -224,7 +222,6 @@
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-incompat --&gt;
   &lt;li id="M201803300"&gt;
     &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
@@ -266,7 +263,6 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-insec --&gt;
   &lt;li id="M201607220"&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
@@ -324,7 +320,6 @@
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-jail --&gt;
   &lt;li id="M201710130"&gt;
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
@@ -350,8 +345,8 @@
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
     While subjecting its users to its own surveillance, it tries to
-    protect its users from Russian surveillance, and</em></ins></span> is 
therefore subject
-    to Russian censorship.&lt;/p&gt;
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian</em></ins></span> censorship.&lt;/p&gt;
 
     &lt;p&gt;However, the point here is the wrong of Apple's censorship of
     apps.&lt;/p&gt;
@@ -441,19 +436,19 @@
     is bad, whether educating people about drone attacks is bad, are not
     the real issue.  Apple should not have the power</em></ins></span> to 
<span class="removed"><del><strong>render
     a certain kind</strong></del></span> <span 
class="inserted"><ins><em>impose its views
-    about either</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these questions, or any 
other.&lt;/p&gt;</em></ins></span>
+    about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
+  &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples</em></ins></span> of <span 
class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405250"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
     &lt;p&gt;Apple used this censorship power</em></ins></span> in <span 
class="inserted"><ins><em>2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
     ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the iThings <span 
class="removed"><del><strong>Messages
@@ -494,7 +489,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-press --&gt;
   &lt;li id="M201510270"&gt;
     &lt;p&gt;Apple</em></ins></span> Siri &lt;a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
@@ -515,7 +509,6 @@
 to directly intervene in ways</em></ins></span> that harm <span 
class="inserted"><ins><em>them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-sab --&gt;
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
@@ -560,24 +553,23 @@
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
     &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer to use the <span 
class="removed"><del><strong>term &lt;a
-  href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;
-  digital handcuffs&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
-    href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
+    to describe the DRM, but we prefer to use the term &lt;a
+  <span 
class="removed"><del><strong>href="https://gnu.org/philosophy/words-to-avoid.html#DigitalLocks"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks"&gt;</em></ins></span>
 digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606080"&gt;
     &lt;p&gt;Apple &lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
     stops users from fixing the security bugs in Quicktime for 
Windows&lt;/a&gt;,
-    while refusing to fix them itself.&lt;/p&gt;</em></ins></span>
+    while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605040"&gt;</em></ins></span>
+  &lt;li id="M201605040"&gt;</em></ins></span>
     &lt;p&gt;The Apple Music client program &lt;a
     
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
     the user's file system for music files, copies them to an Apple server,
@@ -642,7 +634,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-surv --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
@@ -748,21 +739,20 @@
     remove it themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations in
-  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
-  the latest</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410300"&gt;
-    &lt;p&gt;</em></ins></span> MacOS <span class="removed"><del><strong>send 
reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in MacOS:</strong></del></span> <span 
class="inserted"><ins><em>automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;</em></ins></span>
-    sends <span class="removed"><del><strong>users' search 
terms</strong></del></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple servers unsaved documents being 
edited&lt;/a&gt;. The
+    &lt;p&gt; MacOS automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+    sends to Apple servers unsaved documents being edited&lt;/a&gt;. The
     things you have not decided to save are &lt;a
     
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
-    even more sensitive&lt;/a&gt; than the things you have stored in 
files.&lt;/p&gt;</em></ins></span>
+    even more sensitive&lt;/a&gt; than</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>things you have stored</em></ins></span> in <span 
class="removed"><del><strong>MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms to 
Apple.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>files.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
@@ -930,7 +920,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-tyrant --&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -1022,7 +1011,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/malware-apple.ja-diff.html       9 Oct 2018 13:30:40 -0000       1.31
+++ po/malware-apple.ja-diff.html       17 Oct 2018 10:01:35 -0000      1.32
@@ -99,7 +99,6 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-back-door --&gt;
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -176,7 +175,6 @@
 &lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-decept --&gt;
   &lt;li id="M201308290"&gt;
     &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
 rights</strong></del></span>
@@ -200,75 +198,74 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API 
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-dr --&gt;
   &lt;li id="M201704071"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software to prevent people from charging</em></ins></span> 
an <span class="removed"><del><strong>attacker</strong></del></span> <span 
class="inserted"><ins><em>iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200811210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on the fact that a new model of Macbook introduced a
-    requirement for monitors to have malicious hardware, but DRM software
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that a new model of Macbook 
introduced</em></ins></span> a
+    <span class="inserted"><ins><em>requirement for monitors to 
have</em></ins></span> malicious <span class="removed"><del><strong>web 
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM 
software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-    and said that MacOS would do the same thing subsequently.)&lt;/p&gt;
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows Apple</em></ins></span> to 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
+    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
+    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching 
to</em></ins></span> any <span 
class="removed"><del><strong>application</strong></del></span> <span 
class="inserted"><ins><em>alternative program&mdash;and, in
-particular, from switching to free software</em></ins></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>can liberate the device
+&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up</strong></del></span> 
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program&mdash;and, in
+particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>user's 
system. They are like sabotage, but</strong></del></span> <span 
class="inserted"><ins><em>device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-incompat --&gt;
   &lt;li id="M201803300"&gt;
     &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-    converting images from the Photos format&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>render</strong></del></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>free format is so
-    tedious and time-consuming that users just give up if they have a
-    lot</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+    converting images from the Photos format&lt;/a&gt; to a free format is so
+    tedious and time-consuming that users just give up if</em></ins></span> 
they <span class="inserted"><ins><em>have a
+    lot of them.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users</em></ins></span> in <span 
class="removed"><del><strong>the iThings Messages
-      app</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>Apple services&lt;/a&gt; by being designed to be 
incompatible
-    with</em></ins></span> all <span class="removed"><del><strong>the user's 
messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>other 
options, ethical or unethical.&lt;/p&gt;
+  &lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in &lt;a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being designed to be incompatible
+    with all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605044"&gt;
@@ -297,7 +294,6 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-insec --&gt;
   &lt;li id="M201607220"&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
@@ -355,7 +351,6 @@
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-jail --&gt;
   &lt;li id="M201710130"&gt;
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
@@ -430,29 +425,26 @@
     &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
     not be allowed to censor apps.  Even if Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power to impose its views
-    about either of these questions, or any other.&lt;/p&gt;
+    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are not <span class="removed"><del><strong>grave enough 
to qualify 
+for</strong></del></span>
+    the <span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. 
Nonetheless, they are nasty and wrong. This section describes examples 
of</strong></del></span> <span class="inserted"><ins><em>real 
issue.</em></ins></span>  Apple <span class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions</strong></del></span> <span 
class="inserted"><ins><em>should not have the power to impose its views
+    about either</em></ins></span> of <span 
class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt;</em></ins></span> for the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples of Apple committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of</strong></del></span> iThings 
<span class="removed"><del><strong>to download</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    ban all bitcoin apps&lt;/a&gt; for the iThings for</em></ins></span> a 
<span class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
@@ -478,7 +470,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-press --&gt;
   &lt;li id="M201510270"&gt;
     &lt;p&gt;Apple</em></ins></span> Siri &lt;a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
@@ -498,7 +489,6 @@
 But they are</strong></del></span> <span class="inserted"><ins><em>harm them 
or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-sab --&gt;
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
@@ -617,7 +607,6 @@
   &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-surv --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
@@ -818,11 +807,11 @@
   censor all bitcoin apps&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
     for <span class="removed"><del><strong>the iThings.&lt;/p&gt;
 
-  &lt;p&gt;Apple, in the iThings, pioneered the practice of 
general</strong></del></span> <span class="inserted"><ins><em>no 
possible</em></ins></span> purpose
-  <span class="removed"><del><strong>computers that are jails, and the term 
comes from iThing users, who
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from iThing users, who
   referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>other 
than surveillance&lt;/a&gt;.  Here</em></ins></span> is <span 
class="removed"><del><strong>an article about</strong></del></span> the &lt;a
+  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>no 
possible purpose other than surveillance&lt;/a&gt;.  Here</em></ins></span> is 
<span class="removed"><del><strong>an article about</strong></del></span> the 
&lt;a
   <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
   code signing&lt;/a&gt; that</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
@@ -896,7 +885,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-tyrant --&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -988,7 +976,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- po/malware-apple.nl-diff.html       9 Oct 2018 13:30:40 -0000       1.36
+++ po/malware-apple.nl-diff.html       17 Oct 2018 10:01:35 -0000      1.37
@@ -99,7 +99,6 @@
 Mac</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-back-door --&gt;
   &lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
@@ -176,7 +175,6 @@
 &lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-decept --&gt;
   &lt;li id="M201308290"&gt;
     &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
 rights</strong></del></span>
@@ -200,75 +198,74 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API 
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-dr --&gt;
   &lt;li id="M201704071"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software to prevent people from charging</em></ins></span> 
an <span class="removed"><del><strong>attacker</strong></del></span> <span 
class="inserted"><ins><em>iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200811210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on the fact that a new model of Macbook introduced a
-    requirement for monitors to have malicious hardware, but DRM software
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that a new model of Macbook 
introduced</em></ins></span> a
+    <span class="inserted"><ins><em>requirement for monitors to 
have</em></ins></span> malicious <span class="removed"><del><strong>web 
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM 
software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-    and said that MacOS would do the same thing subsequently.)&lt;/p&gt;
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows Apple</em></ins></span> to 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
+    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
+    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching 
to</em></ins></span> any <span 
class="removed"><del><strong>application</strong></del></span> <span 
class="inserted"><ins><em>alternative program&mdash;and, in
-particular, from switching to free software</em></ins></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>can liberate the device
+&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up</strong></del></span> 
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program&mdash;and, in
+particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>user's 
system. They are like sabotage, but</strong></del></span> <span 
class="inserted"><ins><em>device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-incompat --&gt;
   &lt;li id="M201803300"&gt;
     &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-    converting images from the Photos format&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>render</strong></del></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>free format is so
-    tedious and time-consuming that users just give up if they have a
-    lot</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+    converting images from the Photos format&lt;/a&gt; to a free format is so
+    tedious and time-consuming that users just give up if</em></ins></span> 
they <span class="inserted"><ins><em>have a
+    lot of them.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users</em></ins></span> in <span 
class="removed"><del><strong>the iThings Messages
-      app</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>Apple services&lt;/a&gt; by being designed to be 
incompatible
-    with</em></ins></span> all <span class="removed"><del><strong>the user's 
messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>other 
options, ethical or unethical.&lt;/p&gt;
+  &lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in &lt;a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being designed to be incompatible
+    with all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605044"&gt;
@@ -297,7 +294,6 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-insec --&gt;
   &lt;li id="M201607220"&gt;
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
@@ -355,7 +351,6 @@
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-jail --&gt;
   &lt;li id="M201710130"&gt;
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
@@ -430,29 +425,26 @@
     &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
     not be allowed to censor apps.  Even if Apple carried out this act of
     censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power to impose its views
-    about either of these questions, or any other.&lt;/p&gt;
+    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are not <span class="removed"><del><strong>grave enough 
to qualify 
+for</strong></del></span>
+    the <span class="removed"><del><strong>word &ldquo;sabotage&rdquo;. 
Nonetheless, they are nasty and wrong. This section describes examples 
of</strong></del></span> <span class="inserted"><ins><em>real 
issue.</em></ins></span>  Apple <span class="removed"><del><strong>committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions</strong></del></span> <span 
class="inserted"><ins><em>should not have the power to impose its views
+    about either</em></ins></span> of <span 
class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt;</em></ins></span> for the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples of Apple committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of</strong></del></span> iThings 
<span class="removed"><del><strong>to download</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    ban all bitcoin apps&lt;/a&gt; for the iThings for</em></ins></span> a 
<span class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
@@ -478,7 +470,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-press --&gt;
   &lt;li id="M201510270"&gt;
     &lt;p&gt;Apple</em></ins></span> Siri &lt;a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses
@@ -498,7 +489,6 @@
 But they are</strong></del></span> <span class="inserted"><ins><em>harm them 
or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-sab --&gt;
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
@@ -617,7 +607,6 @@
   &lt;li&gt;&lt;p&gt;iPhones</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-surv --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports
@@ -818,11 +807,11 @@
   censor all bitcoin apps&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
     for <span class="removed"><del><strong>the iThings.&lt;/p&gt;
 
-  &lt;p&gt;Apple, in the iThings, pioneered the practice of 
general</strong></del></span> <span class="inserted"><ins><em>no 
possible</em></ins></span> purpose
-  <span class="removed"><del><strong>computers that are jails, and the term 
comes from iThing users, who
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from iThing users, who
   referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>other 
than surveillance&lt;/a&gt;.  Here</em></ins></span> is <span 
class="removed"><del><strong>an article about</strong></del></span> the &lt;a
+  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>no 
possible purpose other than surveillance&lt;/a&gt;.  Here</em></ins></span> is 
<span class="removed"><del><strong>an article about</strong></del></span> the 
&lt;a
   <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
   code signing&lt;/a&gt; that</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
@@ -896,7 +885,6 @@
   &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple-tyrant --&gt;
   &lt;li id="M201412010"&gt;
     &lt;p&gt;Apple</em></ins></span> arbitrarily &lt;a <span 
class="removed"><del><strong>href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/"&gt;
   blocks</strong></del></span>
@@ -988,7 +976,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:40 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/malware-apple.ru-en.html 9 Oct 2018 13:30:41 -0000       1.59
+++ po/malware-apple.ru-en.html 17 Oct 2018 10:01:35 -0000      1.60
@@ -68,7 +68,6 @@
 <h3 id="back-doors">Apple Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-back-door -->
   <li id="M201607284">
     <p>The Dropbox app for Macintosh <a
     
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>
@@ -109,7 +108,6 @@
 <h3 id="deception">Apple Deception</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-decept -->
   <li id="M201308290">
     <p>&ldquo;Dark patterns&rdquo; are <a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
@@ -126,7 +124,6 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-dr -->
   <li id="M201704071">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
@@ -171,7 +168,6 @@
 the software runs on.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-incompat -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -213,7 +209,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-insec -->
   <li id="M201607220">
     <p>A vulnerability in Apple's Image I/O API allowed an attacker to <a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
@@ -271,7 +266,6 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT apple-jail -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -383,7 +377,6 @@
 <p>Proprietary companies can take advantage of their customers by imposing 
arbitrary limits to their use of the software.  This section reports examples 
of hard sell and other unjust commercial tactics by Apple.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-press -->
   <li id="M201510270">
     <p>Apple Siri <a
     
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions";>refuses
@@ -399,7 +392,6 @@
 to directly intervene in ways that harm them or block their work.</p>
 
 <ul class="blurbs">
-<!-- INSERT apple-sab -->
   <li id="M201805310">
     <p>Apple has <a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia";>blocked
@@ -494,7 +486,6 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-surv -->
   <li id="M201809070">
     <p>Adware Doctor, an ad blocker for MacOS, <a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
@@ -676,7 +667,6 @@
 <h3 id="tyrants">Apple Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT apple-tyrant -->
   <li id="M201412010">
     <p>Apple arbitrarily <a
     href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>blocks
@@ -750,7 +740,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-appliances.de-diff.html  9 Oct 2018 13:30:41 -0000       1.11
+++ po/malware-appliances.de-diff.html  17 Oct 2018 10:01:35 -0000      1.12
@@ -72,10 +72,9 @@
 <span class="inserted"><ins><em>to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT appliances --&gt;
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats</em></ins></span> 
communicate <span class="removed"><del><strong>with it,
       is a surveillance device.</strong></del></span>
@@ -543,103 +542,101 @@
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything</em></ins></span> that <span 
class="removed"><del><strong>this</strong></del></span> is <span 
class="removed"><del><strong>an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>viewed on them, and 
not just broadcasts and
     cable&lt;/a&gt;. Even if</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>fault</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,
-    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>app developers. That is clearly 
true</strong></del></span> <span class="inserted"><ins><em>a way to disable the
-    surveillance, even</em></ins></span> if <span class="inserted"><ins><em>it 
were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612230"&gt;
-    &lt;p&gt;VR equipment, measuring every slight motion,
-    creates the potential for</em></ins></span> the <span 
class="removed"><del><strong>apps are proprietary software.&lt;/p&gt;
+<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>fault of app developers. That is clearly true 
if</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
+    the <span class="removed"><del><strong>apps are proprietary 
software.&lt;/p&gt;
 
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is</strong></del></span> 
most <span class="removed"><del><strong>likely going</strong></del></span> 
<span class="inserted"><ins><em>intimate
-    surveillance ever. All it takes</em></ins></span> to
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely 
going</strong></del></span> <span class="inserted"><ins><em>TV reports what it 
is. The existence of a way</em></ins></span> to
 <span class="removed"><del><strong>screw you.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;
-Malware found on</strong></del></span> <span class="inserted"><ins><em>make 
this potential real</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+Malware found on &lt;a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
 security cameras available through Amazon&lt;/a&gt;.
 &lt;/p&gt;
 
-&lt;p&gt;A camera that records locally</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
-    software as malicious as many other programs listed in this
-    page&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;You can bet Facebook will implement the maximum possible
-    surveillance</em></ins></span> on <span 
class="removed"><del><strong>physical media, and has no network
-connection, does not threaten people</strong></del></span> <span 
class="inserted"><ins><em>Oculus Rift devices. The moral is, never trust a VR
-    system</em></ins></span> with <span 
class="removed"><del><strong>surveillance&mdash;neither
-by watching people through the camera, nor through 
malware</strong></del></span> <span class="inserted"><ins><em>nonfree 
software</em></ins></span> in <span class="removed"><del><strong>the
-camera.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;A camera that records locally on physical media, and has no network
+connection, does not threaten people with surveillance&mdash;neither
+by watching people through</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>camera, nor through malware</strong></del></span>
+    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
+    does not legitimize</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612200"&gt;
-    &lt;p&gt;The developer of Ham Radio Deluxe</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201612230"&gt;
+    &lt;p&gt;VR equipment, measuring every slight motion,
+    creates the potential for the most intimate
+    surveillance ever. All it takes to make this potential 
real</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged</em></ins></span>
-    a <span class="removed"><del><strong>Bluetooth vulnerability&lt;/a&gt; 
that allows
+FitBit fitness trackers have a Bluetooth vulnerability&lt;/a&gt; that allows
 attackers to send malware to the devices, which can subsequently
-spread to computers and other FitBit trackers that interact with
+spread to computers and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software as malicious as many</em></ins></span> other <span 
class="removed"><del><strong>FitBit trackers that interact with
 them.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the encryption 
with</strong></del></span> <span class="inserted"><ins><em>customer's 
installation as punishment for posting a negative
-    review&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
<span class="inserted"><ins><em>programs listed in this
+    page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Most</em></ins></span> proprietary <span 
class="removed"><del><strong>firmware</strong></del></span> <span 
class="inserted"><ins><em>software companies don't use their 
power</em></ins></span> so <span class="removed"><del><strong>you can't trust 
it.  Western Digital's</strong></del></span>
-    <span class="inserted"><ins><em>harshly, but it is an injustice that they 
all &lt;em&gt;have&lt;/em&gt; such
-    power.&lt;/p&gt;
+    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>encryption with
+proprietary firmware so you can't</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
+    surveillance on Oculus Rift devices. The moral is, never</em></ins></span> 
trust <span class="removed"><del><strong>it.  Western Digital's &lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+&ldquo;My Passport&rdquo; drives have</strong></del></span> a <span 
class="removed"><del><strong>back 
door&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>VR
+    system with nonfree software in it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201612061"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can 
be</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
-    controlled with</em></ins></span> a <span 
class="removed"><del><strong>back door&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
-Hospira infusion pumps, which are used to administer 
drugs</strong></del></span> <span class="inserted"><ins><em>mobile 
phone&lt;/a&gt;; physical access is not
-    necessary. This would enable crackers</em></ins></span> to
-<span class="removed"><del><strong>a patient, were rated &ldquo;&lt;a
+Hospira infusion pumps, which are used to administer drugs 
to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201612200"&gt;
+    &lt;p&gt;The developer of Ham Radio Deluxe &lt;a
+    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged</em></ins></span>
+    a <span class="removed"><del><strong>patient, were rated &ldquo;&lt;a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>customer's 
installation as punishment for posting</em></ins></span> a <span 
class="removed"><del><strong>security
 researcher.&lt;/p&gt;
 
-&lt;p&gt;Depending</strong></del></span> <span 
class="inserted"><ins><em>listen in</em></ins></span> on <span 
class="removed"><del><strong>what drug is being infused,</strong></del></span> 
<span class="inserted"><ins><em>a child's
-    conversations, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>insecurity</strong></del></span> <span 
class="inserted"><ins><em>toys themselves.&lt;/p&gt;
+&lt;p&gt;Depending on what drug</strong></del></span> <span 
class="inserted"><ins><em>negative
+    review&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This means a burglar</em></ins></span> could
-<span class="removed"><del><strong>open</strong></del></span> <span 
class="inserted"><ins><em>speak into</em></ins></span> the <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>toys and ask the child</em></ins></span>
-    to <span 
class="removed"><del><strong>murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unlock the front door while Mommy's not 
looking.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Most proprietary software companies don't use their power so
+    harshly, but it</em></ins></span> is <span 
class="removed"><del><strong>being infused, the insecurity could
+open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an injustice that they all &lt;em&gt;have&lt;/em&gt; 
such
+    power.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Due to bad security in a drug pump, crackers could use it 
to</strong></del></span>
+&lt;p&gt;Due</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201609200"&gt;
-    &lt;p&gt;HP's firmware downgrade</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612061"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
+    controlled with a mobile phone&lt;/a&gt;; physical access is not
+    necessary. This would enable crackers</em></ins></span> to <span 
class="removed"><del><strong>bad security</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> in <span 
class="inserted"><ins><em>on</em></ins></span> a <span 
class="removed"><del><strong>drug pump, crackers</strong></del></span> <span 
class="inserted"><ins><em>child's
+    conversations, and even speak into the toys themselves.&lt;/p&gt;
+
+    &lt;p&gt;This means a burglar</em></ins></span> could <span 
class="removed"><del><strong>use it</strong></del></span> <span 
class="inserted"><ins><em>speak into the toys and ask the 
child</em></ins></span>
+    to <span class="removed"><del><strong>&lt;a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
+kill patients&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unlock the front door while Mommy's not 
looking.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a
 href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
 &ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly 
vulnerable</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
+
+  <span class="inserted"><ins><em>&lt;li id="M201609200"&gt;
+    &lt;p&gt;HP's firmware downgrade &lt;a
+    
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
     DRM on some printers, which now refuse</em></ins></span> to
 <span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>function with third-party
     ink cartridges&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -667,96 +664,60 @@
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
     unauthorized</em></ins></span> people <span 
class="removed"><del><strong>by taking</strong></del></span> <span 
class="inserted"><ins><em>can remotely</em></ins></span> control <span 
class="removed"><del><strong>of medical implants by radio&lt;/a&gt;.  More
 information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC 
News&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Lots of &lt;a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;, and it can be fatal.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken over&lt;/a&gt; and turned
-into a botnet for</strong></del></span> <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform 
so</em></ins></span> the <span 
class="removed"><del><strong>purpose</strong></del></span>
-    <span class="inserted"><ins><em>problem is partly the 
fault</em></ins></span> of <span class="removed"><del><strong>collecting 
customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
developers. That is clearly true
+    &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
+    problem is partly the fault of app developers. That is clearly true
     if the apps are proprietary software.&lt;/p&gt;
 
     &lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going
-    to screw you.&lt;/p&gt;</em></ins></span>
+    to screw you.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
-&lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>id="M201604110"&gt;
-    &lt;p&gt;Malware was found on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-used a firmware &ldquo;upgrade&rdquo; to make its TVs 
snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+  &lt;li id="M201604110"&gt;
+    &lt;p&gt;Malware was found on &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
     security cameras available through Amazon&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;A camera that records locally</em></ins></span> on <span 
class="removed"><del><strong>what
-users watch&lt;/a&gt;.  The TVs did</strong></del></span> <span 
class="inserted"><ins><em>physical media, and has no network
-    connection, does</em></ins></span> not <span 
class="removed"><del><strong>do that when first 
sold.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>threaten 
people with surveillance&mdash;neither
+    &lt;p&gt;A camera that records locally on physical 
media,</em></ins></span> and <span class="inserted"><ins><em>has no network
+    connection, does not threaten people with surveillance&mdash;neither
     by watching people through the camera, nor through malware in the
-    camera.&lt;/p&gt;</em></ins></span>
+    camera.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;LG</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604050"&gt;
+  &lt;li id="M201604050"&gt;
     &lt;p&gt;Google/Alphabet</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-disabled network features&lt;/a&gt;</strong></del></span>
+<span 
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
     intentionally broke Revolv home automatic control products that
-    depended</em></ins></span> on <span 
class="removed"><del><strong>&lt;em&gt;previously purchased&lt;/em&gt;
-&ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG
-begin</strong></del></span> <span class="inserted"><ins><em>a 
server&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>function, by shutting down the server.
-    The lesson is, reject all such products.  Insist</em></ins></span> on 
<span class="removed"><del><strong>them and distribute their personal 
data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>self-contained
+    depended on a server&lt;/a&gt; to function, by shutting down the server.
+    The lesson is, reject all such products.  Insist on self-contained
     computers that run free software!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
-Barbie is going</strong></del></span>
+&lt;p&gt;Lots</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>spy&lt;/a&gt; on children and adults.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-Cisco TNP IP phones are spying 
devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601100"&gt;</em></ins></span>
+  &lt;li id="M201601100"&gt;
     &lt;p&gt;The &lt;a
-<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam
-&ldquo;smart&rdquo; camera</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+    href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
     &ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it
-    won't accept third-party printing materials.  It</em></ins></span> is 
<span class="removed"><del><strong>always watching&lt;/a&gt;, even 
when</strong></del></span> the
-<span class="removed"><del><strong>&ldquo;owner&rdquo; 
switches</strong></del></span> <span class="inserted"><ins><em>Keurig of
-    printers.  Now</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>is being discontinued, which means that 
eventually
+    won't accept third-party printing materials.  It is the 
Keurig</em></ins></span> of
+    <span class="inserted"><ins><em>printers.  Now it is being discontinued, 
which means that eventually
     authorized materials won't be available and the printers may become
     unusable.&lt;/p&gt;
 
-    &lt;p&gt;With a &lt;a
-    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+    &lt;p&gt;With a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
     printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would
     not even be a remote possibility.&lt;/p&gt;
 
@@ -796,9 +757,9 @@
   &lt;li id="M201511250"&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;</em></ins></span>
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; <span class="removed"><del><strong>device 
means</strong></del></span> <span class="inserted"><ins><em>device means the 
manufacturer is using it
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
     to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -872,29 +833,38 @@
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>it can be fatal.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
     &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs to a patient, were rated &ldquo;&lt;a
+    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over&lt;/a&gt; and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
     researcher.&lt;/p&gt;
 
-    &lt;p&gt;Depending on what drug is being infused, the insecurity could open
-    the door to murder.&lt;/p&gt;
+    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>insecurity could open
+    the door to murder.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;</em></ins></span>
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
@@ -946,34 +916,54 @@
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405201"&gt;
+  &lt;li id="M201405201"&gt;</em></ins></span>
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-    &ldquo;smart&rdquo; TVs, unless</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using it</strong></del></span> 
<span class="inserted"><ins><em>purchasers agreed</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-you.&lt;/p&gt;
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them and distribute their personal data.&lt;/p&gt;
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going to spy&lt;/a&gt; on children and adults.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>let LG begin
-    to snoop</em></ins></span> on <span class="inserted"><ins><em>them and 
distribute</em></ins></span> their <span class="removed"><del><strong>users: 
their</strong></del></span> <span class="inserted"><ins><em>personal 
data.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;p&gt;&lt;a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The</strong></del></span>
 
-  &lt;li id="M201404250"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
     &lt;p&gt;Lots of</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-&ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
-<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> can <span 
class="removed"><del><strong>track you 
-across devices.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam
+&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
+&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>be fatal.&lt;/p&gt;
+&lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+    hospital equipment has lousy security&lt;/a&gt;, and</em></ins></span> it 
<span class="removed"><del><strong>to outsmart
+you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can be 
fatal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Vizio goes a step further than other TV manufacturers in spying on 
+their users: their &lt;a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+&ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+link</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;
     &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
-    memories have modifiable software&lt;/a&gt;, which makes them 
vulnerable</em></ins></span>
+    memories have modifiable software&lt;/a&gt;, which makes</em></ins></span> 
them <span class="removed"><del><strong>your IP address&lt;/a&gt; so that 
advertisers can track you 
+across devices.&lt;/p&gt;
+
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>vulnerable</em></ins></span>
     to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>viruses.&lt;/p&gt;
 
     &lt;p&gt;We don't call</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;back door&rdquo; because</em></ins></span> 
it <span class="removed"><del><strong>enabled by default</strong></del></span> 
is <span class="removed"><del><strong>an injustice already.&lt;/p&gt;
@@ -1218,7 +1208,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- po/malware-appliances.fr-en.html    9 Oct 2018 13:30:41 -0000       1.44
+++ po/malware-appliances.fr-en.html    17 Oct 2018 10:01:35 -0000      1.45
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
-<!-- INSERT appliances -->
   <li id="M201809260">
     <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -797,7 +796,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- po/malware-appliances.ru-en.html    9 Oct 2018 13:30:41 -0000       1.45
+++ po/malware-appliances.ru-en.html    17 Oct 2018 10:01:35 -0000      1.46
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-appliances"></div>
 
 <ul class="blurbs">
-<!-- INSERT appliances -->
   <li id="M201809260">
     <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -797,7 +796,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-cars.de-diff.html        9 Oct 2018 13:30:41 -0000       1.6
+++ po/malware-cars.de-diff.html        17 Oct 2018 10:01:35 -0000      1.7
@@ -60,10 +60,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="malware-cars"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT cars --&gt;
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
@@ -341,7 +340,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-cars.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/malware-cars.fr-en.html  9 Oct 2018 13:30:41 -0000       1.7
+++ po/malware-cars.fr-en.html  17 Oct 2018 10:01:35 -0000      1.8
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
-<!-- INSERT cars -->
   <li id="M201711230">
     <p>AI-powered driving apps can <a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -261,7 +260,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-cars.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/malware-cars.ru-en.html  9 Oct 2018 13:30:41 -0000       1.8
+++ po/malware-cars.ru-en.html  17 Oct 2018 10:01:35 -0000      1.9
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-cars"></div>
 
 <ul class="blurbs">
-<!-- INSERT cars -->
   <li id="M201711230">
     <p>AI-powered driving apps can <a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -261,7 +260,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-games.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-games.fr-en.html 14 Oct 2018 12:58:19 -0000      1.15
+++ po/malware-games.fr-en.html 17 Oct 2018 10:01:35 -0000      1.16
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
 
 <ul class="blurbs">
-<!-- INSERT games -->
   <li id="M201807310">
     <p>A nonfree video game, available through the nonfree Steam client, <a
     
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
@@ -259,7 +258,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-games.ja-diff.html       14 Oct 2018 09:30:25 -0000      1.12
+++ po/malware-games.ja-diff.html       17 Oct 2018 10:01:35 -0000      1.13
@@ -60,10 +60,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="malware-games"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT games --&gt;
   &lt;li id="M201807310"&gt;
     &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
     
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
@@ -294,7 +293,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/14 09:30:25 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-games.ru-en.html 14 Oct 2018 09:58:12 -0000      1.15
+++ po/malware-games.ru-en.html 17 Oct 2018 10:01:35 -0000      1.16
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-games"></div>
 
 <ul class="blurbs">
-<!-- INSERT games -->
   <li id="M201807310">
     <p>A nonfree video game, available through the nonfree Steam client, <a
     
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-";>
@@ -259,7 +258,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 09:58:12 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/malware-google.fr-en.html        9 Oct 2018 13:30:41 -0000       1.24
+++ po/malware-google.fr-en.html        17 Oct 2018 10:01:35 -0000      1.25
@@ -65,7 +65,6 @@
 <h3 id="back-doors">Google Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-back-door -->
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -109,7 +108,6 @@
 <h3 id="censorship">Google Censorship</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-censor -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -151,7 +149,6 @@
 <h3 id="drm">Google DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-dr -->
   <li id="M201705150">
     <p>Google now allows Android
     apps to detect whether a device has been rooted, <a
@@ -193,7 +190,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT google-insec -->
   <li id="M201311120">
     <p><a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
@@ -216,7 +212,6 @@
 actions that harm the users of specific Google software.</p>
 
 <ul class="blurbs">
-<!-- INSERT google-sab -->
   <li id="M201605150">
     <p>Revolv is an IoT device which managed &ldquo;smart home&rdquo;
     operations: switching the lights, operate motion sensors, regulating
@@ -254,7 +249,6 @@
 <h3 id="surveillance">Google Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-surv -->
   <li id="M201808030">
     <p>Some Google apps on Android <a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
@@ -373,7 +367,6 @@
 <h3 id="tyrants">Google Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-tyrant -->
   <li id="M201304080">
     <p>Motorola, then owned by Google, made <a
     
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
@@ -441,7 +434,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-google.ru-en.html        9 Oct 2018 13:30:41 -0000       1.25
+++ po/malware-google.ru-en.html        17 Oct 2018 10:01:35 -0000      1.26
@@ -65,7 +65,6 @@
 <h3 id="back-doors">Google Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-back-door -->
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -109,7 +108,6 @@
 <h3 id="censorship">Google Censorship</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-censor -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -151,7 +149,6 @@
 <h3 id="drm">Google DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-dr -->
   <li id="M201705150">
     <p>Google now allows Android
     apps to detect whether a device has been rooted, <a
@@ -193,7 +190,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT google-insec -->
   <li id="M201311120">
     <p><a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
@@ -216,7 +212,6 @@
 actions that harm the users of specific Google software.</p>
 
 <ul class="blurbs">
-<!-- INSERT google-sab -->
   <li id="M201605150">
     <p>Revolv is an IoT device which managed &ldquo;smart home&rdquo;
     operations: switching the lights, operate motion sensors, regulating
@@ -254,7 +249,6 @@
 <h3 id="surveillance">Google Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-surv -->
   <li id="M201808030">
     <p>Some Google apps on Android <a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
@@ -373,7 +367,6 @@
 <h3 id="tyrants">Google Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT google-tyrant -->
   <li id="M201304080">
     <p>Motorola, then owned by Google, made <a
     
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
@@ -441,7 +434,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/malware-microsoft.de-diff.html   10 Oct 2018 07:58:35 -0000      1.15
+++ po/malware-microsoft.de-diff.html   17 Oct 2018 10:01:35 -0000      1.16
@@ -90,7 +90,6 @@
   &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-back-door --&gt;
   &lt;li id="M201608172"&gt;
     &lt;p id="windows-update"&gt;Microsoft</em></ins></span>
     Windows has a universal back door through which &lt;a
@@ -157,8 +156,7 @@
 
 &lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
 
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-dr --&gt;</em></ins></span>
+&lt;ul class="blurbs"&gt;</em></ins></span>
   &lt;li <span 
class="removed"><del><strong>id="windows7-back-door"&gt;&lt;p&gt;Users reported 
that &lt;a 
     
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
     Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
@@ -177,8 +175,8 @@
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt;
 disks. 
     (The article talks about</em></ins></span> how <span 
class="removed"><del><strong>to permanently reject</strong></del></span> the 
<span class="removed"><del><strong>downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This seems to involve use of a back door</strong></del></span> 
<span class="inserted"><ins><em>same malware would later be
-    introduced</em></ins></span> in <span class="removed"><del><strong>Windows 
7 and 8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>MacOS. 
 That had not been done at the time, but it was
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same malware 
would later be
+    introduced in MacOS.  That had not been done at the time, but it was
     done subsequently.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -196,7 +194,6 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-insec --&gt;
   &lt;li id="M201705120"&gt;</em></ins></span>
     &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to &lt;a
@@ -244,7 +241,6 @@
   &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>committing interference.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-interf --&gt;
   &lt;li id="M201809120"&gt;
     &lt;p&gt;One version of Windows 10 &lt;a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"&gt;
@@ -289,23 +285,24 @@
     <span class="inserted"><ins><em>&ldquo;upgrade&rdquo;</em></ins></span> to 
Windows <span class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Once</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt; when they had turned
-    it off, in the hope that some day they would fail to say no.
-    To do this,</em></ins></span> Microsoft <span 
class="removed"><del><strong>has tricked a user into accepting 
installation</strong></del></span> <span class="inserted"><ins><em>used &lt;a
+  &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
+   of Windows
+   10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+   find</strong></del></span> <span class="inserted"><ins><em>10&lt;/a&gt; 
when they had turned
+    it off, in the hope</em></ins></span> that <span 
class="inserted"><ins><em>some day</em></ins></span> they <span 
class="removed"><del><strong>are denied</strong></del></span> <span 
class="inserted"><ins><em>would fail to say no.
+    To do this, Microsoft used &lt;a
     
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
     malware techniques&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;A detailed &lt;a
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-    analysis</em></ins></span> of <span class="inserted"><ins><em>Microsoft's 
scheme&lt;/a&gt; is available on the Electronic
+    analysis of Microsoft's scheme&lt;/a&gt; is available on</em></ins></span> 
the <span class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>Electronic
     Frontier Foundation's website.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603090"&gt;
-    &lt;p&gt;Microsoft has made companies'</em></ins></span>
-    Windows
-   <span class="removed"><del><strong>10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-   find that they are denied</strong></del></span> <span 
class="inserted"><ins><em>machines managed by</em></ins></span> the <span 
class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>company's sysadmins &lt;a
+    &lt;p&gt;Microsoft has made companies'
+    Windows machines managed by the company's sysadmins &lt;a
     
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
     users to complain</em></ins></span> to <span 
class="removed"><del><strong>cancel or even postpone</strong></del></span> the
    <span class="removed"><del><strong>imposed date of installation&lt;/a&gt;.
@@ -377,7 +374,6 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>specific</em></ins></span> Microsoft <span 
class="removed"><del><strong>cut off security fixes for</strong></del></span> 
<span class="inserted"><ins><em>software.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-sab --&gt;
   &lt;li id="M201704194"&gt;
     &lt;p&gt;Microsoft has made</em></ins></span> Windows <span 
class="removed"><del><strong>XP, except</strong></del></span> <span 
class="inserted"><ins><em>7
     and 8 cease</em></ins></span> to <span class="removed"><del><strong>some 
big users
@@ -385,37 +381,43 @@
 
   &lt;p&gt;Microsoft is going</strong></del></span> <span 
class="inserted"><ins><em>function on certain new computers, &lt;a
     
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively
-    forcing their owners</em></ins></span> to <span 
class="inserted"><ins><em>switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
+    forcing their owners to switch</em></ins></span> to <span 
class="inserted"><ins><em>Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704134"&gt;
     &lt;p&gt;Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"&gt;
   cut off</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-    has dropped</em></ins></span> support for <span 
class="removed"><del><strong>some Internet Explorer 
versions&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Windows 7 and 8 on recent 
processors&lt;/a&gt;</em></ins></span>
-    in <span class="removed"><del><strong>the same way.&lt;/p&gt;
+    has dropped</em></ins></span> support for <span 
class="removed"><del><strong>some Internet Explorer versions&lt;/a&gt; in the 
same way.&lt;/p&gt;
 
-  &lt;p&gt;A person or company has the right</strong></del></span> <span 
class="inserted"><ins><em>a big hurry.&lt;/p&gt;
+  &lt;p&gt;A person or company has the right to cease to 
work</strong></del></span> <span class="inserted"><ins><em>Windows 7 and 
8</em></ins></span> on <span class="inserted"><ins><em>recent 
processors&lt;/a&gt;
+    in</em></ins></span> a
+  <span class="removed"><del><strong>particular program; the wrong here 
is</strong></del></span> <span class="inserted"><ins><em>big hurry.&lt;/p&gt;
 
-    &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
-    have for not doing work</em></ins></span> to <span 
class="removed"><del><strong>cease</strong></del></span> <span 
class="inserted"><ins><em>support them. If it doesn't want</em></ins></span> to 
<span class="removed"><del><strong>work on a
-  particular program;</strong></del></span> <span class="inserted"><ins><em>do
-    this work, it should let users do</em></ins></span> the <span 
class="removed"><del><strong>wrong here is</strong></del></span> <span 
class="inserted"><ins><em>work.&lt;/p&gt;
+    &lt;p&gt;It makes no difference what legitimate reasons</em></ins></span> 
Microsoft <span class="removed"><del><strong>does</strong></del></span> <span 
class="inserted"><ins><em>might
+    have for not doing work to support them. If it doesn't want to 
do</em></ins></span>
+    this <span class="removed"><del><strong>after having
+  made the</strong></del></span> <span class="inserted"><ins><em>work, it 
should let</em></ins></span> users <span class="removed"><del><strong>dependent 
on Microsoft, because they are not free</strong></del></span> <span 
class="inserted"><ins><em>do the work.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606270"&gt;
-    &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
+    &lt;p id="windows10-forcing"&gt;In its efforts</em></ins></span> to <span 
class="removed"><del><strong>ask
+  anyone else</strong></del></span> <span class="inserted"><ins><em>trick 
users of Windows
     7 and 8 into installing all-spying Windows 10 against their
-    will,</em></ins></span> Microsoft <span 
class="removed"><del><strong>does</strong></del></span> <span 
class="inserted"><ins><em>forced their computers to &lt;a
+    will, Microsoft forced their computers</em></ins></span> to <span 
class="removed"><del><strong>work on</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
-    silently download&hellip; the whole of Windows 10&lt;/a&gt;! 
Apparently,</em></ins></span>
-    this <span class="removed"><del><strong>after having
-  made</strong></del></span> <span class="inserted"><ins><em>was done through 
a &lt;a
+    silently download&hellip;</em></ins></span> the <span 
class="removed"><del><strong>program for them.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
+
+&lt;p&gt;Various proprietary programs often mess up</strong></del></span> 
<span class="inserted"><ins><em>whole of Windows 10&lt;/a&gt;! Apparently,
+    this was done through a &lt;a
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
-    universal back door&lt;/a&gt;. Not only did</em></ins></span> the <span 
class="removed"><del><strong>users dependent on Microsoft, 
because</strong></del></span> <span class="inserted"><ins><em>unwanted 
downloads &lt;a
+    universal back door&lt;/a&gt;. Not only did</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like 
sabotage,</strong></del></span> <span class="inserted"><ins><em>unwanted 
downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
     jeopardize important operations in regions of the world with poor
-    connectivity&lt;/a&gt;, but many of the people who let installation proceed
+    connectivity&lt;/a&gt;,</em></ins></span> but <span 
class="inserted"><ins><em>many of the people who let installation proceed
     found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
@@ -425,34 +427,29 @@
     &lt;p&gt;Once Microsoft has tricked a user
     into accepting installation of Windows 10, &lt;a
     
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-    find that</em></ins></span> they are <span 
class="removed"><del><strong>not free to ask
-  anyone else</strong></del></span> <span class="inserted"><ins><em>denied the 
option</em></ins></span> to <span class="removed"><del><strong>work 
on</strong></del></span> <span class="inserted"><ins><em>cancel or even 
postpone</em></ins></span> the <span 
class="removed"><del><strong>program</strong></del></span>
-    <span class="inserted"><ins><em>imposed date of 
installation&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This demonstrates what we've said</em></ins></span> for <span 
class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
+    find that</em></ins></span> they are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>denied the option</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for</strong></del></span> <span class="inserted"><ins><em>cancel or even 
postpone</em></ins></span> the <span class="removed"><del><strong>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This section 
describes examples</strong></del></span>
+    <span class="inserted"><ins><em>imposed date</em></ins></span> of <span 
class="removed"><del><strong>Microsoft committing
+interference.&lt;/p&gt;
 
-&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft is planning</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;Various</strong></del></span> <span class="inserted"><ins><em>years: 
using</em></ins></span> proprietary <span class="removed"><del><strong>programs 
often mess up the user's system. They are like sabotage, but they are not grave 
enough</strong></del></span>
-    <span class="inserted"><ins><em>software means letting someone have power 
over you, and you're going</em></ins></span>
-    to <span class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>get screwed sooner or later.&lt;/p&gt;
+    &lt;p&gt;This demonstrates what we've said for years: using proprietary
+    software means letting someone have power over you, and you're 
going</em></ins></span>
+    to <span class="removed"><del><strong>make Windows &lt;a
+      
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
+      impose use of</strong></del></span> <span class="inserted"><ins><em>get 
screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601310"&gt;
-    &lt;p&gt;FTDI's proprietary driver</em></ins></span>
-    for <span class="removed"><del><strong>the word &ldquo;sabotage&rdquo;. 
Nonetheless,</strong></del></span> <span class="inserted"><ins><em>its 
USB-to-serial chips has been designed to &lt;a
+    &lt;p&gt;FTDI's proprietary driver
+    for</em></ins></span> its <span class="removed"><del><strong>browser, 
Edge, in certain circumstances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The reason</strong></del></span> <span 
class="inserted"><ins><em>USB-to-serial chips has been designed to &lt;a
     
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
-    so that</em></ins></span> they <span class="removed"><del><strong>are 
nasty and wrong. This section describes examples of</strong></del></span> <span 
class="inserted"><ins><em>no longer work.</em></ins></span> Microsoft <span 
class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span> is <span 
class="removed"><del><strong>planning to make Windows</strong></del></span> 
&lt;a
-      <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
-      impose use of its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The reason Microsoft can force things on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
+    so that they no longer work.</em></ins></span> Microsoft <span 
class="removed"><del><strong>can force things on</strong></del></span> <span 
class="inserted"><ins><em>is &lt;a
+    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
     this automatically&lt;/a&gt; as an &ldquo;upgrade&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -509,7 +506,6 @@
 &lt;h3 id="subscriptions"&gt;Microsoft Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-subscript --&gt;
   &lt;li id="M201507150"&gt;
     &lt;p&gt;Microsoft Office forces</em></ins></span> users <span 
class="removed"><del><strong>obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
@@ -538,7 +534,6 @@
 &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-surv --&gt;
   &lt;li id="M201710134"&gt;
     &lt;p&gt;Windows</em></ins></span> 10 telemetry program sends information 
to Microsoft about
     the user's computer and their use of the computer.&lt;/p&gt;
@@ -622,11 +617,11 @@
     &lt;p&gt;&lt;a
     
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
     Windows 10 <span class="removed"><del><strong>comes with 13 screens of 
snooping options&lt;/a&gt;, all enabled by default,
-  and turning them</strong></del></span> <span class="inserted"><ins><em>sends 
identifiable information to Microsoft&lt;/a&gt;, even if
-    a user turns</em></ins></span> off <span 
class="removed"><del><strong>would be daunting to most 
users.&lt;/p&gt;&lt;/li&gt;
+  and turning them off would be daunting</strong></del></span> <span 
class="inserted"><ins><em>sends identifiable information</em></ins></span> to 
<span class="removed"><del><strong>most users.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
-  Windows</strong></del></span> <span class="inserted"><ins><em>its Bing 
search and Cortana features, and activates
+  Windows</strong></del></span> <span 
class="inserted"><ins><em>Microsoft&lt;/a&gt;, even if
+    a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -748,7 +743,6 @@
   &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-jail --&gt;
   &lt;li id="M201706130"&gt;</em></ins></span>
     &lt;p&gt;Windows 10 S was a jail: &lt;a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;
@@ -779,7 +773,6 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-tyrant --&gt;
   &lt;li id="M201607150"&gt;</em></ins></span>
     &lt;p&gt;Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has &lt;a
@@ -871,7 +864,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/10 07:58:35 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/malware-microsoft.fr-en.html     10 Oct 2018 10:57:51 -0000      1.60
+++ po/malware-microsoft.fr-en.html     17 Oct 2018 10:01:35 -0000      1.61
@@ -67,7 +67,6 @@
 <h3 id="back-doors">Microsoft Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
   <li id="M201608172">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
@@ -126,7 +125,6 @@
 <h3 id="drm">Microsoft DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-dr -->
   <li id="M200708131">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
@@ -146,7 +144,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-insec -->
   <li id="M201705120">
     <p>Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to <a
@@ -180,7 +177,6 @@
 section describes examples of Microsoft committing interference.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-interf -->
   <li id="M201809120">
     <p>One version of Windows 10 <a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
@@ -261,7 +257,6 @@
 actions that harm the users of specific Microsoft software.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-sab -->
   <li id="M201704194">
     <p>Microsoft has made Windows 7
     and 8 cease to function on certain new computers, <a
@@ -353,7 +348,6 @@
 <h3 id="subscriptions">Microsoft Subscriptions</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
   <li id="M201507150">
     <p>Microsoft Office forces users <a
     
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
@@ -365,7 +359,6 @@
 <h3 id="surveillance">Microsoft Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-surv -->
   <li id="M201710134">
     <p>Windows 10 telemetry program sends information to Microsoft about
     the user's computer and their use of the computer.</p>
@@ -513,7 +506,6 @@
 <h3 id="jails">Microsoft Jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-jail -->
   <li id="M201706130">
     <p>Windows 10 S was a jail: <a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
@@ -539,7 +531,6 @@
 <h3 id="tyrants">Microsoft Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -617,7 +608,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- po/malware-microsoft.it-diff.html   10 Oct 2018 07:58:35 -0000      1.14
+++ po/malware-microsoft.it-diff.html   17 Oct 2018 10:01:35 -0000      1.15
@@ -89,7 +89,6 @@
   &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-back-door --&gt;
   &lt;li id="M201608172"&gt;
     &lt;p id="windows-update"&gt;Microsoft</em></ins></span>
     Windows has a universal back door through which &lt;a
@@ -156,8 +155,7 @@
 
 &lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
 
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-dr --&gt;</em></ins></span>
+&lt;ul class="blurbs"&gt;</em></ins></span>
   &lt;li <span 
class="removed"><del><strong>id="windows7-back-door"&gt;&lt;p&gt;Users reported 
that &lt;a 
     
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
     Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
@@ -176,8 +174,8 @@
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt;
 disks. 
     (The article talks about</em></ins></span> how <span 
class="removed"><del><strong>to permanently reject</strong></del></span> the 
<span class="removed"><del><strong>downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This seems to involve use of a back door</strong></del></span> 
<span class="inserted"><ins><em>same malware would later be
-    introduced</em></ins></span> in <span class="removed"><del><strong>Windows 
7 and 8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>MacOS. 
 That had not been done at the time, but it was
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same malware 
would later be
+    introduced in MacOS.  That had not been done at the time, but it was
     done subsequently.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -195,7 +193,6 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-insec --&gt;
   &lt;li id="M201705120"&gt;</em></ins></span>
     &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to &lt;a
@@ -243,7 +240,6 @@
   &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>committing interference.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-interf --&gt;
   &lt;li id="M201809120"&gt;
     &lt;p&gt;One version of Windows 10 &lt;a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"&gt;
@@ -377,7 +373,6 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>specific</em></ins></span> Microsoft <span 
class="removed"><del><strong>cut off security fixes for</strong></del></span> 
<span class="inserted"><ins><em>software.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-sab --&gt;
   &lt;li id="M201704194"&gt;
     &lt;p&gt;Microsoft has made</em></ins></span> Windows <span 
class="removed"><del><strong>XP, except</strong></del></span> <span 
class="inserted"><ins><em>7
     and 8 cease</em></ins></span> to <span class="removed"><del><strong>some 
big users
@@ -392,123 +387,122 @@
     &lt;p&gt;Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"&gt;
   cut off</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-    has dropped</em></ins></span> support for <span 
class="removed"><del><strong>some Internet Explorer versions&lt;/a&gt; in the 
same way.&lt;/p&gt;
-
-  &lt;p&gt;A person or company has the right to cease to 
work</strong></del></span> <span class="inserted"><ins><em>Windows 7 and 
8</em></ins></span> on <span class="inserted"><ins><em>recent 
processors&lt;/a&gt;
-    in</em></ins></span> a
-  <span class="removed"><del><strong>particular program; the wrong here 
is</strong></del></span> <span class="inserted"><ins><em>big hurry.&lt;/p&gt;
-
-    &lt;p&gt;It makes no difference what legitimate reasons</em></ins></span> 
Microsoft <span class="removed"><del><strong>does this after having
-  made the users dependent on Microsoft, because they 
are</strong></del></span> <span class="inserted"><ins><em>might
-    have for</em></ins></span> not <span 
class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>doing work</em></ins></span> to <span 
class="removed"><del><strong>ask
-  anyone else</strong></del></span> <span class="inserted"><ins><em>support 
them. If it doesn't want</em></ins></span> to <span 
class="removed"><del><strong>work on the program for them.&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
+    has dropped</em></ins></span> support for <span 
class="removed"><del><strong>some Internet Explorer 
versions&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Windows 7 and 8 on recent 
processors&lt;/a&gt;</em></ins></span>
+    in <span class="removed"><del><strong>the same 
way.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a big 
hurry.&lt;/p&gt;
 
-&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
-
-&lt;p&gt;Various proprietary programs often mess up</strong></del></span> 
<span class="inserted"><ins><em>do
-    this work, it should let users do</em></ins></span> the <span 
class="removed"><del><strong>user's system. They are like sabotage, but they 
are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>work.&lt;/p&gt;
+    &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
+    have for not doing work to support them. If it doesn't want to do
+    this work, it should let users do the work.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606270"&gt;
-    &lt;p id="windows10-forcing"&gt;In its efforts</em></ins></span> to <span 
class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>trick users</em></ins></span> of <span 
class="inserted"><ins><em>Windows
+    &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
     7 and 8 into installing all-spying Windows 10 against their
-    will,</em></ins></span> Microsoft <span 
class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Windows displays</strong></del></span> <span 
class="inserted"><ins><em>forced their computers to</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
-       intrusive ads for Microsoft products and its
-       partners' products&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article's author starts from</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
-    silently download&hellip;</em></ins></span> the <span 
class="removed"><del><strong>premise</strong></del></span> <span 
class="inserted"><ins><em>whole of Windows 10&lt;/a&gt;! Apparently,
+    will, Microsoft forced their computers to &lt;a
+    
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
+    silently download&hellip; the whole of Windows 10&lt;/a&gt;! Apparently,
     this was done through a &lt;a
     href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
     jeopardize important operations in regions of the world with poor
     connectivity&lt;/a&gt;, but many of the people who let installation proceed
-    found out</em></ins></span> that <span class="inserted"><ins><em>this 
&ldquo;upgrade&rdquo; was in fact a &lt;a
+    found out that this &ldquo;upgrade&rdquo; was in fact a &lt;a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     downgrade&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606010"&gt;
-    &lt;p&gt;Once</em></ins></span> Microsoft has <span 
class="inserted"><ins><em>tricked</em></ins></span> a <span 
class="removed"><del><strong>right to control what</strong></del></span> <span 
class="inserted"><ins><em>user
-    into accepting installation of</em></ins></span> Windows <span 
class="removed"><del><strong>does to users, as long as it
-      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Microsoft inserts</strong></del></span> <span 
class="inserted"><ins><em>10,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
-      annoying advertisements inside of</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-    find that they are denied</em></ins></span> the <span 
class="removed"><del><strong>File Explorer&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>option</em></ins></span> to <span 
class="removed"><del><strong>nag
-      users</strong></del></span> <span class="inserted"><ins><em>cancel or 
even postpone the
+    &lt;p&gt;Once Microsoft has tricked a user
+    into accepting installation of Windows 10, &lt;a
+    
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+    find that they are denied the option to cancel or even postpone the
     imposed date of installation&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This demonstrates what we've said for years: using proprietary
-    software means letting someone have power over you, and you're 
going</em></ins></span>
-    to <span class="removed"><del><strong>buy 
subscriptions</strong></del></span> <span class="inserted"><ins><em>get screwed 
sooner or later.&lt;/p&gt;
+    software means letting someone have power over you, and you're going
+    to get screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601310"&gt;
-    &lt;p&gt;FTDI's proprietary driver</em></ins></span>
-    for <span class="removed"><del><strong>the OneDrive 
service.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;In order</strong></del></span> <span class="inserted"><ins><em>its 
USB-to-serial chips has been designed</em></ins></span> to <span 
class="removed"><del><strong>increase Windows 10's install 
base,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;FTDI's proprietary driver
+    for its USB-to-serial chips has been designed to &lt;a
     
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
-    so that they no longer work.</em></ins></span> Microsoft <span 
class="inserted"><ins><em>is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice and privacy&lt;/a&gt;.</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
-    this automatically&lt;/a&gt; as an 
&ldquo;upgrade&rdquo;.&lt;/p&gt;</em></ins></span>
+    so that they no longer work. Microsoft is &lt;a
+    
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
+    this automatically&lt;/a&gt; as an &ldquo;upgrade&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft has
-started</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511240"&gt;
-    &lt;p&gt;Windows 10 &ldquo;upgrades&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
+  &lt;li id="M201511240"&gt;
+    &lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
+    
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
     delete applications&lt;/a&gt; without asking permission.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201503260"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.computerworlduk.com/it-business/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;Microsoft
-    cut off security fixes for Windows XP, except to some 
big</em></ins></span> users <span class="removed"><del><strong>obnoxiously and 
repeatedly</strong></del></span> <span class="inserted"><ins><em>that
+    cut off security fixes for Windows XP, except to some big users that
     pay exorbitantly&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Microsoft is going</em></ins></span> to <span 
class="removed"><del><strong>install Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Microsoft is going to &lt;a
+    
href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"&gt;
+    cut off support for some Internet Explorer versions&lt;/a&gt; in the same
+    way.&lt;/p&gt;</em></ins></span>
 
-  &lt;li&gt;&lt;p&gt;Microsoft
-      &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
-        tricking
-        users&lt;/a&gt;</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
-into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;A person or company has the right to cease to work on a particular
+    program; the wrong here is Microsoft does this after having made the
+    users dependent on Microsoft, because they are not free to ask anyone
+    else to work on the program for <span 
class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"&gt;
-    cut off support for some Internet Explorer versions&lt;/a&gt; in the same
-    way.&lt;/p&gt;
+&lt;h3 id="interference"&gt;Microsoft Interference&lt;/h3&gt;
+
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
+interference.&lt;/p&gt;
 
-    &lt;p&gt;A person or company</em></ins></span> has <span 
class="inserted"><ins><em>the right to cease to work on a particular
-    program; the wrong here is Microsoft does this after 
having</em></ins></span> made <span class="removed"><del><strong>companies' 
Windows machines managed by</strong></del></span> the
-<span class="removed"><del><strong>company's
-sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue</strong></del></span>
-    users <span class="inserted"><ins><em>dependent on Microsoft, because they 
are not free</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>ask anyone
-    else</em></ins></span> to <span class="inserted"><ins><em>work 
on</em></ins></span> the <span class="removed"><del><strong>sysadmins about not 
&ldquo;upgrading&rdquo; to</strong></del></span> <span 
class="inserted"><ins><em>program for them.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Windows displays
+      &lt;a 
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+       intrusive ads for Microsoft products and its
+       partners' products&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201306220"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;Microsoft
-    informs the NSA of bugs in</em></ins></span> Windows
-<span 
class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>before fixing them&lt;/a&gt;.&lt;/p&gt;
+    informs</em></ins></span> the <span class="removed"><del><strong>premise 
that Microsoft
+      has a right to control what Windows does to users, as long as it
+      doesn't go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Microsoft inserts &lt;a
+href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
+      annoying advertisements inside</strong></del></span> <span 
class="inserted"><ins><em>NSA</em></ins></span> of <span 
class="removed"><del><strong>the File Explorer&lt;/a&gt; to nag
+      users to buy subscriptions for the OneDrive service.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;In order to increase Windows 10's install base, Microsoft
+&lt;a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
+blatantly disregards user choice and privacy&lt;/a&gt;.
+&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Microsoft has
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
+users obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+      &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
+        tricking
+        users&lt;/a&gt; &lt;a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
+into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies'</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> Windows <span 
class="removed"><del><strong>machines managed by the
+company's
+sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue</strong></del></span>
 <span class="inserted"><ins><em>before fixing them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -516,11 +510,11 @@
 &lt;h3 id="subscriptions"&gt;Microsoft Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-subscript --&gt;
   &lt;li id="M201507150"&gt;
-    &lt;p&gt;Microsoft Office forces users &lt;a
+    &lt;p&gt;Microsoft Office forces</em></ins></span> users <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe to Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
+    subscribe</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>Office 365</em></ins></span> to <span 
class="removed"><del><strong>the sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>be able</em></ins></span> to <span 
class="removed"><del><strong>Windows
+10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>create/edit documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
@@ -532,7 +526,6 @@
 &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-surv --&gt;
   &lt;li id="M201710134"&gt;
     &lt;p&gt;Windows</em></ins></span> 10 telemetry program sends information 
to Microsoft about
     the user's computer and their use of the computer.&lt;/p&gt;
@@ -609,66 +602,67 @@
     &lt;p&gt;To use proprietary software is to invite such <span 
class="removed"><del><strong>treatment.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
-  &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;</strong></del></span>
 <span class="inserted"><ins><em>treatment.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201508130"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
-    Windows 10 <span class="removed"><del><strong>comes with 13 screens of 
snooping options&lt;/a&gt;, all enabled by default,
-  and turning them off would be daunting</strong></del></span> <span 
class="inserted"><ins><em>sends identifiable information</em></ins></span> to 
<span class="removed"><del><strong>most users.&lt;/p&gt;&lt;/li&gt;
+  &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
+  Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all enabled 
by default,
+  and turning them off would be daunting to most users.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
-  Windows</strong></del></span> <span 
class="inserted"><ins><em>Microsoft&lt;/a&gt;, even if
-    a user turns off its Bing search and Cortana features, and activates
-    the privacy-protection settings.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201507300"&gt;
-    &lt;p&gt;Windows</em></ins></span> 10 &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</em></ins></span>
-    ships with default settings that show no regard for the privacy of
-    its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
-    the users' files, text input, voice input, location info, contacts,
-    calendar records and web browsing history, as well as automatically
-    connecting the machines to open
-  <span class="removed"><del><strong>hotspots and showing targeted 
ads.&lt;/p&gt;
+  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+  ships with default settings that show no regard for the
+  privacy of its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo;
+  to snoop on the users' files, text input, voice input,
+  location info, contacts, calendar records and web browsing
+  history, as well as automatically connecting the machines to open
+  hotspots and showing targeted ads.&lt;/p&gt;
 
   &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
   demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
   look at users' files for the Chinese government on 
demand?&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
-  &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
-  Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if a 
user
-  turns off its Bing search and Cortana features, and activates the
-  privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
+  &lt;a</strong></del></span> <span 
class="inserted"><ins><em>treatment.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user 
enables other companies to
-  track the browsing of each specific user.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201508130"&gt;
+    &lt;p&gt;&lt;a</em></ins></span>
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
+    a user turns off its Bing search and Cortana features, and activates
+    the privacy-protection <span 
class="removed"><del><strong>settings.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;Spyware in Windows 8: &lt;a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
-  Windows Update snoops on</strong></del></span> <span 
class="inserted"><ins><em>hotspots and showing targeted ads.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The unique &ldquo;advertising 
ID&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>settings.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;We can suppose Microsoft look at users' files 
for</em></ins></span> the <span class="removed"><del><strong>user.&lt;/a&gt;
+  &lt;li id="M201507300"&gt;
+    &lt;p&gt;Windows 10 &lt;a
+    
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+    ships with default settings that show no regard</em></ins></span> for 
<span class="removed"><del><strong>each user enables other companies to
+  track</strong></del></span> the <span 
class="removed"><del><strong>browsing</strong></del></span> <span 
class="inserted"><ins><em>privacy</em></ins></span> of <span 
class="removed"><del><strong>each specific user.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;Spyware in Windows 8: &lt;a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
+  Windows Update snoops on the user.&lt;/a&gt;
   &lt;a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175"&gt;
-  Windows 8.1 snoops</strong></del></span> <span class="inserted"><ins><em>US 
government</em></ins></span>
-    on <span class="removed"><del><strong>local searches.&lt;/a&gt; And 
there's a
+  Windows 8.1 snoops on local searches.&lt;/a&gt; And there's a
   &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
   secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
-  &lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-  Microsoft SkyDrive allows</strong></del></span> <span 
class="inserted"><ins><em>demand, though</em></ins></span> the <span 
class="removed"><del><strong>NSA to directly examine</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;privacy policy&rdquo; does not explicitly
-    say so. Will it look at</em></ins></span> users' <span 
class="removed"><del><strong>data.&lt;/a&gt;&lt;/p&gt;
+  &lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;</strong></del></span>
+    <span class="inserted"><ins><em>its users&lt;/a&gt;, 
giving</em></ins></span> Microsoft <span class="removed"><del><strong>SkyDrive 
allows</strong></del></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;right&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>directly examine</strong></del></span> <span 
class="inserted"><ins><em>snoop on
+    the</em></ins></span> users' <span 
class="removed"><del><strong>data.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.</strong></del></span>
 <span class="inserted"><ins><em>files, text input, voice input, location info, 
contacts,
+    calendar records and web browsing history, as well as automatically
+    connecting the machines to open hotspots and showing targeted 
ads.&lt;/p&gt;
+
+    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>changed Skype
       &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span 
class="inserted"><ins><em>files</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the Chinese government
+      specifically</strong></del></span> <span class="inserted"><ins><em>look 
at users' files</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the US government
+    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
+    say so. Will it look at users' files for the Chinese government
     on demand?&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -747,7 +741,6 @@
   &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-jail --&gt;
   &lt;li id="M201706130"&gt;</em></ins></span>
     &lt;p&gt;Windows 10 S <span class="removed"><del><strong>ought to be 
called Windows 10 J, for &ldquo;Jail&rdquo;:</strong></del></span> <span 
class="inserted"><ins><em>was a jail:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;only</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;
@@ -782,7 +775,6 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-tyrant --&gt;
   &lt;li id="M201607150"&gt;</em></ins></span>
     &lt;p&gt;Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has &lt;a
@@ -865,7 +857,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/10 07:58:35 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-microsoft.ja-diff.html   10 Oct 2018 07:58:35 -0000      1.25
+++ po/malware-microsoft.ja-diff.html   17 Oct 2018 10:01:35 -0000      1.26
@@ -97,7 +97,6 @@
   &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-back-door --&gt;
   &lt;li id="M201608172"&gt;
     &lt;p id="windows-update"&gt;Microsoft</em></ins></span>
     Windows has a universal back door through which &lt;a <span 
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
@@ -172,7 +171,6 @@
 &lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-dr --&gt;
   &lt;li id="M200708131"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM</em></ins></span>
     in <span class="removed"><del><strong>fact &lt;a 
@@ -196,7 +194,7 @@
 &lt;h3 id="insecurity"&gt;Microsoft Insecurity&lt;/h3&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-    &lt;li&gt;&lt;p&gt;A &lt;a</strong></del></span>
+    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;p&gt;These bugs are/were not intentional, 
so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -204,7 +202,6 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-insec --&gt;
   &lt;li id="M201705120"&gt;
     &lt;p&gt;Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to &lt;a
@@ -213,9 +210,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201608020"&gt;
-    &lt;p&gt;A &lt;a</em></ins></span>
+    &lt;p&gt;A &lt;a
     
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
-    in Internet Explorer and Edge&lt;/a&gt; allows an attacker to retrieve
+    in Internet Explorer</em></ins></span> and Edge&lt;/a&gt; allows an 
attacker to retrieve
     Microsoft account credentials, if the user is tricked into visiting
     a malicious link.&lt;/p&gt;
   &lt;/li&gt;
@@ -241,62 +238,69 @@
 &lt;p&gt;Various proprietary programs often mess up</em></ins></span> the 
<span class="removed"><del><strong>user.
 But they</strong></del></span> <span class="inserted"><ins><em>user's system. 
They</em></ins></span>
 are <span class="removed"><del><strong>a lot</strong></del></span> like <span 
class="removed"><del><strong>malware, since</strong></del></span> <span 
class="inserted"><ins><em>sabotage, but</em></ins></span> they are <span 
class="removed"><del><strong>technical Microsoft
-actions that harm</strong></del></span> <span class="inserted"><ins><em>not 
grave enough</em></ins></span> to <span class="inserted"><ins><em>qualify 
for</em></ins></span> the <span class="inserted"><ins><em>word
+actions that harm</strong></del></span> <span class="inserted"><ins><em>not 
grave enough</em></ins></span> to <span class="inserted"><ins><em>qualify 
for</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>word
 &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This
-section describes examples of Microsoft committing interference.&lt;/p&gt;
+section describes examples</em></ins></span> of <span 
class="removed"><del><strong>specific Microsoft software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Once</strong></del></span> Microsoft <span 
class="removed"><del><strong>has tricked a user into accepting 
installation</strong></del></span> <span class="inserted"><ins><em>committing 
interference.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-interf --&gt;
   &lt;li id="M201809120"&gt;
-    &lt;p&gt;One version of Windows 10 &lt;a
-    
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"&gt;
-    harangues</em></ins></span> users <span class="inserted"><ins><em>if they 
try to install Firefox (or Chrome)&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;One version</em></ins></span> of Windows
+   <span class="removed"><del><strong>10,</strong></del></span> <span 
class="inserted"><ins><em>10</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+   find that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"&gt;
+    harangues users if</em></ins></span> they <span 
class="removed"><del><strong>are denied the option</strong></del></span> <span 
class="inserted"><ins><em>try</em></ins></span> to <span 
class="removed"><del><strong>cancel or even postpone the
+   imposed date of installation&lt;/a&gt;.
+   &lt;/p&gt;
+   &lt;p&gt;This demonstrates what we've said for years: using proprietary
+   software means letting someone have power over you, and you're
+   going</strong></del></span> <span class="inserted"><ins><em>install Firefox 
(or Chrome)&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803190"&gt;
-    &lt;p&gt;Microsoft is planning to make Windows &lt;a
-    
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
-    impose use</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Microsoft is planning</em></ins></span> to <span 
class="removed"><del><strong>get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;The reason</em></ins></span> Microsoft <span 
class="removed"><del><strong>software.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft
+  has</strong></del></span> <span class="inserted"><ins><em>make 
Windows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
+  all future Intel CPUs for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
+    impose use of its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Once</strong></del></span> <span 
class="inserted"><ins><em>can force things on users is that Windows
-    is nonfree.&lt;/p&gt;
+    &lt;p&gt;The reason Microsoft can force things on users is 
that</em></ins></span> Windows <span 
class="removed"><del><strong>7</strong></del></span>
+    <span class="inserted"><ins><em>is nonfree.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703170"&gt;
     &lt;p&gt;Windows displays &lt;a
     
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
-    intrusive ads for Microsoft products and its partners'
+    intrusive ads for Microsoft products</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;. Those machines will
+  be stuck with</strong></del></span> <span class="inserted"><ins><em>its 
partners'
     products&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article's author starts from the premise 
that</em></ins></span> Microsoft has <span 
class="removed"><del><strong>tricked</strong></del></span>
-    a <span class="removed"><del><strong>user into accepting 
installation</strong></del></span> <span class="inserted"><ins><em>right to 
control what Windows does to users, as long as it doesn't
+    &lt;p&gt;The article's author starts from</em></ins></span> the <span 
class="removed"><del><strong>nastier</strong></del></span> <span 
class="inserted"><ins><em>premise that Microsoft has
+    a right to control what</em></ins></span> Windows <span 
class="removed"><del><strong>10.</strong></del></span> <span 
class="inserted"><ins><em>does to users, as long as it doesn't
     go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201608170"&gt;
-    &lt;p&gt; After &lt;a 
href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing the 
download</em></ins></span> of Windows
-   <span class="removed"><del><strong>10,</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt;
-    on computers that were running Windows 7 and 8, 
Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-   find</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    repeatedly switched on a flag</em></ins></span> that <span 
class="inserted"><ins><em>urged users to
-    &ldquo;upgrade&rdquo; to Windows 10&lt;/a&gt; when</em></ins></span> they 
<span class="removed"><del><strong>are denied</strong></del></span> <span 
class="inserted"><ins><em>had turned
-    it off, in</em></ins></span> the <span 
class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>hope that some day they would fail</em></ins></span> 
to <span class="removed"><del><strong>cancel or even postpone the
-   imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
+    &lt;p&gt; After</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"&gt;
+  AMD and Qualcomm CPUs, too&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;Of course,</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing
 the download of Windows 10&lt;/a&gt;
+    on computers that were running</em></ins></span> Windows 7 and <span 
class="removed"><del><strong>8</strong></del></span> <span 
class="inserted"><ins><em>8, Microsoft &lt;a
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    repeatedly switched on a flag that urged users to
+    &ldquo;upgrade&rdquo; to Windows 10&lt;/a&gt; when they had turned
+    it off, in the hope that some day they would fail to say no.
     To do this, Microsoft used &lt;a
     
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
     malware techniques&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;A detailed &lt;a
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-    analysis</em></ins></span> of <span 
class="removed"><del><strong>installation&lt;/a&gt;.
-   &lt;/p&gt;
-   &lt;p&gt;This demonstrates what we've said for years: using proprietary
-   software means letting someone have power over you, and you're
-   going</strong></del></span> <span class="inserted"><ins><em>Microsoft's 
scheme&lt;/a&gt; is available on the Electronic
+    analysis of Microsoft's scheme&lt;/a&gt; is available on the Electronic
     Frontier Foundation's website.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -304,31 +308,33 @@
     &lt;p&gt;Microsoft has made companies'
     Windows machines managed by the company's sysadmins &lt;a
     
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
-    users</em></ins></span> to <span class="removed"><del><strong>get screwed 
sooner or later.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span> <span 
class="inserted"><ins><em>complain to the sysadmins about not 
&ldquo;upgrading&rdquo;
+    users to complain to the sysadmins about not &ldquo;upgrading&rdquo;
     to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601160"&gt;
-    &lt;p&gt;Microsoft</em></ins></span> has &lt;a
+    &lt;p&gt;Microsoft has &lt;a
     
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
     all future Intel CPUs for Windows 7 and 8&lt;/a&gt;. Those
     machines will be stuck with the nastier Windows 10.  &lt;a
     
href="http://gizmodo.com/only-the-latest-version-of-windows-will-run-on-some-fut-1753545825"&gt;
-    AMD and Qualcomm CPUs, <span class="removed"><del><strong>too&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    AMD and Qualcomm CPUs, too&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Of course, Windows 7 and 8 are unethical too, because they are
+    &lt;p&gt;Of course, Windows 7 and 8</em></ins></span> are unethical too, 
because they are
     proprietary software.  But this example of Microsoft's wielding its
     power demonstrates the power it <span class="removed"><del><strong>holds.
   &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>holds.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;Free software developers also stop maintaining old versions of
-    their programs, but this is not unfair to <span 
class="removed"><del><strong>users because</strong></del></span> <span 
class="inserted"><ins><em>users because the users of
+    their programs, but this is not unfair to users because the users of
     free software have control over it.  If it is important enough to you,
     you and other users can hire someone to support the old version on
-    your future platforms.&lt;/p&gt;
+    your future <span class="removed"><del><strong>platforms.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft
+    is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
+    forcibly pushing</strong></del></span> <span 
class="inserted"><ins><em>platforms.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -341,10 +347,10 @@
 actions that harm the users of specific Microsoft software.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-sab --&gt;
   &lt;li id="M201704194"&gt;
-    &lt;p&gt;Microsoft has made Windows 7
-    and 8 cease to function on certain new computers, &lt;a
+    &lt;p&gt;Microsoft has made</em></ins></span> Windows
+    <span class="removed"><del><strong>update</strong></del></span> <span 
class="inserted"><ins><em>7
+    and 8 cease</em></ins></span> to <span class="removed"><del><strong>its 
version 10&lt;/a&gt;, ignoring the flag</strong></del></span> <span 
class="inserted"><ins><em>function</em></ins></span> on <span 
class="inserted"><ins><em>certain new computers, &lt;a
     
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively
     forcing their owners to switch to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -352,22 +358,38 @@
   &lt;li id="M201704134"&gt;
     &lt;p&gt;Microsoft &lt;a
     
href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-    has dropped support for Windows 7 and 8 on recent processors&lt;/a&gt;
+    has dropped support for</em></ins></span> Windows 7 <span 
class="removed"><del><strong>or</strong></del></span> <span 
class="inserted"><ins><em>and</em></ins></span> 8
+    <span class="removed"><del><strong>that you could set 
to</strong></del></span> <span class="inserted"><ins><em>on recent 
processors&lt;/a&gt;
     in a big hurry.&lt;/p&gt;
 
     &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
-    have for not doing work to support them. If it doesn't want to do
-    this work, it should let users do the work.&lt;/p&gt;
+    have for</em></ins></span> not <span class="removed"><del><strong>upgrade. 
 This reaffirms</strong></del></span> <span class="inserted"><ins><em>doing 
work to support them. If it doesn't want to do
+    this work, it should let users do</em></ins></span> the <span 
class="removed"><del><strong>presence</strong></del></span> <span 
class="inserted"><ins><em>work.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606270"&gt;
-    &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
-    7 and 8 into installing all-spying Windows 10 against their
-    will, Microsoft forced their computers to &lt;a
+    &lt;p id="windows10-forcing"&gt;In its efforts to trick 
users</em></ins></span> of
+    <span class="removed"><del><strong>a &lt;a 
href="/proprietary/proprietary-back-doors.html"&gt;universal
+    back door in Windows&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Windows</em></ins></span>
+    7 and <span class="removed"><del><strong>8.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Windows</strong></del></span> <span 
class="inserted"><ins><em>8 into installing all-spying 
Windows</em></ins></span> 10 <span 
class="removed"><del><strong>&ldquo;upgrades&rdquo; &lt;a
+      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
+      delete applications&lt;/a&gt; without asking 
permission.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>against their
+    will,</em></ins></span> Microsoft <span class="removed"><del><strong>is 
&lt;a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
+  repeatedly nagging many users</strong></del></span> <span 
class="inserted"><ins><em>forced their computers</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
-    silently download&hellip; the whole of Windows 10&lt;/a&gt;! Apparently,
-    this was done through a &lt;a
-    href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
+    silently download&hellip; the whole of</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+Microsoft</strong></del></span> <span class="inserted"><ins><em>10&lt;/a&gt;! 
Apparently,
+    this</em></ins></span> was <span class="removed"><del><strong>for 
months</strong></del></span> <span class="inserted"><ins><em>done through 
a</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update"&gt;
+tricking users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#windows-update"&gt;
     universal back door&lt;/a&gt;. Not only did the unwanted downloads &lt;a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/"&gt;
     jeopardize important operations in regions of the world with poor
@@ -378,64 +400,39 @@
   &lt;/li&gt;
 
   &lt;li id="M201606010"&gt;
-    &lt;p&gt;Once Microsoft has tricked a user
-    into accepting installation of Windows 10, &lt;a
+    &lt;p&gt;Once Microsoft has tricked a user</em></ins></span>
+    into <span class="removed"><del><strong>&ldquo;upgrading&rdquo; 
to</strong></del></span> <span class="inserted"><ins><em>accepting installation 
of</em></ins></span> Windows <span class="removed"><del><strong>10&lt;/a&gt;, 
if</strong></del></span> <span class="inserted"><ins><em>10, &lt;a
     
href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-    find that they are denied the option to cancel or even 
postpone</em></ins></span> the
-  <span class="removed"><del><strong>users</strong></del></span>
-    <span class="inserted"><ins><em>imposed date</em></ins></span> of <span 
class="removed"><del><strong>free</strong></del></span> <span 
class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This demonstrates what we've said for years: using 
proprietary</em></ins></span>
-    software <span class="inserted"><ins><em>means letting 
someone</em></ins></span> have <span 
class="removed"><del><strong>control</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> over <span 
class="removed"><del><strong>it.  If it is important
-  enough to</strong></del></span> you, <span 
class="removed"><del><strong>you</strong></del></span> and <span 
class="removed"><del><strong>other users can hire someone to support
-  the old version on your future platforms.
-  &lt;/p&gt;&lt;/li&gt;
+    find that</em></ins></span> they
+<span class="removed"><del><strong>failed</strong></del></span> <span 
class="inserted"><ins><em>are denied the option</em></ins></span> to <span 
class="removed"><del><strong>notice and say no.
+&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft
-    is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
-    forcibly pushing Windows
-    update</strong></del></span> <span class="inserted"><ins><em>you're 
going</em></ins></span>
-    to <span class="removed"><del><strong>its version 10&lt;/a&gt;, ignoring 
the flag on Windows 7</strong></del></span> <span class="inserted"><ins><em>get 
screwed sooner</em></ins></span> or <span class="removed"><del><strong>8
-    that you could set</strong></del></span> <span 
class="inserted"><ins><em>later.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;
+  Microsoft informs</strong></del></span> <span 
class="inserted"><ins><em>cancel or even postpone</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span>
+    <span class="inserted"><ins><em>imposed date</em></ins></span> of <span 
class="removed"><del><strong>bugs in Windows before fixing 
them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>installation&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This demonstrates what we've said for years: using proprietary
+    software means letting someone have power over you, and you're going
+    to get screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601310"&gt;
     &lt;p&gt;FTDI's proprietary driver
-    for its USB-to-serial chips has been designed</em></ins></span> to <span 
class="removed"><del><strong>not upgrade.  This reaffirms the presence of
-    a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;universal
-    back door in Windows&lt;/a&gt; 7 and 8.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Windows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
+    for its USB-to-serial chips has been designed to &lt;a
+    
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/"&gt;sabotage
     alternative compatible chips&lt;/a&gt;
-    so that they no longer work. Microsoft is &lt;a
+    so that they no longer work.</em></ins></span> Microsoft <span 
class="inserted"><ins><em>is &lt;a
     
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again"&gt;installing
     this automatically&lt;/a&gt; as an &ldquo;upgrade&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511240"&gt;
-    &lt;p&gt;Windows</em></ins></span> 10 &ldquo;upgrades&rdquo; &lt;a
+    &lt;p&gt;Windows 10 &ldquo;upgrades&rdquo; &lt;a
     
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
-    delete applications&lt;/a&gt; without asking <span 
class="removed"><del><strong>permission.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;
-  Microsoft is &lt;a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1"&gt;
-  repeatedly nagging many users to install Windows 10&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Microsoft was for months &lt;a
-href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update"&gt;
-tricking users into &ldquo;upgrading&rdquo; to Windows 10&lt;/a&gt;, if they
-failed to notice and say no.
-&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a
-href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;
-  Microsoft informs the NSA of bugs in Windows before fixing 
them.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/"&gt;
-  Microsoft</strong></del></span> <span 
class="inserted"><ins><em>permission.&lt;/p&gt;
+    delete applications&lt;/a&gt; without asking permission.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201503260"&gt;
@@ -465,20 +462,13 @@
 
 &lt;h3 <span class="removed"><del><strong>id="interference"&gt;Microsoft 
Interference&lt;/h3&gt;
 
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</strong></del></span> <span 
class="inserted"><ins><em>id="subscriptions"&gt;Microsoft 
Subscriptions&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up</strong></del></span> 
<span class="inserted"><ins><em>id="subscriptions"&gt;Microsoft 
Subscriptions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-subscript --&gt;
   &lt;li id="M201507150"&gt;
     &lt;p&gt;Microsoft Office forces users &lt;a
     
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
-    subscribe</em></ins></span> to <span class="removed"><del><strong>qualify 
-for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-
-&lt;li&gt;In order</strong></del></span> <span 
class="inserted"><ins><em>Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
+    subscribe to Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -486,55 +476,60 @@
 &lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-surv --&gt;
   &lt;li id="M201710134"&gt;
-    &lt;p&gt;Windows 10 telemetry program sends information</em></ins></span> 
to <span class="removed"><del><strong>increase Windows 10's install 
base,</strong></del></span> Microsoft
-<span class="removed"><del><strong>&lt;a
+    &lt;p&gt;Windows 10 telemetry program sends information to Microsoft 
about</em></ins></span>
+    the user's <span class="removed"><del><strong>system. They are like 
sabotage, but they are not grave enough to qualify</strong></del></span> <span 
class="inserted"><ins><em>computer and their use of the computer.&lt;/p&gt;
+
+    &lt;p&gt;Furthermore,</em></ins></span> for <span 
class="inserted"><ins><em>users who installed</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples</strong></del></span>
+    <span class="inserted"><ins><em>fourth stable build</em></ins></span> of 
<span class="removed"><del><strong>Microsoft committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;In order to increase</strong></del></span> Windows <span 
class="removed"><del><strong>10's install base, Microsoft
+&lt;a
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice</strong></del></span> <span 
class="inserted"><ins><em>about
-    the user's computer</em></ins></span> and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.
+blatantly disregards user choice and privacy&lt;/a&gt;.
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;Microsoft has
-started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging</strong></del></span>
 <span class="inserted"><ins><em>their use of the computer.&lt;/p&gt;
-
-    &lt;p&gt;Furthermore, for</em></ins></span> users <span 
class="removed"><del><strong>obnoxiously and repeatedly to install Windows 
10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+started &lt;a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;nagging
+users obnoxiously and repeatedly to install</strong></del></span> <span 
class="inserted"><ins><em>10, called the
+    &ldquo;Creators Update,&rdquo;</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft
       &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
         tricking
-        users&lt;/a&gt; &lt;a
-href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
-into replacing Windows 7 with</strong></del></span> <span 
class="inserted"><ins><em>who installed the
-    fourth stable build of</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Microsoft has made companies'</strong></del></span> <span 
class="inserted"><ins><em>10, called the
-    &ldquo;Creators Update,&rdquo;</em></ins></span> Windows <span 
class="removed"><del><strong>machines managed by</strong></del></span> <span 
class="inserted"><ins><em>maximized</em></ins></span> the
+        users&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>maximized the surveillance</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
+into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines 
managed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;</em></ins></span>
+    by <span class="inserted"><ins><em>force setting</em></ins></span> the
 <span class="removed"><del><strong>company's
-sysadmins</strong></del></span> <span 
class="inserted"><ins><em>surveillance</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
-users to complain to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
-    by force setting</em></ins></span> the <span 
class="removed"><del><strong>sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>telemetry mode</em></ins></span> to <span 
class="inserted"><ins><em>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
+sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
+users</strong></del></span> <span class="inserted"><ins><em>telemetry 
mode</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The &lt;a
     
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
-    &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows 
Microsoft</em></ins></span> Windows
-<span class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
-
-&lt;ul&gt;
-
-&lt;li&gt;&lt;p&gt;By</strong></del></span>
-    <span class="inserted"><ins><em>engineers to access, among other things, 
registry keys &lt;a
+    &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
+    engineers</em></ins></span> to <span class="removed"><del><strong>the 
sysadmins about not &ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>access, among other things, registry keys &lt;a
     href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
     can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702020"&gt;
-    &lt;p&gt;DRM-restricted files can be used to &lt;a
+    &lt;p&gt;DRM-restricted files can be used</em></ins></span> to <span 
class="removed"><del><strong>Windows
+10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Microsoft Surveillance&lt;/h3&gt;
+
+&lt;ul&gt;
+
+&lt;li&gt;&lt;p&gt;By</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;
     identify people browsing through Tor&lt;/a&gt;. The vulnerability exists
     only if you use Windows.&lt;/p&gt;
@@ -583,33 +578,40 @@
     &lt;p&gt;To use proprietary software is to invite such <span 
class="removed"><del><strong>treatment.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
-  &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;
-  Windows 10 comes with 13 screens of snooping options&lt;/a&gt;, all enabled 
by default,
-  and turning them off would be daunting to most users.&lt;/p&gt;&lt;/li&gt;
+  &lt;a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security"&gt;</strong></del></span>
 <span class="inserted"><ins><em>treatment.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;
-  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
-  ships with default settings that show no regard for the
-  privacy of its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo;
-  to snoop on the users' files, text input, voice input,
-  location info, contacts, calendar records and web browsing
-  history, as well as automatically connecting the machines to open
-  hotspots and showing targeted ads.&lt;/p&gt;
-
-  &lt;p&gt;We can suppose Microsoft look at users' files for the US government 
on
-  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
-  look at users' files for the Chinese government on 
demand?&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201508130"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
+    Windows 10 <span class="removed"><del><strong>comes with 13 screens of 
snooping options&lt;/a&gt;, all enabled by default,
+  and turning them off would be daunting</strong></del></span> <span 
class="inserted"><ins><em>sends identifiable information</em></ins></span> to 
<span class="removed"><del><strong>most users.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;
-  &lt;a</strong></del></span> <span 
class="inserted"><ins><em>treatment.&lt;/p&gt;
+  Windows</strong></del></span> <span 
class="inserted"><ins><em>Microsoft&lt;/a&gt;, even if
+    a user turns off its Bing search and Cortana features, and activates
+    the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201508130"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
-    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
-    a user turns off its Bing search and Cortana features, and activates
-    the privacy-protection <span 
class="removed"><del><strong>settings.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201507300"&gt;
+    &lt;p&gt;Windows</em></ins></span> 10 &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</em></ins></span>
+    ships with default settings that show no regard for the privacy of
+    its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
+    the users' files, text input, voice input, location info, contacts,
+    calendar records and web browsing history, as well as automatically
+    connecting the machines to open hotspots and showing targeted 
ads.&lt;/p&gt;
+
+    &lt;p&gt;We can suppose Microsoft look at users' files for the US 
government
+    on demand, though the &ldquo;privacy policy&rdquo; does not <span 
class="removed"><del><strong>explicit</strong></del></span> <span 
class="inserted"><ins><em>explicitly</em></ins></span>
+    say so. Will it look at users' files for the Chinese government
+    on <span class="removed"><del><strong>demand?&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+  Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if a 
user
+  turns off its Bing search and Cortana features, and activates the
+  privacy-protection settings.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;The unique &ldquo;advertising ID&rdquo; for each user 
enables other companies to
   track the browsing of each specific user.&lt;/p&gt;&lt;/li&gt;
@@ -621,29 +623,17 @@
   &lt;a href="http://www.marketoracle.co.uk/Article40836.html"&gt;
   secret NSA key in Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>settings.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201507300"&gt;
-    &lt;p&gt;Windows 10</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
-    ships with default settings that show no regard for the privacy of
-    its users&lt;/a&gt;, giving</em></ins></span> Microsoft <span 
class="removed"><del><strong>SkyDrive allows</strong></del></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;right&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>directly examine</strong></del></span> <span 
class="inserted"><ins><em>snoop on
-    the</em></ins></span> users' <span 
class="removed"><del><strong>data.&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;
+  &lt;a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
+  Microsoft SkyDrive allows the NSA to directly examine users' 
data.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.</strong></del></span>
 <span class="inserted"><ins><em>files, text input, voice input, location info, 
contacts,
-    calendar records and web browsing history, as well as automatically
-    connecting the machines to open hotspots and showing targeted 
ads.&lt;/p&gt;
-
-    &lt;p&gt;We can suppose</em></ins></span> Microsoft <span 
class="removed"><del><strong>changed Skype
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
       &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span class="inserted"><ins><em>look 
at users' files</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the US government
-    on demand, though the &ldquo;privacy policy&rdquo; does not explicitly
-    say so. Will it look at users' files for the Chinese government
-    on demand?&lt;/p&gt;</em></ins></span>
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>demand?&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
@@ -721,7 +711,6 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown"&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-jail --&gt;
   &lt;li id="M201706130"&gt;
     &lt;p&gt;Windows 10 S was a jail: &lt;a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;
@@ -750,7 +739,6 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft-tyrant --&gt;
   &lt;li id="M201607150"&gt;</em></ins></span>
     &lt;p&gt;Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has &lt;a
@@ -834,7 +822,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/10 07:58:35 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- po/malware-microsoft.ru-en.html     11 Oct 2018 06:59:25 -0000      1.59
+++ po/malware-microsoft.ru-en.html     17 Oct 2018 10:01:35 -0000      1.60
@@ -67,7 +67,6 @@
 <h3 id="back-doors">Microsoft Back Doors</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-back-door -->
   <li id="M201608172">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
@@ -126,7 +125,6 @@
 <h3 id="drm">Microsoft DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-dr -->
   <li id="M200708131">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
@@ -146,7 +144,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-insec -->
   <li id="M201705120">
     <p>Exploits of bugs in Windows, which were developed by the NSA
     and then leaked by the Shadowbrokers group, are now being used to <a
@@ -180,7 +177,6 @@
 section describes examples of Microsoft committing interference.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-interf -->
   <li id="M201809120">
     <p>One version of Windows 10 <a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
@@ -261,7 +257,6 @@
 actions that harm the users of specific Microsoft software.</p>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-sab -->
   <li id="M201704194">
     <p>Microsoft has made Windows 7
     and 8 cease to function on certain new computers, <a
@@ -353,7 +348,6 @@
 <h3 id="subscriptions">Microsoft Subscriptions</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-subscript -->
   <li id="M201507150">
     <p>Microsoft Office forces users <a
     
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html";>to
@@ -365,7 +359,6 @@
 <h3 id="surveillance">Microsoft Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-surv -->
   <li id="M201710134">
     <p>Windows 10 telemetry program sends information to Microsoft about
     the user's computer and their use of the computer.</p>
@@ -513,7 +506,6 @@
 <h3 id="jails">Microsoft Jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-jail -->
   <li id="M201706130">
     <p>Windows 10 S was a jail: <a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
@@ -539,7 +531,6 @@
 <h3 id="tyrants">Microsoft Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft-tyrant -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -617,7 +608,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-mobiles.de-diff.html     9 Oct 2018 13:30:41 -0000       1.11
+++ po/malware-mobiles.de-diff.html     17 Oct 2018 10:01:35 -0000      1.12
@@ -69,42 +69,52 @@
 to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The</strong></del></span>
 <span class="inserted"><ins><em>&lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="phone-communications"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li&gt;&lt;p&gt;The phone network
-    &lt;a href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201502100"&gt;
+    &lt;p&gt;The</em></ins></span> phone network &lt;a
+    href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
       tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
+
     &lt;p&gt;This is inherent in the design of the phone network: as long as
       the phone is in communication with the network, there is no way
       to stop the network from recording its location.  Many countries
       (including the US and the EU) require the network to store all
       these location data for months or years.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p id="universal-back-door"&gt;Almost every phone's 
communication processor has
-      a universal back door which
-      is &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-      often used to make a phone transmit all conversations it
- hears&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The back
-      door &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311121"&gt;
+    &lt;p id="universal-back-door"&gt;
+    Almost</em></ins></span> every phone's communication processor has
+    a universal back door which is &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often used to make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The back door &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
       may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
       The choice to leave the security holes in place is morally
       equivalent to writing a back door.&lt;/p&gt;
+
     &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
       job is to communicate with the radio network.  In most phones,
       the modem processor controls the microphone.  In most phones it
       has the power to rewrite the software for the main processor
       too.&lt;/p&gt;
+
     &lt;p&gt;A few phone models are specially designed so that the modem
       processor does not control the microphone, and so that it can't
       change the software in the main processor.  They still have the
       back door, but at least it is unable to turn the phone unto a
       listening device.&lt;/p&gt;
-    &lt;p&gt;The universal back door is apparently also used to make phones
-      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+
+    &lt;p&gt;The universal back door is apparently also used to make phones 
&lt;a
+    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
       transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
       are tracked, and may also make the listening feature work.&lt;/p&gt;
   &lt;/li&gt;
@@ -151,7 +161,6 @@
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-back-door --&gt;
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
@@ -209,7 +218,6 @@
 &lt;h3 id="drm"&gt;Mobile DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-dr --&gt;
   &lt;li id="M201501030"&gt;
     &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
   forcibly and remotely install apps&lt;/a&gt; through</strong></del></span>
@@ -244,7 +252,6 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-insec --&gt;
   &lt;li id="M201807100"&gt;</em></ins></span>
     &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a 
<span 
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
@@ -321,49 +328,40 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The Sarahah app 
       &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note</strong></del></span>
+      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607290"&gt;
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-    WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be recovered
-    in various ways.&lt;/p&gt;
+    WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be 
recovered</em></ins></span>
+    in <span class="removed"><del><strong>user's</strong></del></span> <span 
class="inserted"><ins><em>various ways.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201607280"&gt;
     &lt;p&gt;A half-blind security critique of a tracking app: it found that 
&lt;a
     
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
     blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
-    The critique fails entirely to express concern</em></ins></span> that 
<span class="removed"><del><strong>this article misuses</strong></del></span> 
the <span class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>app 
sends the
-    personal data</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
server, where the &lt;em&gt;developer&lt;/em&gt; gets it all.
+    The critique fails entirely to express concern that the app sends the
+    personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
     This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
     &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely
-    it is worthless since nearly all of them are.&lt;/p&gt;</em></ins></span>
+    it is worthless since nearly all of them are.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some 
portable</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;
+  &lt;li id="M201607190"&gt;
     &lt;p&gt;A bug in a proprietary ASN.1 library, used
-    in cell phone towers as well as cell</em></ins></span> phones <span 
class="inserted"><ins><em>and routers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
-    taking control</em></ins></span> of <span class="inserted"><ins><em>those 
systems&lt;/a&gt;.&lt;/p&gt;
+    in cell phone towers as well as cell phones and routers, &lt;a
+    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
+    taking control of those systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603100"&gt;
     &lt;p&gt;Many proprietary payment apps &lt;a
     
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit
-    personal</em></ins></span> data <span class="removed"><del><strong>to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>in an insecure way&lt;/a&gt;. 
However,</em></ins></span>
-    the <span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not
+    personal data in an insecure way&lt;/a&gt;. However,
+    the worse aspect of these apps is that &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not
     anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -371,9 +369,9 @@
     &lt;p&gt;&lt;a
     
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
     Many smartphone apps use insecure authentication methods when storing
-    your personal data</em></ins></span> on <span 
class="removed"><del><strong>what people</strong></del></span> <span 
class="inserted"><ins><em>remote servers&lt;/a&gt;. This leaves personal
+    your personal data on remote servers&lt;/a&gt;. This leaves personal
     information like email addresses, passwords, and health information
-    vulnerable. Because many of these apps</em></ins></span> are <span 
class="removed"><del><strong>listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>proprietary</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>makes it
+    vulnerable. Because many of these apps are proprietary it makes it
     hard to impossible to know which apps are at risk.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -384,11 +382,10 @@
     deactivated by its developer&lt;/a&gt; which had discovered a security
     flaw.&lt;/p&gt;
 
-    &lt;p&gt;That developer seems to</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span 
class="inserted"><ins><em>conscientious about protecting personal
+    &lt;p&gt;That developer seems to be conscientious about protecting personal
     data from third parties in general, but it can't protect that data
-    from the state.  Quite the contrary: confiding your data</em></ins></span> 
to <span class="removed"><del><strong>serve them</strong></del></span> <span 
class="inserted"><ins><em>someone
-    else's server, if not first encrypted by you</em></ins></span> with <span 
class="removed"><del><strong>targeted
-  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>free software,
+    from the state.  Quite the contrary: confiding your data to someone
+    else's server, if not first encrypted by you with free software,
     undermines your rights.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -415,7 +412,6 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-surv --&gt;
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
@@ -487,8 +483,8 @@
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article misuses the words
+    uploads all phone numbers and email addresses&lt;/a&gt; in 
user's</em></ins></span> address
+    book to <span class="removed"><del><strong>developer's server.  
Note</strong></del></span> <span class="inserted"><ins><em>developer's server.  
Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -555,16 +551,24 @@
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    &lt;p&gt;The suit accuses</em></ins></span> that this <span 
class="removed"><del><strong>article misuses</strong></del></span> <span 
class="inserted"><ins><em>was done without</em></ins></span> the <span 
class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>users' 
consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="inserted"><ins><em>Android apps can collude
+    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -572,14 +576,15 @@
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
+    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
+    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
+  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -588,23 +593,24 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611280"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
+  &lt;li id="M201611160"&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -637,7 +643,8 @@
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and 
<span class="removed"><del><strong>may turn them over to the UK government if
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores <span 
class="removed"><del><strong>detailed logs
+      and may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -690,8 +697,8 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-      <span class="inserted"><ins><em>may turn them over to</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>detailed logs and
+      may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
@@ -735,7 +742,8 @@
     scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
     and <span class="removed"><del><strong>location 
tracking,</strong></del></span> <span 
class="inserted"><ins><em>suggests</em></ins></span> you <span 
class="removed"><del><strong>must
   disable Google Play itself</strong></del></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
-  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey the user,
+  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>who is
+    in</em></ins></span> the <span class="removed"><del><strong>user,
   when it's actually doing something else.  Such a thing would be almost
   unthinkable with free software.&lt;/p&gt;
 
@@ -743,24 +751,23 @@
 &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
         announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
+        pre-install on</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access 
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The 
app will give Verizon the same
+   information about</strong></del></span>
+    <span class="inserted"><ins><em>known-faces database, which 
means</em></ins></span> the <span class="removed"><del><strong>users' searches 
that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>who</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span class="inserted"><ins><em>in</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>pictures are likely to be
-    sent across</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
+    sent across</em></ins></span> the <span class="removed"><del><strong>app 
is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> 
and <span class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; them 
to</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu 
photo-editing</strong></del></span>
 
@@ -919,16 +926,16 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some Motorola phones 
modify</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>apps (but not</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-  send personal data</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect</em></ins></span> to <span 
class="removed"><del><strong>Motorola.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android <span 
class="removed"><del><strong>to &lt;a
+  href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+  send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span> <span 
class="inserted"><ins><em>100</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-  hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a &lt;a
+  
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
     and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1036,7 +1043,6 @@
   devices that come with</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-jail --&gt;
   &lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
@@ -1055,7 +1061,6 @@
   the restriction). Fortunately, most Android</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-tyrant --&gt;
   &lt;li id="M201110110"&gt;
     &lt;p&gt;&lt;a 
href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
     Mobile</em></ins></span> devices <span class="inserted"><ins><em>that come 
with Windows 8</em></ins></span> are <span class="removed"><del><strong>not 
tyrants.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>tyrants&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -1121,7 +1126,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- po/malware-mobiles.fr-en.html       9 Oct 2018 13:30:41 -0000       1.39
+++ po/malware-mobiles.fr-en.html       17 Oct 2018 10:01:35 -0000      1.40
@@ -57,40 +57,48 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
 
 <ul class="blurbs">
-  <li><p>The phone network
-    <a href="https://ssd.eff.org/en/module/problem-mobile-phones";>
+  <li id="M201502100">
+    <p>The phone network <a
+    href="https://ssd.eff.org/en/module/problem-mobile-phones";>
       tracks the movements of each phone</a>.</p>
+
     <p>This is inherent in the design of the phone network: as long as
       the phone is in communication with the network, there is no way
       to stop the network from recording its location.  Many countries
       (including the US and the EU) require the network to store all
       these location data for months or years.</p>
   </li>
-  <li><p id="universal-back-door">Almost every phone's communication processor 
has
-      a universal back door which
-      is <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-      often used to make a phone transmit all conversations it
- hears</a>.</p>
-    <p>The back
-      door <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+
+  <li id="M201311121">
+    <p id="universal-back-door">
+    Almost every phone's communication processor has
+    a universal back door which is <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+    often used to make a phone transmit all conversations it hears</a>.</p>
+
+    <p>The back door <a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
       may take the form of bugs that have gone 20 years unfixed</a>.
       The choice to leave the security holes in place is morally
       equivalent to writing a back door.</p>
+
     <p>The back door is in the &ldquo;modem processor&rdquo;, whose
       job is to communicate with the radio network.  In most phones,
       the modem processor controls the microphone.  In most phones it
       has the power to rewrite the software for the main processor
       too.</p>
+
     <p>A few phone models are specially designed so that the modem
       processor does not control the microphone, and so that it can't
       change the software in the main processor.  They still have the
       back door, but at least it is unable to turn the phone unto a
       listening device.</p>
-    <p>The universal back door is apparently also used to make phones
-      <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
+
+    <p>The universal back door is apparently also used to make phones <a
+    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
       transmit even when they are turned off</a>.  This means their movements
       are tracked, and may also make the listening feature work.</p>
   </li>
@@ -127,7 +135,6 @@
 </ul>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
   <li id="M201609130">
     <p>Xiaomi phones come with <a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered";>
@@ -170,7 +177,6 @@
 <h3 id="drm">Mobile DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-dr -->
   <li id="M201501030">
     <p id="netflix-app-geolocation-drm">The Netflix Android app <a
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
@@ -189,7 +195,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-insec -->
   <li id="M201807100">
     <p>Siri, Alexa, and all the other voice-control systems can be <a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
@@ -322,7 +327,6 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-surv -->
   <li id="M201806110">
     <p>The Spanish football streaming app <a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>tracks
@@ -765,7 +769,6 @@
 <h3 id="jails">Mobile Jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-jail -->
   <li id="M201210080">
     <p><a
     
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
@@ -778,7 +781,6 @@
 <h3 id="tyrants">Mobile Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
   <li id="M201110110">
     <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
     Mobile devices that come with Windows 8 are tyrants</a>.</p>
@@ -843,7 +845,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/malware-mobiles.it-diff.html     9 Oct 2018 13:30:41 -0000       1.16
+++ po/malware-mobiles.it-diff.html     17 Oct 2018 10:01:35 -0000      1.17
@@ -83,142 +83,145 @@
 &lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;The universal back door</strong></del></span> <span 
class="inserted"><ins><em>Apple or Google (including its subsidiaries).
-Malicious functionalities</em></ins></span> in <span 
class="removed"><del><strong>portable phones
-      &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-        is employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;Most</strong></del></span> mobile <span 
class="removed"><del><strong>phones have this universal back door, which has 
been
-      used to</strong></del></span> <span class="inserted"><ins><em>software 
released by Apple or
-Google are listed in dedicated pages,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-       turn them malicious&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;More about</strong></del></span>
+Malicious functionalities</em></ins></span> in <span 
class="removed"><del><strong>portable phones</strong></del></span> <span 
class="inserted"><ins><em>mobile software released by Apple or
+Google are listed in dedicated pages,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+        is employed</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple's 
Operating Systems are
-Malware&lt;/a&gt; and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google's
+Malware&lt;/a&gt; and &lt;a href="/proprietary/malware-google.html"&gt;Google's
 Software Is Malware&lt;/a&gt; respectively.&lt;/p&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>this problem&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Most mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>be in</em></ins></span> this <span 
class="removed"><del><strong>universal back door, which has been
+      used</strong></del></span> <span class="inserted"><ins><em>page but isn't
+here, please write</em></ins></span>
+to &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+       turn them malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL</em></ins></span> of <span 
class="removed"><del><strong>this problem&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-  Samsung Galaxy devices running proprietary Android versions come with a
-  back door&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>an 
example</em></ins></span> that <span class="removed"><del><strong>provides 
remote access</strong></del></span> <span 
class="inserted"><ins><em>ought</em></ins></span> to <span 
class="removed"><del><strong>the data stored on the
-  device.&lt;/p&gt;
+  Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span> a
+  <span class="removed"><del><strong>back door&lt;/a&gt; that provides remote 
access</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
+to <span class="inserted"><ins><em>present</em></ins></span> the <span 
class="removed"><del><strong>data stored on</strong></del></span> <span 
class="inserted"><ins><em>specifics.&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;div class="column-limit" id="phone-communications"&gt;&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201502100"&gt;
+    &lt;p&gt;The phone network &lt;a
+    href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
+    tracks</em></ins></span> the
+  <span class="removed"><del><strong>device.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-  Samsung's back door&lt;/a&gt; provides access</strong></del></span> <span 
class="inserted"><ins><em>be in this page but isn't
-here, please write</em></ins></span>
-to <span class="removed"><del><strong>any file on the system.&lt;/p&gt;
+  Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span> <span class="inserted"><ins><em>movements of each 
phone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is inherent in</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-  &lt;p&gt;In Android,</strong></del></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-  Google has</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>back door</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
-to <span class="removed"><del><strong>remotely delete apps&lt;/a&gt; 
(it</strong></del></span> <span class="inserted"><ins><em>present the 
specifics.&lt;/p&gt;
-&lt;/div&gt;
-&lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li&gt;&lt;p&gt;The phone network
-    &lt;a href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
-      tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;This</em></ins></span> is <span 
class="inserted"><ins><em>inherent</em></ins></span> in <span 
class="removed"><del><strong>a program
+  &lt;p&gt;In Android, &lt;a
+  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+  Google has a back door to remotely delete apps&lt;/a&gt; 
(it</strong></del></span> <span class="inserted"><ins><em>design of the phone 
network: as long as
+    the phone</em></ins></span> is in <span class="removed"><del><strong>a 
program
   called GTalkService).
   &lt;/p&gt;
 
 &lt;p&gt;Google can also &lt;a
 
href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
-title="at</strong></del></span> the <span class="removed"><del><strong>Wayback 
Machine (archived May 20, 2015)"&gt;forcibly and remotely
+title="at</strong></del></span> <span class="inserted"><ins><em>communication 
with</em></ins></span> the <span class="removed"><del><strong>Wayback Machine 
(archived May 20, 2015)"&gt;forcibly and remotely
 install apps&lt;/a&gt; through GTalkService (which seems, since that article, 
to have
-been merged into Google Play).  This adds up to a universal back door. 
&lt;/p&gt;
+been merged into Google Play).  This adds up</strong></del></span> <span 
class="inserted"><ins><em>network, there is no way
+    to stop the network from recording its location.  Many countries
+    (including the US and the EU) require the network</em></ins></span> to 
<span class="inserted"><ins><em>store all
+    these location data for months or years.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311121"&gt;
+    &lt;p id="universal-back-door"&gt;
+    Almost every phone's communication processor has</em></ins></span>
+    a universal back <span class="removed"><del><strong>door. &lt;/p&gt;
 
   &lt;p&gt;
-  Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span> of <span 
class="removed"><del><strong>this power has not been
-  malicious so far,</strong></del></span> the <span 
class="removed"><del><strong>point</strong></del></span> <span 
class="inserted"><ins><em>phone network: as long as
-      the phone</em></ins></span> is <span class="removed"><del><strong>that 
nobody should have such power,
-  which could also be used maliciously.  You might well decide to let a
-  security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
-  considers malicious.  But</strong></del></span> <span 
class="inserted"><ins><em>in communication with the network,</em></ins></span> 
there is no <span class="removed"><del><strong>excuse for allowing 
it</strong></del></span> <span class="inserted"><ins><em>way</em></ins></span>
-      to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>stop</em></ins></span> the <span 
class="removed"><del><strong>programs, and you should 
have</strong></del></span> <span class="inserted"><ins><em>network from 
recording its location.  Many countries
-      (including</em></ins></span> the <span 
class="removed"><del><strong>right to
-  decide who (if anyone) to trust in this way.
+  Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+  malicious so far, the point is that nobody should have such 
power,</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span> which <span 
class="removed"><del><strong>could also be</strong></del></span> <span 
class="inserted"><ins><em>is &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often</em></ins></span> used <span 
class="removed"><del><strong>maliciously.  You might well 
decide</strong></del></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> a
+  <span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
+  considers malicious.  But there is no excuse for 
allowing</strong></del></span> <span class="inserted"><ins><em>phone transmit 
all conversations</em></ins></span> it
+  <span class="removed"><del><strong>to 
&lt;em&gt;delete&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>hears&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The back door &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    may take</em></ins></span> the <span 
class="removed"><del><strong>programs, and you should</strong></del></span> 
<span class="inserted"><ins><em>form of bugs that</em></ins></span> have <span 
class="removed"><del><strong>the right</strong></del></span> <span 
class="inserted"><ins><em>gone 20 years unfixed&lt;/a&gt;.
+    The choice</em></ins></span> to
+  <span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span> <span class="inserted"><ins><em>leave the 
security holes in place is morally
+    equivalent</em></ins></span> to <span 
class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>writing a back door.&lt;/p&gt;
+
+    &lt;p&gt;The back door is</em></ins></span> in <span 
class="removed"><del><strong>this way.
   &lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike</strong></del></span> 
<span class="inserted"><ins><em>US and</em></ins></span> the <span 
class="removed"><del><strong>rest of</strong></del></span> <span 
class="inserted"><ins><em>EU) require</em></ins></span> the <span 
class="removed"><del><strong>file
-  they do not count as malware. We mention them</strong></del></span> <span 
class="inserted"><ins><em>network</em></ins></span> to <span 
class="removed"><del><strong>refute the
-  supposition that prestigious proprietary software doesn't have grave
+&lt;p&gt;These bugs are/were not intentional, so unlike</strong></del></span> 
the <span class="removed"><del><strong>rest of</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;modem processor&rdquo;, whose
+    job is to communicate with</em></ins></span> the <span 
class="removed"><del><strong>file
+  they do not count as malware. We mention them</strong></del></span> <span 
class="inserted"><ins><em>radio network.  In most phones,
+    the modem processor controls the microphone.  In most phones it
+    has the power</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>rewrite</em></ins></span> the
+  <span class="removed"><del><strong>supposition that prestigious 
proprietary</strong></del></span> software <span 
class="removed"><del><strong>doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Siri, Alexa, and</strong></del></span> <span 
class="inserted"><ins><em>store</em></ins></span> all <span 
class="removed"><del><strong>the other voice-control systems can be
-  &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs that play commands in ultrasound that humans can't hear&lt;/a&gt;.
-  &lt;/p&gt;</strong></del></span>
-      <span class="inserted"><ins><em>these location data for months or 
years.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  &lt;p&gt;Siri, Alexa, and all</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> the <span 
class="removed"><del><strong>other voice-control systems can be
+  &lt;a 
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;hijacked
 by programs</strong></del></span> <span class="inserted"><ins><em>main 
processor
+    too.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A few phone models are specially designed so</em></ins></span> 
that <span class="removed"><del><strong>play commands in 
ultrasound</strong></del></span> <span class="inserted"><ins><em>the modem
+    processor does not control the microphone, and so</em></ins></span> that 
<span class="removed"><del><strong>humans</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> can't <span 
class="removed"><del><strong>hear&lt;/a&gt;.
+  &lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
   &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-       can be hijacked through their Wi-Fi chips&lt;/a&gt; because 
of</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost every phone's communication processor 
has</em></ins></span>
-      a <span class="removed"><del><strong>bug in
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
        Broadcom's non-free firmware.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Samsung
-phones</strong></del></span> <span class="inserted"><ins><em>universal back 
door which
-      is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
-a security hole that allows an SMS message</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-      often used</em></ins></span> to <span 
class="removed"><del><strong>install
+phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
+a security hole that allows an SMS message to install
 ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Many proprietary payment apps &lt;a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;</strong></del></span>
 <span class="inserted"><ins><em>make a phone</em></ins></span> transmit <span 
class="removed"><del><strong>personal data in an insecure way&lt;/a&gt;.
-However, the worse aspect of these apps is that
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data in smart phones, including iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there is not much detail 
here,</strong></del></span> <span class="inserted"><ins><em>all 
conversations</em></ins></span> it <span class="removed"><del><strong>seems 
that this
-  does not operate via the universal</strong></del></span>
- <span class="inserted"><ins><em>hears&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The</em></ins></span> back
-      door <span class="removed"><del><strong>that we know nearly all
-  portable phones have. It may involve exploiting various bugs. There 
are</strong></del></span> &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  <span class="removed"><del><strong>lots</strong></del></span>
-      <span class="inserted"><ins><em>may take the form</em></ins></span> of 
bugs <span class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>that have gone 20 years unfixed&lt;/a&gt;.
-      The choice to leave</em></ins></span> the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span> <span class="inserted"><ins><em>security 
holes in place is morally
-      equivalent to writing a back door.&lt;/p&gt;
-    &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
-      job is to communicate with the radio network.  In most phones,
-      the modem processor controls the microphone.  In most phones it
-      has the power to rewrite the software for the main processor
-      too.&lt;/p&gt;
-    &lt;p&gt;A few phone models are specially designed so that the modem
-      processor does not control the microphone, and so that it can't
-      change the software in the main processor.  They still have the
-      back door, but at least it is unable to turn the phone unto a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data</strong></del></span>
+    <span class="inserted"><ins><em>change the software</em></ins></span> in 
<span class="removed"><del><strong>an insecure way&lt;/a&gt;.
+However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these apps</strong></del></span> <span class="inserted"><ins><em>main 
processor.  They still have the
+    back door, but at least it</em></ins></span> is <span 
class="removed"><del><strong>that
+&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;payment</strong></del></span>
 <span class="inserted"><ins><em>unable to turn the phone unto a
       listening device.&lt;/p&gt;
-    &lt;p&gt;The universal back door is apparently also used to make phones
-      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+
+    &lt;p&gt;The universal back door</em></ins></span> is <span 
class="removed"><del><strong>not anonymous&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>apparently 
also used to make phones &lt;a
+    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
       transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
-      are tracked, and may also make the listening feature work.&lt;/p&gt;
+    are tracked, and may also make the listening feature 
work.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="summary" style="margin-top: 1em"&gt;
 &lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;
@@ -227,24 +230,25 @@
 &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
   &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or &ldquo;DRM&rdquo;&mdash;functionalities designed
-    to restrict what users can do with the data in their computers.&lt;/li&gt;
+    to restrict what users</em></ins></span> can <span 
class="removed"><del><strong>tap</strong></del></span> <span 
class="inserted"><ins><em>do with the</em></ins></span> data in <span 
class="removed"><del><strong>smart phones, including iPhones, Android, and
+  BlackBerry&lt;/a&gt;. While there is not much detail here, it 
seems</strong></del></span> <span class="inserted"><ins><em>their 
computers.&lt;/li&gt;
   &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;!--&lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;--&gt;
 &lt;!--&lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;--&gt;
   &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
+  &lt;li&gt;&lt;a 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems</em></ins></span>
+    that <span class="removed"><del><strong>this
+  does</strong></del></span> <span class="inserted"><ins><em>impose censorship 
on application programs.&lt;/li&gt;
   &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system not &ldquo;authorized&rdquo; by the
-    manufacturer.&lt;/li&gt;</em></ins></span>
+    that reject any operating system</em></ins></span> not <span 
class="removed"><del><strong>operate via</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;authorized&rdquo; by the
+    manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
-<span class="inserted"><ins><em>&lt;/div&gt;</em></ins></span>
+&lt;/div&gt;
 
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Mobile 
Surveillance&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="back-doors"&gt;Mobile Back 
Doors&lt;/h3&gt;</em></ins></span>
+&lt;h3 id="back-doors"&gt;Mobile Back Doors&lt;/h3&gt;
 
 &lt;ul&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;See above for the &lt;a href="#universal-back-door"&gt;general 
universal back
       door&lt;/a&gt; in essentially all mobile phones, which permits converting
       them into full-time listening devices.&lt;/p&gt;
@@ -252,15 +256,14 @@
 &lt;/ul&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-back-door --&gt;
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
-    a universal back door in the application processor, for Xiaomi's
+    a universal back door in</em></ins></span> the <span 
class="inserted"><ins><em>application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
+    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
+    universal back door <span class="inserted"><ins><em>in the modem 
processor</em></ins></span> that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -276,8 +279,10 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
-    all models of mobile phones have a &lt;a href="#universal-back-door"&gt;
+    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
+    all
+  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>have 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots of bugs</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;
     universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
@@ -295,7 +300,6 @@
 &lt;h3 id="drm"&gt;Mobile DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-dr --&gt;
   &lt;li id="M201501030"&gt;
     &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
@@ -314,7 +318,6 @@
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-insec --&gt;
   &lt;li id="M201807100"&gt;
     &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
@@ -447,7 +450,6 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-surv --&gt;
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
@@ -575,16 +577,21 @@
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data</em></ins></span> in <span 
class="removed"><del><strong>user's address
-      book</strong></del></span> <span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal data</em></ins></span> in the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users 
listen</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note</strong></del></span>
     <span class="inserted"><ins><em>along with the headphone's unique serial 
number.&lt;/p&gt;
@@ -680,8 +687,8 @@
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
-      &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it <span 
class="removed"><del><strong>stores detailed logs
+    <span class="removed"><del><strong>&lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
       and may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
@@ -735,7 +742,10 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+
+      <span class="inserted"><ins><em>&lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
       may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -780,7 +790,8 @@
     scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
     and <span class="removed"><del><strong>location 
tracking,</strong></del></span> <span 
class="inserted"><ins><em>suggests</em></ins></span> you <span 
class="removed"><del><strong>must
   disable Google Play itself</strong></del></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
-  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey the user,
+  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>who is
+    in</em></ins></span> the <span class="removed"><del><strong>user,
   when it's actually doing something else.  Such a thing would be almost
   unthinkable with free software.&lt;/p&gt;
 
@@ -788,24 +799,22 @@
 &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
         announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
+        pre-install on</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access 
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The 
app will give Verizon the same
+   information about</strong></del></span>
+    <span class="inserted"><ins><em>known-faces database, which 
means</em></ins></span> the <span class="removed"><del><strong>users' searches 
that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>who</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span class="inserted"><ins><em>in</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>pictures are likely to be
-    sent across</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
+    sent across</em></ins></span> the <span class="removed"><del><strong>app 
is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> 
and <span class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if</em></ins></span> the user <span class="removed"><del><strong>must 
explicitly opt-in before the app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>didn't &ldquo;upload&rdquo; them 
to</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu 
photo-editing</strong></del></span>
 
@@ -964,15 +973,15 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some Motorola phones 
modify</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>apps (but not</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-  send personal data</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect</em></ins></span> to <span 
class="removed"><del><strong>Motorola.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android <span 
class="removed"><del><strong>to &lt;a
+  href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+  send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Some manufacturers add a &lt;a
   
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-  hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
+  hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
     and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1081,7 +1090,6 @@
   devices that come with</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-jail --&gt;
   &lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
@@ -1100,7 +1108,6 @@
   the restriction). Fortunately, most Android</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-tyrant --&gt;
   &lt;li id="M201110110"&gt;
     &lt;p&gt;&lt;a 
href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
     Mobile</em></ins></span> devices <span class="inserted"><ins><em>that come 
with Windows 8</em></ins></span> are <span class="removed"><del><strong>not 
tyrants.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>tyrants&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -1166,7 +1173,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/malware-mobiles.ja-diff.html     9 Oct 2018 13:30:41 -0000       1.31
+++ po/malware-mobiles.ja-diff.html     17 Oct 2018 10:01:35 -0000      1.32
@@ -100,15 +100,18 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;h3 id="back-doors"&gt;Mobile Back 
Doors&lt;/h3&gt;
-&lt;ul&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The universal back door in portable 
phones</strong></del></span>
+<span class="inserted"><ins><em>&lt;div class="column-limit" 
id="phone-communications"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
-  &lt;li&gt;&lt;p&gt;The <span class="removed"><del><strong>universal back 
door in portable phones</strong></del></span> <span 
class="inserted"><ins><em>phone network</em></ins></span>
-    &lt;a
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201502100"&gt;
+    &lt;p&gt;The phone network</em></ins></span> &lt;a
     <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed</strong></del></span> <span 
class="inserted"><ins><em>href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
+    employed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://ssd.eff.org/en/module/problem-mobile-phones"&gt;
       tracks the movements of each phone&lt;/a&gt;.&lt;/p&gt;
+
     &lt;p&gt;This is inherent in the design of the phone network: as long as
       the phone is in communication with the network, there is no 
way</em></ins></span>
       to <span class="removed"><del><strong>listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>stop the network from recording its location.  Many 
countries
@@ -117,19 +120,22 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Most mobile phones 
have</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost every phone's communication processor 
has</em></ins></span>
-      a universal back <span 
class="removed"><del><strong>door,</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span> which <span 
class="removed"><del><strong>has been</strong></del></span>
-      <span class="inserted"><ins><em>is &lt;a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+
+  <span class="inserted"><ins><em>&lt;li id="M201311121"&gt;
+    &lt;p id="universal-back-door"&gt;
+    Almost every phone's communication processor has</em></ins></span>
+    a universal back <span 
class="removed"><del><strong>door,</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span> which <span 
class="removed"><del><strong>has been</strong></del></span> <span 
class="inserted"><ins><em>is &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
       often</em></ins></span> used to <span class="removed"><del><strong>&lt;a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
   turn them malicious&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-  Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> a <span 
class="inserted"><ins><em>phone transmit all conversations it
- hears&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The</em></ins></span> back <span 
class="removed"><del><strong>door&lt;/a&gt;</strong></del></span>
-      <span class="inserted"><ins><em>door &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> a <span 
class="inserted"><ins><em>phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The</em></ins></span> back <span 
class="removed"><del><strong>door&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>door &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
       may take the form of bugs</em></ins></span> that <span 
class="removed"><del><strong>provides remote access</strong></del></span> <span 
class="inserted"><ins><em>have gone 20 years unfixed&lt;/a&gt;.
       The choice</em></ins></span> to <span 
class="inserted"><ins><em>leave</em></ins></span> the <span 
class="removed"><del><strong>data stored on the
   device.&lt;/p&gt;
@@ -144,6 +150,7 @@
   &lt;p&gt;In Android, &lt;a
   
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
   Google has</strong></del></span> <span 
class="inserted"><ins><em>writing</em></ins></span> a back <span 
class="inserted"><ins><em>door.&lt;/p&gt;
+
     &lt;p&gt;The back</em></ins></span> door <span 
class="removed"><del><strong>to remotely delete apps.&lt;/a&gt;  
(It</strong></del></span> is in <span class="removed"><del><strong>a program
   called GTalkService).
   &lt;/p&gt;
@@ -155,6 +162,7 @@
       the modem processor controls the microphone.  In most phones it
       has the power to rewrite the software for the main processor
       too.&lt;/p&gt;
+
     &lt;p&gt;A few phone models are specially designed so that the modem
       processor does not control the microphone,</em></ins></span> and <span 
class="removed"><del><strong>remotely
 install apps&lt;/a&gt; through GTalkService (which seems, 
since</strong></del></span> <span 
class="inserted"><ins><em>so</em></ins></span> that <span 
class="removed"><del><strong>article, to</strong></del></span> <span 
class="inserted"><ins><em>it can't
@@ -162,6 +170,7 @@
 <span class="removed"><del><strong>been merged into Google Play).  This adds 
up</strong></del></span> <span class="inserted"><ins><em>the
       back door, but at least it is unable</em></ins></span> to <span 
class="inserted"><ins><em>turn the phone unto</em></ins></span> a
       <span class="inserted"><ins><em>listening device.&lt;/p&gt;
+
     &lt;p&gt;The</em></ins></span> universal back <span 
class="removed"><del><strong>door. &lt;/p&gt;
 
   &lt;p&gt;
@@ -169,8 +178,8 @@
   malicious so far, the point</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span> is <span 
class="removed"><del><strong>that nobody should have such power,
   which could</strong></del></span> <span 
class="inserted"><ins><em>apparently</em></ins></span> also <span 
class="removed"><del><strong>be</strong></del></span> used <span 
class="removed"><del><strong>maliciously.  You might well decide to let a
   security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it
-  considers malicious.  But there is no excuse for allowing 
it</strong></del></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt; the 
programs,</strong></del></span> <span class="inserted"><ins><em>make phones
-      &lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+  considers malicious.  But there is no excuse for allowing 
it</strong></del></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt; the 
programs,</strong></del></span> <span class="inserted"><ins><em>make phones 
&lt;a
+    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
       transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
       are tracked,</em></ins></span> and <span 
class="removed"><del><strong>you should have</strong></del></span> <span 
class="inserted"><ins><em>may also make</em></ins></span> the <span 
class="removed"><del><strong>right to
   decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>listening feature work.&lt;/p&gt;
@@ -203,38 +212,30 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-<span class="removed"><del><strong>&lt;p&gt;Many proprietary payment apps &lt;a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data in an insecure way&lt;/a&gt;.
-However,</strong></del></span>
-    <span class="inserted"><ins><em>&lt;p&gt;See above for</em></ins></span> 
the <span class="removed"><del><strong>worse aspect of these apps is 
that</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-  The NSA can tap data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;general universal back
-      door&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>smart</strong></del></span> <span 
class="inserted"><ins><em>essentially all mobile</em></ins></span> phones, 
<span class="removed"><del><strong>including iPhones, Android, and
-  BlackBerry&lt;/a&gt;. While there</strong></del></span> <span 
class="inserted"><ins><em>which permits converting
+<span class="removed"><del><strong>&lt;p&gt;Many proprietary payment 
apps</strong></del></span>
+    <span class="inserted"><ins><em>&lt;p&gt;See above for 
the</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
+transmit personal data</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;general universal back
+      door&lt;/a&gt; in essentially all mobile phones, which permits converting
       them into full-time listening devices.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-back-door --&gt;
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
-    a universal back door in the application processor, for Xiaomi's
+    a universal back door</em></ins></span> in <span 
class="removed"><del><strong>an insecure way&lt;/a&gt;.
+However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these</strong></del></span> <span 
class="inserted"><ins><em>application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>not 
much detail here, it seems</strong></del></span> <span 
class="inserted"><ins><em>separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor</em></ins></span> that <span 
class="removed"><del><strong>this
-  does not operate via</strong></del></span> the <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>local phone
+    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor that the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has 
a</em></ins></span> back door that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
     
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
@@ -245,11 +246,9 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
-    all
-  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>have 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  lots of bugs</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;
-    universal back door</em></ins></span> in the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad bother
+    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
+    all models of mobile phones have a &lt;a href="#universal-back-door"&gt;
+    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -258,26 +257,19 @@
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
     Samsung Galaxy devices running proprietary Android versions come with
     a back door&lt;/a&gt; that provides remote access to the files stored on
-    the device.&lt;/p&gt;</em></ins></span>
+    the device.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="surveillance"&gt;Mobile 
Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-&lt;li&gt;
-&lt;p&gt;A half-blind security critique</strong></del></span> <span 
class="inserted"><ins><em>id="drm"&gt;Mobile DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;Mobile DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-dr --&gt;
   &lt;li id="M201501030"&gt;
     &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android app &lt;a
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces the use</em></ins></span> of <span class="removed"><del><strong>a 
tracking app: it found</strong></del></span> <span 
class="inserted"><ins><em>Google DNS&lt;/a&gt;. This is one of the 
methods</em></ins></span> that <span class="removed"><del><strong>&lt;a
-href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
-blatant flaws allowed anyone</strong></del></span>
-    <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span 
class="removed"><del><strong>snoop on a user's personal data&lt;/a&gt;.
-The critique fails entirely</strong></del></span> <span 
class="inserted"><ins><em>enforce the geolocation restrictions dictated by the
+    forces the use of Google DNS&lt;/a&gt;. This is one of the methods that
+    Netflix uses to enforce the geolocation restrictions dictated by the
     movie studios.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -286,14 +278,13 @@
 &lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
-  they do not count as malware. We mention them</em></ins></span> to <span 
class="removed"><del><strong>express concern</strong></del></span> <span 
class="inserted"><ins><em>refute the
-  supposition</em></ins></span> that <span 
class="inserted"><ins><em>prestigious proprietary software doesn't have grave
+  they do not count as malware. We mention them to refute the
+  supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-insec --&gt;
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all</em></ins></span> the <span 
class="removed"><del><strong>app sends</strong></del></span> <span 
class="inserted"><ins><em>other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
@@ -302,8 +293,7 @@
   &lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos to people in</em></ins></span> the
-<span class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>owner's contact list&lt;/a&gt;.&lt;/p&gt;
+    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704050"&gt;
@@ -318,9 +308,8 @@
     
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
     a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is in addition</em></ins></span> to <span 
class="inserted"><ins><em>the fact that the car contains</em></ins></span> a 
<span class="removed"><del><strong>server, where</strong></del></span> <span 
class="inserted"><ins><em>cellular
-    modem that tells big brother all</em></ins></span> the <span 
class="removed"><del><strong>&lt;em&gt;developer&lt;/em&gt; 
gets</strong></del></span> <span class="inserted"><ins><em>time 
where</em></ins></span> it <span class="removed"><del><strong>all.
-This &ldquo;service&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>is.  If you own
+    &lt;p&gt;This is in addition to the fact that the car contains a cellular
+    modem that tells big brother all the time where it is.  If you own
     such a car, it would be wise to disconnect the modem so as to turn
     off the tracking.&lt;/p&gt;
   &lt;/li&gt;
@@ -357,9 +346,9 @@
     blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
     The critique fails entirely to express concern that the app sends the
     personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
-    This &ldquo;service&rdquo;</em></ins></span> is for suckers!&lt;/p&gt;
+    This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
-    &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and <span 
class="removed"><del><strong>surely</strong></del></span> <span 
class="inserted"><ins><em>surely
+    &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely
     it is worthless since nearly all of them are.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -426,7 +415,6 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-surv --&gt;
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
@@ -637,7 +625,14 @@
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers have
+      for other</em></ins></span> apps <span class="removed"><del><strong>is 
that
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not 
anonymous&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
+  The NSA can tap data in smart phones, including iPhones, 
Android,</strong></del></span> and
+  <span class="removed"><del><strong>BlackBerry&lt;/a&gt;. While 
there</strong></del></span> <span class="inserted"><ins><em>also core system 
logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
@@ -646,34 +641,48 @@
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
-      roughly five tracking libraries. Also, it redirects the user's
+      users. The stated purpose of the JS injection</em></ins></span> is <span 
class="removed"><del><strong>not much detail here,</strong></del></span> <span 
class="inserted"><ins><em>to display ads. Uses
+      roughly five tracking libraries. Also,</em></ins></span> it <span 
class="removed"><del><strong>seems that</strong></del></span> <span 
class="inserted"><ins><em>redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this app have confirmed that
-      the non-premium version of the app does JavaScript injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
+      five tracking libraries. Developers of</em></ins></span> this <span 
class="inserted"><ins><em>app have confirmed that
+      the non-premium version of the app</em></ins></span> does <span 
class="removed"><del><strong>not operate via</strong></del></span> <span 
class="inserted"><ins><em>JavaScript injection for
+      tracking</em></ins></span> the <span 
class="removed"><del><strong>universal back door that we know nearly 
all</strong></del></span> <span class="inserted"><ins><em>user and displaying 
ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
-    
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some</em></ins></span> portable phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+    sold with spyware sending</em></ins></span> lots of <span 
class="removed"><del><strong>bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+&lt;li&gt;
+&lt;p&gt;A half-blind security critique of a tracking app: it found 
that</strong></del></span>
 
-  &lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
+blatant flaws allowed anyone</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share the picture you take according to who is
-    in the frame.&lt;/p&gt;
+    and suggests you</em></ins></span> to <span 
class="removed"><del><strong>snoop on a user's personal data&lt;/a&gt;.
+The critique fails entirely</strong></del></span> <span 
class="inserted"><ins><em>share the picture you take 
according</em></ins></span> to <span class="removed"><del><strong>express 
concern that</strong></del></span> <span class="inserted"><ins><em>who is
+    in</em></ins></span> the <span class="removed"><del><strong>app 
sends</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means the pictures are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    known-faces database, which means</em></ins></span> the
+<span class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely</em></ins></span> to <span 
class="removed"><del><strong>a server, where</strong></del></span> <span 
class="inserted"><ins><em>be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>&lt;em&gt;developer&lt;/em&gt; gets it all.
+This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
+
+&lt;p&gt;The server surely has a &ldquo;privacy 
policy,&rdquo;</strong></del></span> <span class="inserted"><ins><em>wire to 
Facebook's servers</em></ins></span> and <span 
class="removed"><del><strong>surely it
+is worthless since nearly</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
@@ -681,7 +690,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    &lt;p&gt;Facebook's app listens</em></ins></span> all <span 
class="inserted"><ins><em>the time, &lt;a
     
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
     snoop on what people are listening to or watching&lt;/a&gt;. In addition,
     it may be analyzing people's conversations to serve them with targeted
@@ -691,9 +700,8 @@
   &lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data in the phone, and in server 
accounts,</em></ins></span>
-    it
-<span class="removed"><del><strong>is worthless since nearly all 
of</strong></del></span> <span class="inserted"><ins><em>can 
alter</em></ins></span> them <span 
class="removed"><del><strong>are.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    spy on many sorts</em></ins></span> of <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
+    it can alter</em></ins></span> them <span 
class="removed"><del><strong>are.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
@@ -706,14 +714,14 @@
     such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% and 
47%</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% and 47% 
of mobile applications, both from Android and iOS
+  respectively &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share 
personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>mobile applications, both from Android and iOS
-  respectively</strong></del></span> <span class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
     proprietary software to make sure they can't &ldquo;fool&rdquo;
     the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -731,14 +739,14 @@
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate, but is that valid? Software developers have no right to
+    legitimate, but is that valid? Software developers have no <span 
class="removed"><del><strong>right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>right to
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+  &lt;li id="M201510300"&gt;
     &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
@@ -812,10 +820,12 @@
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
     get users to say &ldquo;I agree&rdquo;. That is no excuse for
-    malware.&lt;/p&gt;
+    malware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201411260"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
     &lt;p&gt;Many</em></ins></span> proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
@@ -924,7 +934,6 @@
   devices that come with</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-jail --&gt;
   &lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
@@ -943,7 +952,6 @@
   the restriction). Fortunately, most Android</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT mobiles-tyrant --&gt;
   &lt;li id="M201110110"&gt;
     &lt;p&gt;&lt;a 
href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/"&gt;
     Mobile</em></ins></span> devices <span class="inserted"><ins><em>that come 
with Windows 8</em></ins></span> are <span class="removed"><del><strong>not 
tyrants.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>tyrants&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -1009,7 +1017,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- po/malware-mobiles.ru-en.html       9 Oct 2018 13:30:41 -0000       1.40
+++ po/malware-mobiles.ru-en.html       17 Oct 2018 10:01:35 -0000      1.41
@@ -57,40 +57,48 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="phone-communications"></div>
 
 <ul class="blurbs">
-  <li><p>The phone network
-    <a href="https://ssd.eff.org/en/module/problem-mobile-phones";>
+  <li id="M201502100">
+    <p>The phone network <a
+    href="https://ssd.eff.org/en/module/problem-mobile-phones";>
       tracks the movements of each phone</a>.</p>
+
     <p>This is inherent in the design of the phone network: as long as
       the phone is in communication with the network, there is no way
       to stop the network from recording its location.  Many countries
       (including the US and the EU) require the network to store all
       these location data for months or years.</p>
   </li>
-  <li><p id="universal-back-door">Almost every phone's communication processor 
has
-      a universal back door which
-      is <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
-      often used to make a phone transmit all conversations it
- hears</a>.</p>
-    <p>The back
-      door <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
+
+  <li id="M201311121">
+    <p id="universal-back-door">
+    Almost every phone's communication processor has
+    a universal back door which is <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>
+    often used to make a phone transmit all conversations it hears</a>.</p>
+
+    <p>The back door <a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
       may take the form of bugs that have gone 20 years unfixed</a>.
       The choice to leave the security holes in place is morally
       equivalent to writing a back door.</p>
+
     <p>The back door is in the &ldquo;modem processor&rdquo;, whose
       job is to communicate with the radio network.  In most phones,
       the modem processor controls the microphone.  In most phones it
       has the power to rewrite the software for the main processor
       too.</p>
+
     <p>A few phone models are specially designed so that the modem
       processor does not control the microphone, and so that it can't
       change the software in the main processor.  They still have the
       back door, but at least it is unable to turn the phone unto a
       listening device.</p>
-    <p>The universal back door is apparently also used to make phones
-      <a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
+
+    <p>The universal back door is apparently also used to make phones <a
+    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
       transmit even when they are turned off</a>.  This means their movements
       are tracked, and may also make the listening feature work.</p>
   </li>
@@ -127,7 +135,6 @@
 </ul>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-back-door -->
   <li id="M201609130">
     <p>Xiaomi phones come with <a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered";>
@@ -170,7 +177,6 @@
 <h3 id="drm">Mobile DRM</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-dr -->
   <li id="M201501030">
     <p id="netflix-app-geolocation-drm">The Netflix Android app <a
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/";>
@@ -189,7 +195,6 @@
   bugs.</p>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-insec -->
   <li id="M201807100">
     <p>Siri, Alexa, and all the other voice-control systems can be <a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa";>
@@ -322,7 +327,6 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-surv -->
   <li id="M201806110">
     <p>The Spanish football streaming app <a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html";>tracks
@@ -765,7 +769,6 @@
 <h3 id="jails">Mobile Jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-jail -->
   <li id="M201210080">
     <p><a
     
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>
@@ -778,7 +781,6 @@
 <h3 id="tyrants">Mobile Tyrants</h3>
 
 <ul class="blurbs">
-<!-- INSERT mobiles-tyrant -->
   <li id="M201110110">
     <p><a href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
     Mobile devices that come with Windows 8 are tyrants</a>.</p>
@@ -843,7 +845,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-webpages.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-webpages.de-diff.html    14 Oct 2018 11:58:30 -0000      1.9
+++ po/malware-webpages.de-diff.html    17 Oct 2018 10:01:35 -0000      1.10
@@ -67,10 +67,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="malware-webpages"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT webpages --&gt;
   &lt;li id="M201807190"&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
@@ -283,7 +282,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/malware-webpages.fr-en.html      14 Oct 2018 12:58:19 -0000      1.10
+++ po/malware-webpages.fr-en.html      17 Oct 2018 10:01:35 -0000      1.11
@@ -46,10 +46,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
-<!-- INSERT webpages -->
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -255,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-webpages.ru-en.html      14 Oct 2018 13:28:28 -0000      1.11
+++ po/malware-webpages.ru-en.html      17 Oct 2018 10:01:35 -0000      1.12
@@ -46,10 +46,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
-<!-- INSERT webpages -->
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -255,7 +254,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 13:28:28 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/potential-malware.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.de-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/potential-malware.de-en.html     9 Oct 2018 13:30:41 -0000       1.6
+++ po/potential-malware.de-en.html     17 Oct 2018 10:01:35 -0000      1.7
@@ -19,10 +19,9 @@
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
-<!-- INSERT potential -->
   <li id="M201712130">
     <p>Patent applications show that Google and Amazon are interested in <a
     
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
@@ -105,7 +104,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/potential-malware.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.fr-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/potential-malware.fr-en.html     9 Oct 2018 13:30:41 -0000       1.6
+++ po/potential-malware.fr-en.html     17 Oct 2018 10:01:35 -0000      1.7
@@ -19,10 +19,9 @@
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
-<!-- INSERT potential -->
   <li id="M201712130">
     <p>Patent applications show that Google and Amazon are interested in <a
     
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
@@ -105,7 +104,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/potential-malware.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.ru-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/potential-malware.ru-en.html     9 Oct 2018 13:30:41 -0000       1.6
+++ po/potential-malware.ru-en.html     17 Oct 2018 10:01:35 -0000      1.7
@@ -19,10 +19,9 @@
   software might use in the future for malicious purposes.  We don't
   have any evidence that they are in use yet.</p>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="potential-malware"></div>
 
 <ul class="blurbs">
-<!-- INSERT potential -->
   <li id="M201712130">
     <p>Patent applications show that Google and Amazon are interested in <a
     
href="http://www.consumerwatchdog.org/privacy-technology/home-assistant-adopter-beware-google-amazon-digital-assistant-patents-reveal";>
@@ -105,7 +104,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/proprietary-back-doors.fr-en.html        9 Oct 2018 13:30:41 -0000       
1.49
+++ po/proprietary-back-doors.fr-en.html        17 Oct 2018 10:01:35 -0000      
1.50
@@ -46,7 +46,6 @@
 <h3 id='spy'>Spying</h3>
 
 <ul class="blurbs">
-<!-- INSERT spy -->
   <li id="M201706202">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
@@ -95,7 +94,6 @@
 <h3 id='alter-data'>Altering user's data or settings</h3>
 
 <ul class="blurbs">
-<!-- INSERT alter-data -->
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -203,7 +201,6 @@
 <h3 id='install-delete'>Installing or deleting programs</h3>
 
 <ul class="blurbs">
-<!-- INSERT install-delete -->
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
@@ -273,7 +270,6 @@
 <h3 id='universal'>Full control</h3>
 
 <ul class="blurbs">
-<!-- INSERT universal -->
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -393,7 +389,6 @@
 <h3 id='other'>Other or undefined</h3>
 
 <ul class="blurbs">
-<!-- INSERT other -->
   <li id="M201711204">
     <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
     
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
@@ -519,7 +514,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:35 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/proprietary-back-doors.it-diff.html      9 Oct 2018 13:30:41 -0000       
1.26
+++ po/proprietary-back-doors.it-diff.html      17 Oct 2018 10:01:36 -0000      
1.27
@@ -35,7 +35,9 @@
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
 &lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software.
-They are sorted out according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>what they are 
known to allow. Back doors
+They are sorted out according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>what they 
are known to allow. Back doors
 that allow full control over the operating system are said to be
 &ldquo;universal&rdquo;.&lt;/p&gt;
 
@@ -60,10 +62,7 @@
 &lt;h3 id='spy'&gt;Spying&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT spy</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li id="M201706202"&gt;</em></ins></span>
+  &lt;li id="M201706202"&gt;</em></ins></span>
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
     cameras contain a glaring <span 
class="removed"><del><strong>backdoor&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>back door&mdash;they</em></ins></span> have login
     accounts with hard-coded passwords, which can't be changed, and &lt;a
@@ -131,7 +130,6 @@
 &lt;h3 id='alter-data'&gt;Altering user's data or settings&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT alter-data --&gt;
   &lt;li id="M201809140"&gt;
     &lt;p&gt;Android has</em></ins></span> a <span 
class="removed"><del><strong>surprise. Nonfree software</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
@@ -160,16 +158,16 @@
 
     <span class="removed"><del><strong>&lt;li&gt;
         &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
+           universal back door in the application processor, for
+           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
            universal</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-    Some D-Link routers&lt;/a&gt; have a</em></ins></span> back door <span 
class="removed"><del><strong>in the application 
processor,</strong></del></span> for
-           <span class="removed"><del><strong>Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-           universal back door</strong></del></span> <span 
class="inserted"><ins><em>changing settings</em></ins></span> in <span 
class="removed"><del><strong>the modem processor that the local
+    Some D-Link routers&lt;/a&gt; have a</em></ins></span> back door <span 
class="inserted"><ins><em>for changing settings</em></ins></span> in <span 
class="removed"><del><strong>the modem processor that the local
            phone company can use&lt;/a&gt;.&lt;/p&gt;
     &lt;/li&gt;
 
@@ -360,7 +358,6 @@
 &lt;h3 id='install-delete'&gt;Installing or deleting programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT install-delete --&gt;
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
   remotely extract some data from iPhones</strong></del></span>
@@ -479,7 +476,6 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT universal --&gt;
   &lt;li id="M201711244"&gt;</em></ins></span>
     &lt;p&gt;The <span class="removed"><del><strong>Kindle-Swindle 
also</strong></del></span> <span class="inserted"><ins><em>Furby 
Connect</em></ins></span> has a &lt;a <span 
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;</em></ins></span>
@@ -491,14 +487,14 @@
 &lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span> 
<span class="inserted"><ins><em>If</em></ins></span> the <span 
class="removed"><del><strong>proprietary
 &ldquo;Left Hand&rdquo; operating system have back doors that give
 HP &lt;a 
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device,</em></ins></span> remote <span 
class="removed"><del><strong>login access&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>changes</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims</strong></del></span> <span 
class="inserted"><ins><em>the code could surely convert it
+    listening device,</em></ins></span> remote <span 
class="removed"><del><strong>login access&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>changes</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims that this 
does</strong></del></span> <span class="inserted"><ins><em>the code could 
surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered to a server</em></ins></span> 
that <span class="inserted"><ins><em>requires
+    with a universal back door, and tethered to a server that requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -506,8 +502,8 @@
     &lt;p&gt;Tesla used software to limit the part of the battery
     that was available to customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
-    a universal back door in the software&lt;/a&gt; to temporarily 
increase</em></ins></span>
-    this <span class="removed"><del><strong>does</strong></del></span> <span 
class="inserted"><ins><em>limit.&lt;/p&gt;
+    a universal back door in the software&lt;/a&gt; to temporarily increase
+    this limit.&lt;/p&gt;
 
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
     whole battery capacity did</em></ins></span> not <span 
class="removed"><del><strong>give HP
@@ -568,7 +564,7 @@
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
     A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
     all models of mobile phones have a &lt;a href="#universal-back-door"&gt;
-    universal back door in</em></ins></span> the <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad bother
+    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -583,7 +579,7 @@
     &lt;p&gt;ChromeOS has a universal back
     door. At least, Google says it does&mdash;in &lt;a
     href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
-    section 4 of the EULA&lt;/a&gt;.&lt;/p&gt;
+    section 4 of</em></ins></span> the <span 
class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200700001"&gt;
@@ -607,7 +603,6 @@
 &lt;h3 id='other'&gt;Other or undefined&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT other --&gt;
   &lt;li id="M201711204"&gt;
     &lt;p&gt;Intel's intentional &ldquo;management 
engine&rdquo;</em></ins></span> back door <span 
class="removed"><del><strong>allows installation of
 software changes,</strong></del></span> <span class="inserted"><ins><em>has 
&lt;a
@@ -771,7 +766,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-back-doors.ja-diff.html      9 Oct 2018 13:30:41 -0000       
1.24
+++ po/proprietary-back-doors.ja-diff.html      17 Oct 2018 10:01:36 -0000      
1.25
@@ -35,15 +35,22 @@
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
 &lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software.
-They are sorted out according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each 
subsection</strong></del></span> <span class="inserted"><ins><em>what they are 
known to allow. Back doors
+They are sorted out according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;ul&gt;
+    &lt;li&gt;
+        &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
+           universal back door</strong></del></span> <span 
class="inserted"><ins><em>what they are known to allow. Back doors
 that allow full control over the operating system are said to be
 &ldquo;universal&rdquo;.&lt;/p&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to be in this page but isn't
+&lt;p&gt;If you know of an example that ought to be</em></ins></span> in <span 
class="inserted"><ins><em>this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>application processor, for
+           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This is separate from</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or two
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
@@ -60,21 +67,13 @@
 &lt;h3 id='spy'&gt;Spying&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT spy</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;ul&gt;
-    &lt;li&gt;
-        &lt;p&gt;Xiaomi phones come</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li id="M201706202"&gt;
+  &lt;li id="M201706202"&gt;
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
-    accounts</em></ins></span> with <span class="inserted"><ins><em>hard-coded 
passwords, which can't be changed, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
-           universal back door in the application processor, for
-           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This</strong></del></span>
+    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#universal-back-door-phone-modem"&gt;the
+           universal</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;
-    there</em></ins></span> is <span class="removed"><del><strong>separate 
from &lt;a href="#universal-back-door-phone-modem"&gt;the
-           universal</strong></del></span> <span class="inserted"><ins><em>no 
way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+    there is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Since these accounts with hard-coded passwords are impossible
     to delete, this problem is not merely an insecurity; it amounts to
@@ -121,7 +120,6 @@
 &lt;h3 id='alter-data'&gt;Altering user's data or settings&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT alter-data --&gt;
   &lt;li id="M201809140"&gt;
     &lt;p&gt;Android has</em></ins></span> a <span 
class="removed"><del><strong>Windows 
computer&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
@@ -338,7 +336,6 @@
 &lt;h3 id='install-delete'&gt;Installing or deleting programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT install-delete --&gt;
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
@@ -346,49 +343,49 @@
 
     &lt;p&gt;We link to the article</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
   &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
+  &lt;p&gt;This may have improved with</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-Windows 8 also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a back door <span class="removed"><del><strong>for remotely deleting 
apps&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that &lt;a
-    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo; as well as forcibly install
+  &lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android 
applications.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201112080"&gt;</em></ins></span>
-    &lt;p&gt;
-<span class="removed"><del><strong>You</strong></del></span> <span 
class="inserted"><ins><em>In addition to its &lt;a 
href="#windows-update"&gt;universal back
-    door&lt;/a&gt;, Windows 8 has a back door for &lt;a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-    remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+    &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
+    door&lt;/a&gt;,</em></ins></span> Windows 8 <span 
class="removed"><del><strong>also</strong></del></span> has a back door for 
<span class="inserted"><ins><em>&lt;a
+    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
+    remotely deleting <span class="removed"><del><strong>apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You</em></ins></span> might well decide to let a security service 
that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
     But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
-    should have the right to decide <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this 
<span class="removed"><del><strong>way.
+    should have the right to <span class="removed"><del><strong>decide who (if 
anyone) to trust in this way.
 &lt;/p&gt;
 
 &lt;p&gt;
 As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+the first software</strong></del></span> <span 
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span 
class="removed"><del><strong>delete is Windows or iOS.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>trust in this
+    way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -418,35 +415,15 @@
     malicious so far, the point is that nobody should have such power,
     which could also be used maliciously.  You might well decide to
     let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing it to
+    it considers malicious.  But there is no excuse for <span 
class="removed"><del><strong>allowing</strong></del></span> <span 
class="inserted"><ins><em>allowing it to
     &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this <span class="removed"><del><strong>way.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-Samsung Galaxy devices running proprietary Android versions come with a back
-door&lt;/a&gt; that provides remote access to the files stored on the device.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+    who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Amazon 
Kindle-Swindle</strong></del></span> <span 
class="inserted"><ins><em>iPhone</em></ins></span> has a back door <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>has been 
used</strong></del></span> <span class="inserted"><ins><em>allows 
Apple</em></ins></span> to
-<span class="removed"><del><strong>&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;</strong></del></span>
 remotely <span class="removed"><del><strong>erase books&lt;/a&gt;.  One of the 
books erased was 1984, by George Orwell.
-&lt;/p&gt;
-
-&lt;p&gt;Amazon responded to criticism by saying it 
would</strong></del></span> delete <span class="removed"><del><strong>books only
-following orders from the state.  However, that policy didn't last.
-In 2012
-it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
-a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
-kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt; which Apple considers
+  &lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone has a back door &lt;a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
     this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
@@ -456,33 +433,23 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT universal --&gt;
-  &lt;li id="M201711244"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Kindle-Swindle 
also</strong></del></span> <span class="inserted"><ins><em>Furby 
Connect</em></ins></span> has a &lt;a <span 
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;</em></ins></span>
-    universal back door&lt;/a&gt;.
-<span class="removed"><del><strong>&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span> 
<span class="inserted"><ins><em>If</em></ins></span> the <span 
class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system have</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
     into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711010"&gt;
-    &lt;p&gt;Sony has brought</em></ins></span> back <span 
class="removed"><del><strong>doors that give
-HP</strong></del></span> <span class="inserted"><ins><em>its robotic pet Aibo, 
this time</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims</strong></del></span> <span 
class="inserted"><ins><em>a server</em></ins></span> that <span 
class="removed"><del><strong>this does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>requires
+    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
+    
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
+    with a universal back door, and tethered to a server that requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709091"&gt;
-    &lt;p&gt;Tesla used software</em></ins></span> to <span 
class="inserted"><ins><em>limit</em></ins></span> the <span 
class="removed"><del><strong>customer's data,</strong></del></span> <span 
class="inserted"><ins><em>part of the battery
+    &lt;p&gt;Tesla used software to limit the part of the battery
     that was available to customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
     a universal back door in the software&lt;/a&gt; to temporarily increase
@@ -520,10 +487,10 @@
 
     &lt;p&gt;This was &lt;a
     href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
-    that Microsoft used the same method to push the &lt;a
+    reported in 2007&lt;/a&gt; for XP and Vista, and</em></ins></span> it 
<span class="inserted"><ins><em>seems
+    that Microsoft used the same method</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>push</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
-    Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
+    Windows 10 downgrade&lt;/a&gt; to computers running Windows 
7</em></ins></span> and <span class="removed"><del><strong>you 
should</strong></del></span> <span class="inserted"><ins><em>8.&lt;/p&gt;
 
     &lt;p&gt;In Windows 10, the universal back door
     is no longer hidden; all &ldquo;upgrades&rdquo; will be &lt;a
@@ -536,46 +503,76 @@
     href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
     it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We have found nothing explicitly documenting the lack of any way
-    to disable remote changes to the software, so we are not completely
-    sure there isn't one,</em></ins></span> but <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>this seems pretty clear.&lt;/p&gt;
+    &lt;p&gt;We</em></ins></span> have <span class="inserted"><ins><em>found 
nothing explicitly documenting</em></ins></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>lack of any way</em></ins></span>
+    to
+<span class="removed"><del><strong>decide who (if 
anyone)</strong></del></span> <span class="inserted"><ins><em>disable remote 
changes</em></ins></span> to <span class="removed"><del><strong>trust 
in</strong></del></span> <span class="inserted"><ins><em>the software, so we 
are not completely
+    sure there isn't one, but</em></ins></span> this <span 
class="removed"><del><strong>way.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>seems pretty 
clear.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201412180"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201412180"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+    A Chinese version of</em></ins></span> Android <span 
class="removed"><del><strong>versions</strong></del></span> <span 
class="inserted"><ins><em>has a universal back door&lt;/a&gt;. Nearly
     all models of mobile phones have a &lt;a href="#universal-back-door"&gt;
-    universal back door in</em></ins></span> the <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad bother
+    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
-    Some applications come with MyFreeProxy, which is a universal back
-    door&lt;/a&gt; that can download programs and run them.&lt;/p&gt;
+    Some applications</em></ins></span> come with <span 
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back
+    door&lt;/a&gt; that <span class="removed"><del><strong>provides remote 
access to the files stored on the device.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can download 
programs and run them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201202280"&gt;
-    &lt;p&gt;ChromeOS has a universal back
-    door. At least, Google says it does&mdash;in &lt;a
-    href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
-    section 4 of the EULA&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The Amazon Kindle-Swindle</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201202280"&gt;
+    &lt;p&gt;ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door that has been used to</strong></del></span>
+    <span class="inserted"><ins><em>door. At least, Google says it 
does&mdash;in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  One</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
+    section 4</em></ins></span> of the <span 
class="removed"><del><strong>books erased was 1984, by George Orwell.
+&lt;/p&gt;
+
+&lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200700001"&gt;
-    &lt;p&gt;In addition to its &lt;a href="#swindle-eraser"&gt;book
-    eraser&lt;/a&gt;, the Kindle-Swindle has a &lt;a
+    &lt;p&gt;In addition</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from the state.  However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>its</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
+a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+
+&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>href="#swindle-eraser"&gt;book
+    eraser&lt;/a&gt;, the</em></ins></span> Kindle-Swindle <span 
class="removed"><del><strong>also</strong></del></span> has a &lt;a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
-    universal back door&lt;/a&gt;.&lt;/p&gt;
+    universal back <span class="removed"><del><strong>door&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200612050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200612050"&gt;
     &lt;p&gt;Almost every phone's communication
-    processor has a universal back door which is &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-    often used to make a phone transmit all conversations it hears&lt;/a&gt;. 
See
+    processor has a universal</em></ins></span> back <span 
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often used</em></ins></span> to <span class="removed"><del><strong>the 
customer's data, but if the</strong></del></span> <span 
class="inserted"><ins><em>make a phone transmit all conversations it 
hears&lt;/a&gt;. See
     &lt;a 
href="/proprietary/malware-mobiles.html#universal-back-door"&gt;Malware
     in Mobile Devices&lt;/a&gt; for more info.&lt;/p&gt;
   &lt;/li&gt;
@@ -585,7 +582,6 @@
 &lt;h3 id='other'&gt;Other or undefined&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT other --&gt;
   &lt;li id="M201711204"&gt;
     &lt;p&gt;Intel's intentional &ldquo;management 
engine&rdquo;</em></ins></span> back door <span 
class="removed"><del><strong>allows installation of
 software changes,</strong></del></span> <span class="inserted"><ins><em>has 
&lt;a
@@ -749,7 +745,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- po/proprietary-back-doors.ru-en.html        9 Oct 2018 13:30:41 -0000       
1.51
+++ po/proprietary-back-doors.ru-en.html        17 Oct 2018 10:01:36 -0000      
1.52
@@ -46,7 +46,6 @@
 <h3 id='spy'>Spying</h3>
 
 <ul class="blurbs">
-<!-- INSERT spy -->
   <li id="M201706202">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
@@ -95,7 +94,6 @@
 <h3 id='alter-data'>Altering user's data or settings</h3>
 
 <ul class="blurbs">
-<!-- INSERT alter-data -->
   <li id="M201809140">
     <p>Android has a <a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
@@ -203,7 +201,6 @@
 <h3 id='install-delete'>Installing or deleting programs</h3>
 
 <ul class="blurbs">
-<!-- INSERT install-delete -->
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
@@ -273,7 +270,6 @@
 <h3 id='universal'>Full control</h3>
 
 <ul class="blurbs">
-<!-- INSERT universal -->
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -393,7 +389,6 @@
 <h3 id='other'>Other or undefined</h3>
 
 <ul class="blurbs">
-<!-- INSERT other -->
   <li id="M201711204">
     <p>Intel's intentional &ldquo;management engine&rdquo; back door has <a
     
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/";>
@@ -519,7 +514,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.de-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-censorship.de-en.html        12 Oct 2018 07:58:36 -0000      
1.19
+++ po/proprietary-censorship.de-en.html        17 Oct 2018 10:01:36 -0000      
1.20
@@ -47,7 +47,6 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-<!-- INSERT google -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -89,7 +88,6 @@
 <h3 id="consoles">Game consoles</h3>
 
 <ul class="blurbs">
-<!-- INSERT consoles -->
   <li id="M201408290">
     <p>The <a
     
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
@@ -157,7 +155,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.es-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-censorship.es-en.html        12 Oct 2018 07:58:36 -0000      
1.24
+++ po/proprietary-censorship.es-en.html        17 Oct 2018 10:01:36 -0000      
1.25
@@ -47,7 +47,6 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-<!-- INSERT google -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -89,7 +88,6 @@
 <h3 id="consoles">Game consoles</h3>
 
 <ul class="blurbs">
-<!-- INSERT consoles -->
   <li id="M201408290">
     <p>The <a
     
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
@@ -157,7 +155,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-censorship.fr-en.html        12 Oct 2018 07:58:36 -0000      
1.25
+++ po/proprietary-censorship.fr-en.html        17 Oct 2018 10:01:36 -0000      
1.26
@@ -47,7 +47,6 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-<!-- INSERT google -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -89,7 +88,6 @@
 <h3 id="consoles">Game consoles</h3>
 
 <ul class="blurbs">
-<!-- INSERT consoles -->
   <li id="M201408290">
     <p>The <a
     
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
@@ -157,7 +155,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-censorship.it-diff.html      12 Oct 2018 07:58:36 -0000      
1.9
+++ po/proprietary-censorship.it-diff.html      17 Oct 2018 10:01:36 -0000      
1.10
@@ -68,7 +68,6 @@
 &lt;h3 id="google"&gt;Google&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT google --&gt;
   &lt;li id="M201703160"&gt;</em></ins></span>
     &lt;p&gt;Google <span class="removed"><del><strong>said it would
       &lt;a 
href="/proprietary/proprietary-back-doors.html#chrome-erase-addons"&gt;
@@ -118,7 +117,6 @@
 &lt;h3 id="consoles"&gt;Game consoles&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT consoles --&gt;
   &lt;li id="M201408290"&gt;
     &lt;p&gt;The &lt;a
     
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/"&gt;
@@ -188,7 +186,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-censorship.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ja-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary-censorship.ja-diff.html      12 Oct 2018 07:58:36 -0000      
1.13
+++ po/proprietary-censorship.ja-diff.html      17 Oct 2018 10:01:36 -0000      
1.14
@@ -85,7 +85,6 @@
 &lt;h3 id="google"&gt;Google&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT google --&gt;
   &lt;li id="M201703160"&gt;
     &lt;p&gt;Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
 rights or would help women find abortions&lt;/a&gt;.&lt;/p&gt;
@@ -139,7 +138,6 @@
 &lt;h3 id="consoles"&gt;Game consoles&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT consoles --&gt;
   &lt;li id="M201408290"&gt;
     &lt;p&gt;The</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/"&gt;Nintendo</strong></del></span>
@@ -210,7 +208,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-censorship.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.ru-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- po/proprietary-censorship.ru-en.html        12 Oct 2018 07:58:36 -0000      
1.24
+++ po/proprietary-censorship.ru-en.html        17 Oct 2018 10:01:36 -0000      
1.25
@@ -47,7 +47,6 @@
 <h3 id="google">Google</h3>
 
 <ul class="blurbs">
-<!-- INSERT google -->
   <li id="M201703160">
     <p>Google <a
     
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts";>
@@ -89,7 +88,6 @@
 <h3 id="consoles">Game consoles</h3>
 
 <ul class="blurbs">
-<!-- INSERT consoles -->
   <li id="M201408290">
     <p>The <a
     
href="https://www.gamespot.com/articles/nintendos-new-3ds-charges-30-cents-to-remove-an-in/1100-6421996/";>
@@ -157,7 +155,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/12 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-coverups.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.de-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/proprietary-coverups.de-en.html  9 Oct 2018 13:30:41 -0000       1.7
+++ po/proprietary-coverups.de-en.html  17 Oct 2018 10:01:36 -0000      1.8
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
 
 <ul class="blurbs">
-<!-- INSERT coverups -->
   <li id="M201612120">
     <p>Price Waterhouse Coopers tried
     to suppress knowledge of a security flaw by <a
@@ -104,7 +103,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-coverups.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.fr-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-coverups.fr-en.html  9 Oct 2018 13:30:41 -0000       1.8
+++ po/proprietary-coverups.fr-en.html  17 Oct 2018 10:01:36 -0000      1.9
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
 
 <ul class="blurbs">
-<!-- INSERT coverups -->
   <li id="M201612120">
     <p>Price Waterhouse Coopers tried
     to suppress knowledge of a security flaw by <a
@@ -104,7 +103,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-coverups.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ja-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/proprietary-coverups.ja-diff.html        9 Oct 2018 13:30:41 -0000       
1.5
+++ po/proprietary-coverups.ja-diff.html        17 Oct 2018 10:01:36 -0000      
1.6
@@ -48,10 +48,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-coverups"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT coverups --&gt;
   &lt;li id="M201612120"&gt;
     &lt;p&gt;Price</em></ins></span> Waterhouse Coopers tried
     to suppress knowledge of a security flaw by &lt;a
@@ -120,7 +119,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-coverups.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-coverups.ru-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-coverups.ru-en.html  9 Oct 2018 13:30:41 -0000       1.8
+++ po/proprietary-coverups.ru-en.html  17 Oct 2018 10:01:36 -0000      1.9
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-coverups"></div>
 
 <ul class="blurbs">
-<!-- INSERT coverups -->
   <li id="M201612120">
     <p>Price Waterhouse Coopers tried
     to suppress knowledge of a security flaw by <a
@@ -104,7 +103,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-deception.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-deception.fr-en.html 9 Oct 2018 13:30:41 -0000       1.17
+++ po/proprietary-deception.fr-en.html 17 Oct 2018 10:01:36 -0000      1.18
@@ -32,10 +32,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
-<!-- INSERT deception -->
   <li id="M201611060">
     <p><a
     
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
@@ -147,7 +146,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- po/proprietary-deception.ja-diff.html       9 Oct 2018 13:30:41 -0000       
1.10
+++ po/proprietary-deception.ja-diff.html       17 Oct 2018 10:01:36 -0000      
1.11
@@ -47,10 +47,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-deception"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT deception --&gt;
   &lt;li id="M201611060"&gt;
     &lt;p&gt;&lt;a</em></ins></span>
     
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;
@@ -71,9 +70,9 @@
     &lt;p&gt;The</em></ins></span> proprietor of the Pokémon Go game &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business"&gt;
     invites restaurants and other businesses to pay to have the game lure
-    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    people <span class="removed"><del><strong>there&lt;/a&gt;.
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;&ldquo;Dark patterns&rdquo;
       are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
       interfaces designed to mislead users, or make option settings
@@ -81,9 +80,9 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
     users to turn this off&rdquo; while ensuring that few will
-    understand how to actually turn it off.&lt;/p&gt;
+    understand how to actually turn it off.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;</em></ins></span>
     &lt;p&gt;A top-ranking proprietary Instagram client promising
@@ -182,7 +181,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-deception.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-deception.ru-en.html 9 Oct 2018 13:30:41 -0000       1.16
+++ po/proprietary-deception.ru-en.html 17 Oct 2018 10:01:36 -0000      1.17
@@ -32,10 +32,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-deception"></div>
 
 <ul class="blurbs">
-<!-- INSERT deception -->
   <li id="M201611060">
     <p><a
     
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969";>
@@ -147,7 +146,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-drm.fr-en.html       9 Oct 2018 13:30:41 -0000       1.25
+++ po/proprietary-drm.fr-en.html       17 Oct 2018 10:01:36 -0000      1.26
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
 
 <ul class="blurbs">
-<!-- INSERT drm -->
   <li id="M201806250">
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
@@ -338,7 +337,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-drm.it-diff.html     9 Oct 2018 13:30:41 -0000       1.16
+++ po/proprietary-drm.it-diff.html     17 Oct 2018 10:01:36 -0000      1.17
@@ -57,10 +57,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT drm --&gt;
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
     MacOS was tethered to a server.  The company &lt;a
@@ -436,7 +435,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-drm.ja-diff.html     9 Oct 2018 13:30:41 -0000       1.17
+++ po/proprietary-drm.ja-diff.html     17 Oct 2018 10:01:36 -0000      1.18
@@ -58,10 +58,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT drm --&gt;
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
     MacOS was tethered to a server.  The company &lt;a
@@ -226,10 +225,10 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201501030"&gt;
     &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#bluray"&gt;Bluray&lt;/a&gt;
-disks.  (The article talks about how</strong></del></span>
+disks.  (The article talks about how the same malware would later be
+introduced in MacOS.  That had not been done at</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces</em></ins></span> the <span class="removed"><del><strong>same 
malware would later be
-introduced in MacOS.  That had not been done at the time, but it was
+    forces</em></ins></span> the <span class="removed"><del><strong>time, but 
it was
 done subsequently.)
 &lt;/p&gt;
 &lt;/li&gt;
@@ -292,10 +291,12 @@
 
     &lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
     don't use Bluray <span class="removed"><del><strong>disks!
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201102250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201102250"&gt;
     &lt;p&gt;Android &lt;a
     
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;
     contains facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
@@ -316,12 +317,10 @@
 
     &lt;p&gt;The fundamental cause of this harassment, and the fundamental
     wrong of the DRM in DVDs, is the requirement to use nonfree software
-    to play the DVD. Fortunately we have free replacement 
software.&lt;/p&gt;</em></ins></span>
+    to play the DVD. Fortunately we have free replacement software.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;</em></ins></span>
+  &lt;li id="M200811210"&gt;</em></ins></span>
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;</em></ins></span>
     DRM <span class="inserted"><ins><em>(digital restrictions 
mechanisms)</em></ins></span> in <span class="removed"><del><strong>Cars Will 
Drive Consumers Crazy&lt;/a&gt;.
@@ -425,7 +424,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/proprietary-drm.ru-en.html       9 Oct 2018 13:30:41 -0000       1.26
+++ po/proprietary-drm.ru-en.html       17 Oct 2018 10:01:36 -0000      1.27
@@ -42,10 +42,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-drm"></div>
 
 <ul class="blurbs">
-<!-- INSERT drm -->
   <li id="M201806250">
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
@@ -338,7 +337,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-incompatibility.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.fr-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-incompatibility.fr-en.html   9 Oct 2018 13:30:41 -0000       
1.9
+++ po/proprietary-incompatibility.fr-en.html   17 Oct 2018 10:01:36 -0000      
1.10
@@ -38,10 +38,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
 
 <ul class="blurbs">
-<!-- INSERT incompatibility -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -132,7 +131,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-incompatibility.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-incompatibility.ru-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/proprietary-incompatibility.ru-en.html   9 Oct 2018 13:30:41 -0000       
1.9
+++ po/proprietary-incompatibility.ru-en.html   17 Oct 2018 10:01:36 -0000      
1.10
@@ -38,10 +38,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-incompatibility"></div>
 
 <ul class="blurbs">
-<!-- INSERT incompatibility -->
   <li id="M201803300">
     <p>In MacOS and iOS, the procedure for <a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac";>
@@ -132,7 +131,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-insecurity.fr-en.html        9 Oct 2018 13:30:41 -0000       
1.64
+++ po/proprietary-insecurity.fr-en.html        17 Oct 2018 10:01:36 -0000      
1.65
@@ -48,10 +48,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-<!-- INSERT insecurity -->
   <li id="M201809240">
     <p>Researchers have discovered how to <a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
@@ -630,7 +629,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-insecurity.it-diff.html      9 Oct 2018 13:30:41 -0000       
1.19
+++ po/proprietary-insecurity.it-diff.html      17 Oct 2018 10:01:36 -0000      
1.20
@@ -66,10 +66,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT insecurity --&gt;</em></ins></span>
+&lt;ul class="blurbs"&gt;</em></ins></span>
   &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
@@ -237,7 +236,8 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201705160"&gt;
     &lt;p&gt;Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28 models</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant 
dishwasher</strong></del></span> <span class="inserted"><ins><em>HP laptops 
logged the user's keystroke
+    pre-installed on 28 models</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the 
user's keystroke
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, &lt;a
     
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
@@ -262,9 +262,9 @@
 
   &lt;li id="M201703270"&gt;
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher</em></ins></span> is &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected</em></ins></span> to the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
+    Stings hospital disinfectant dishwasher is &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to</em></ins></span> the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
     filesystem, infect it with malware, and force the dishwasher to launch
@@ -738,18 +738,18 @@
     from the state.  Quite the contrary: confiding your data to someone
     else's server, if not first encrypted by you with free software,
     undermines your <span class="removed"><del><strong>rights.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>rights.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+  &lt;li id="M201404250"&gt;
     &lt;p&gt;Lots of &lt;a
     href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;
+    hospital equipment has lousy security&lt;/a&gt;, and it can be 
fatal.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201402210"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201402210"&gt;
     &lt;p&gt;The &lt;a
     
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/"&gt;insecurity
     of WhatsApp&lt;/a&gt; makes eavesdropping a snap.&lt;/p&gt;
@@ -915,7 +915,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- po/proprietary-insecurity.ja-diff.html      9 Oct 2018 13:30:41 -0000       
1.38
+++ po/proprietary-insecurity.ja-diff.html      17 Oct 2018 10:01:36 -0000      
1.39
@@ -86,10 +86,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT insecurity --&gt;
   &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
@@ -108,33 +107,30 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-WhatsApp messages are not entirely deleted&lt;/a&gt;. They 
can</strong></del></span> <span class="inserted"><ins><em>listening 
device&lt;/a&gt; for them.&lt;/p&gt;
+WhatsApp messages</strong></del></span> <span 
class="inserted"><ins><em>listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>recovered
-in various ways.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;A vulnerability</strong></del></span> <span 
class="inserted"><ins><em>much
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product</em></ins></span> in 
<span class="removed"><del><strong>Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>that country,
-    do you think Amazon would have the moral fiber</em></ins></span> to <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  malacious code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not entirely deleted&lt;/a&gt;. 
They</strong></del></span> <span class="inserted"><ins><em>probably hackers 
too, but please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
     &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</em></ins></span> can be <span 
class="removed"><del><strong>recovered</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked by programs that play commands in ultrasound that humans
-    can't hear&lt;/a&gt;.&lt;/p&gt;
+    hijacked by programs that play commands</em></ins></span> in <span 
class="removed"><del><strong>various ways.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>ultrasound 
that humans
+    can't hear&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807020"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;A vulnerability</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
     photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
@@ -351,9 +347,10 @@
   &lt;/li&gt;
 
   &lt;li id="M201607220"&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
+    &lt;p&gt;A vulnerability</em></ins></span> in Apple's Image I/O API 
allowed an attacker to &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code</em></ins></span> from any application which uses this API 
to render a
+  <span class="removed"><del><strong>malacious</strong></del></span>
+    <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -871,7 +868,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- po/proprietary-insecurity.ru-en.html        9 Oct 2018 13:30:41 -0000       
1.63
+++ po/proprietary-insecurity.ru-en.html        17 Oct 2018 10:01:36 -0000      
1.64
@@ -48,10 +48,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-insecurity"></div>
 
 <ul class="blurbs">
-<!-- INSERT insecurity -->
   <li id="M201809240">
     <p>Researchers have discovered how to <a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
@@ -630,7 +629,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/proprietary-interference.fr-en.html      14 Oct 2018 12:58:19 -0000      
1.25
+++ po/proprietary-interference.fr-en.html      17 Oct 2018 10:01:36 -0000      
1.26
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
-<!-- INSERT interference -->
   <li id="M201809120">
     <p>One version of Windows 10 <a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
@@ -229,7 +228,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-interference.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja-diff.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/proprietary-interference.ja-diff.html    14 Oct 2018 11:58:30 -0000      
1.11
+++ po/proprietary-interference.ja-diff.html    17 Oct 2018 10:01:36 -0000      
1.12
@@ -48,10 +48,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-interference"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT interference --&gt;
   &lt;li id="M201809120"&gt;
     &lt;p&gt;One version of</em></ins></span> Windows <span 
class="removed"><del><strong>10's</strong></del></span> <span 
class="inserted"><ins><em>10 &lt;a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"&gt;
@@ -64,10 +63,12 @@
 blatantly disregards user choice and privacy&lt;/a&gt;.</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
     included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
-    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
+    the CPU in users' computers to mine a 
cryptocurrency.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201805080"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
     inject a &ldquo;miner&rdquo; in web pages&lt;/a&gt; served to visitors. 
This
@@ -82,12 +83,10 @@
     href="/software/librejs/index.html"&gt;LibreJS&lt;/a&gt;. Some
     browser extensions that &lt;a
     
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"&gt;
-    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;</em></ins></span>
+    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804180"&gt;
+  &lt;li id="M201804180"&gt;
     &lt;p&gt;Pearson's proprietary educational software &lt;a
     
href="https://gizmodo.com/pearson-embedded-a-social-psychological-experiment-in-s-1825367784"&gt;
     did an experiment on real students&lt;/a&gt;, treating students differently
@@ -125,22 +124,22 @@
 
     &lt;p&gt;The article's author starts from the premise that Microsoft has
     a right</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> <span 
class="inserted"><ins><em>control what</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>does to users, as long as it doesn't
-    go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;</em></ins></span>
+    go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701110"&gt;
+    &lt;p&gt;An upgrade package for Acrobat Reader &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/"&gt;silently
+    alters Chrome&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201701110"&gt;
-    &lt;p&gt;An upgrade package for Acrobat Reader</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
+  <span class="inserted"><ins><em>&lt;li id="M201608170"&gt;
+    &lt;p&gt; After</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
       tricking users&lt;/a&gt; &lt;a
 
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
-into replacing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/software/adobe-acrobat-reader-dc-update-installs-chrome-browser-extension/"&gt;silently
-    alters Chrome&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201608170"&gt;
-    &lt;p&gt; After &lt;a 
href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing the 
download of Windows 10&lt;/a&gt;
+into replacing</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing
 the download of Windows 10&lt;/a&gt;
     on computers that were running</em></ins></span> Windows 7 <span 
class="removed"><del><strong>with</strong></del></span> <span 
class="inserted"><ins><em>and 8, Microsoft &lt;a
     
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
     repeatedly switched on a flag that urged users to
@@ -287,7 +286,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-interference.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- po/proprietary-interference.ru-en.html      14 Oct 2018 13:28:28 -0000      
1.26
+++ po/proprietary-interference.ru-en.html      17 Oct 2018 10:01:36 -0000      
1.27
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-interference"></div>
 
 <ul class="blurbs">
-<!-- INSERT interference -->
   <li id="M201809120">
     <p>One version of Windows 10 <a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
@@ -229,7 +228,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 13:28:28 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-jails.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-jails.fr-en.html     9 Oct 2018 13:30:41 -0000       1.22
+++ po/proprietary-jails.fr-en.html     17 Oct 2018 10:01:36 -0000      1.23
@@ -69,7 +69,6 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT apple -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -179,7 +178,6 @@
 <h3 id="microsoft">Microsoft jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft -->
   <li id="M201706130">
     <p>Windows 10 S was a jail: <a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
@@ -266,7 +264,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:41 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-jails.it-diff.html   9 Oct 2018 13:30:42 -0000       1.16
+++ po/proprietary-jails.it-diff.html   17 Oct 2018 10:01:36 -0000      1.17
@@ -95,7 +95,6 @@
 &lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple --&gt;
   &lt;li id="M201710130"&gt;</em></ins></span>
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
@@ -288,15 +287,16 @@
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="microsoft"&gt;Microsoft jails&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft --&gt;
   &lt;li id="M201706130"&gt;
     &lt;p&gt;Windows 10 S was a jail: &lt;a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;
@@ -307,12 +307,10 @@
     10 S is a special configuration of Windows 10 called &lt;a
     
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq"&gt;
     S mode&lt;/a&gt;. The major difference with Windows 10 S is that there is
-    an easy way to switch out of S mode.&lt;/p&gt;</em></ins></span>
+    an easy way to switch out of S mode.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201210080"&gt;</em></ins></span>
+  &lt;li id="M201210080"&gt;</em></ins></span>
     &lt;p&gt;&lt;a
 <span 
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;
@@ -394,7 +392,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-jails.ja-diff.html   9 Oct 2018 13:30:42 -0000       1.16
+++ po/proprietary-jails.ja-diff.html   17 Oct 2018 10:01:36 -0000      1.17
@@ -97,7 +97,6 @@
 <span class="inserted"><ins><em>&lt;h4&gt;Examples of censorship by Apple 
jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apple --&gt;
   &lt;li id="M201710130"&gt;
     &lt;p&gt;Apple is &lt;a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
@@ -133,12 +132,10 @@
   &lt;li id="M201701050"&gt;
     &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
     
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by blocking distribution of the New York Times 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605190"&gt;
+  &lt;li id="M201605190"&gt;
     &lt;p&gt;Apple censors games, &lt;a
     
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
     banning some games from the cr&hellip;app store&lt;/a&gt; because of which
@@ -160,10 +157,12 @@
 
     &lt;p&gt;This particular political slant &lt;a
     
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506250"&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506250"&gt;</em></ins></span>
     &lt;p&gt;Apple has banned iThing
     applications that show the confederate flag.  &lt;a
     
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
@@ -216,7 +215,6 @@
 &lt;h3 id="microsoft"&gt;Microsoft jails&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT microsoft --&gt;
   &lt;li id="M201706130"&gt;
     &lt;p&gt;Windows 10 S was a jail: &lt;a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"&gt;
@@ -312,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-jails.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/proprietary-jails.ru-en.html     9 Oct 2018 13:30:42 -0000       1.23
+++ po/proprietary-jails.ru-en.html     17 Oct 2018 10:01:36 -0000      1.24
@@ -69,7 +69,6 @@
 <h4>Examples of censorship by Apple jails</h4>
 
 <ul class="blurbs">
-<!-- INSERT apple -->
   <li id="M201710130">
     <p>Apple is <a
     
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet";>
@@ -179,7 +178,6 @@
 <h3 id="microsoft">Microsoft jails</h3>
 
 <ul class="blurbs">
-<!-- INSERT microsoft -->
   <li id="M201706130">
     <p>Windows 10 S was a jail: <a
     
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison";>
@@ -266,7 +264,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/proprietary-sabotage.fr-en.html  10 Oct 2018 10:57:51 -0000      1.49
+++ po/proprietary-sabotage.fr-en.html  17 Oct 2018 10:01:36 -0000      1.50
@@ -31,10 +31,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
-<!-- INSERT sabotage -->
   <li id="M201807050">
     <p>The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. <a
@@ -520,7 +519,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/10 10:57:51 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-sabotage.it-diff.html        10 Oct 2018 07:58:36 -0000      
1.17
+++ po/proprietary-sabotage.it-diff.html        17 Oct 2018 10:01:36 -0000      
1.18
@@ -46,10 +46,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT sabotage --&gt;
   &lt;li id="M201807050"&gt;
     &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. &lt;a
@@ -687,7 +686,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/10 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- po/proprietary-sabotage.ja-diff.html        10 Oct 2018 07:58:36 -0000      
1.21
+++ po/proprietary-sabotage.ja-diff.html        17 Oct 2018 10:01:36 -0000      
1.22
@@ -44,10 +44,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT sabotage --&gt;
   &lt;li id="M201807050"&gt;
     &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. &lt;a
@@ -673,7 +672,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/10 07:58:36 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-sabotage.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru-en.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/proprietary-sabotage.ru-en.html  11 Oct 2018 06:59:25 -0000      1.48
+++ po/proprietary-sabotage.ru-en.html  17 Oct 2018 10:01:36 -0000      1.49
@@ -31,10 +31,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-sabotage"></div>
 
 <ul class="blurbs">
-<!-- INSERT sabotage -->
   <li id="M201807050">
     <p>The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. <a
@@ -520,7 +519,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/11 06:59:25 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary-subscriptions.fr-en.html     9 Oct 2018 13:30:42 -0000       
1.13
+++ po/proprietary-subscriptions.fr-en.html     17 Oct 2018 10:01:36 -0000      
1.14
@@ -36,10 +36,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
 
 <ul class="blurbs">
-<!-- INSERT subscriptions -->
   <li id="M201711010">
     <p>Sony has brought back its robotic pet Aibo, this time <a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
@@ -142,7 +141,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-subscriptions.ja-diff.html   9 Oct 2018 13:30:42 -0000       
1.8
+++ po/proprietary-subscriptions.ja-diff.html   17 Oct 2018 10:01:36 -0000      
1.9
@@ -51,10 +51,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-subscriptions"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT subscriptions --&gt;
   &lt;li id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
@@ -158,7 +157,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-subscriptions.ru-en.html     9 Oct 2018 13:30:42 -0000       
1.12
+++ po/proprietary-subscriptions.ru-en.html     17 Oct 2018 10:01:36 -0000      
1.13
@@ -36,10 +36,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-subscriptions"></div>
 
 <ul class="blurbs">
-<!-- INSERT subscriptions -->
   <li id="M201711010">
     <p>Sony has brought back its robotic pet Aibo, this time <a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet";>
@@ -142,7 +141,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- po/proprietary-surveillance.fr-en.html      7 Oct 2018 22:29:14 -0000       
1.125
+++ po/proprietary-surveillance.fr-en.html      17 Oct 2018 10:01:36 -0000      
1.126
@@ -179,7 +179,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT windows -->
   <li id="M201712110">
     <p>HP's proprietary operating system <a
     href="http://www.bbc.com/news/technology-42309371";>includes a
@@ -345,7 +344,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT macos -->
   <li id="M201809070">
     <p>Adware Doctor, an ad blocker for MacOS, <a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
@@ -408,7 +406,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT bios -->
   <li id="M201509220">
     <p><a
     
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
@@ -435,7 +432,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT phones -->
   <li id="M201601110">
     <p>The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is <a
@@ -483,7 +479,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT ithings -->
   <li id="M201711250">
     <p>The DMCA and the EU Copyright Directive make it <a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>
@@ -606,7 +601,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT android -->
   <li id="M201711210">
     <p>Android tracks location for Google <a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
@@ -700,7 +694,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT e-readers -->
   <li id="M201603080">
     <p>E-books can contain JavaScript code, and <a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
@@ -742,7 +735,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT apps -->
   <li id="M201808030">
     <p>Some Google apps on Android <a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
@@ -1145,7 +1137,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT skype -->
   <li id="M201307110">
     <p>Skype contains <a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
@@ -1162,7 +1153,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT games -->
   <li id="M201806240">
     <p>Red Shell is a spyware that
     is found in many proprietary games. It <a
@@ -1244,7 +1234,6 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-<!-- INSERT stings -->
   <li id="M201708280">
     <p>The bad security in many Internet of Stings devices allows <a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
@@ -1269,7 +1258,6 @@
 before Amazon &ldquo;smart&rdquo; TVs.</p>
 
 <ul class="blurbs">
-<!-- INSERT tvsets -->
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
@@ -1419,7 +1407,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT cameras -->
   <li id="M201603220">
     <p>Over 70 brands of network-connected surveillance cameras have <a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
@@ -1443,7 +1430,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT toys -->
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -1526,7 +1512,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT drones -->
   <li id="M201708040">
     <p>While you're using a DJI drone
     to snoop on other people, DJI is in many cases <a
@@ -1541,7 +1526,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT home -->
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -1595,7 +1579,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT wearables -->
   <li id="M201807260">
     <p>Tommy Hilfiger clothing <a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>will
@@ -1610,7 +1593,6 @@
 <h5 id="SpywareOnSmartWatches">&ldquo;Smart&rdquo; Watches</h5>
 
 <ul class="blurbs">
-<!-- INSERT watches -->
   <li id="M201603020">
     <p>A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
@@ -1635,7 +1617,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT cars -->
   <li id="M201711230">
     <p>AI-powered driving apps can <a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -1698,7 +1679,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT virtual -->
   <li id="M201612230">
     <p>VR equipment, measuring every slight motion,
     creates the potential for the most intimate
@@ -1728,7 +1708,6 @@
    but the surveillance is an abuse all the same.</p>
 
 <ul class="blurbs">
-<!-- INSERT websites -->
   <li id="M201805170">
     <p>The Storyful program <a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>spies
@@ -1794,7 +1773,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT javascript -->
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -1835,7 +1813,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT flash -->
   <li id="M201310110">
     <p>Flash and JavaScript are used for <a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
@@ -1856,7 +1833,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT chrome -->
   <li id="M201507280">
     <p>Google Chrome makes it easy for an extension to do <a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
@@ -1892,7 +1868,6 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-<!-- INSERT networks -->
   <li id="M201606030">
     <p>Investigation Shows <a
     
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
@@ -1969,7 +1944,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/proprietary-surveillance.it-diff.html    7 Oct 2018 22:29:14 -0000       
1.75
+++ po/proprietary-surveillance.it-diff.html    17 Oct 2018 10:01:36 -0000      
1.76
@@ -220,7 +220,6 @@
   files</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT windows --&gt;
   &lt;li id="M201712110"&gt;
     &lt;p&gt;HP's proprietary operating system &lt;a
     href="http://www.bbc.com/news/technology-42309371"&gt;includes a
@@ -313,7 +312,8 @@
 
     &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+  Windows 10</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
@@ -324,8 +324,8 @@
 
   &lt;li id="M201508130"&gt;
     &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
-    Windows 10 <span class="inserted"><ins><em>sends identifiable information 
to Microsoft&lt;/a&gt;, even if
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
@@ -425,7 +425,6 @@
       edited&lt;/a&gt;. The</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT macos --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
@@ -503,15 +502,27 @@
 &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT bios --&gt;
   &lt;li id="M201509220"&gt;</em></ins></span>
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>the specific
-    sabotage method Lenovo used did not affect GNU/Linux; also, a
-    &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of</strong></del></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
+    sabotage method Lenovo used did</em></ins></span> not <span 
class="removed"><del><strong>in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>affect 
GNU/Linux; also, a
+    &ldquo;clean&rdquo; Windows install</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span> <span 
class="inserted"><ins><em>not really clean since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its
     own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -519,7 +530,9 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</em></ins></span> on <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With</strong></del></span> <span 
class="inserted"><ins><em>Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -530,23 +543,41 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT phones --&gt;
   &lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't &ldquo;fool&rdquo;
-    the monitoring&lt;/a&gt;.&lt;/p&gt;
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
+    proprietary <span class="removed"><del><strong>apps, one can only hope 
that</strong></del></span> <span class="inserted"><ins><em>software to make 
sure</em></ins></span> they <span 
class="removed"><del><strong>don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201510050"&gt;
-    &lt;p&gt;According to Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users by
+       &lt;a 
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>ultrasound from beacons placed in stores or played 
by TV programs&lt;/a&gt;.
+       &lt;/p&gt;
+
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>collude</strong></del></span> <span 
class="inserted"><ins><em>take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on and off, listen to the microphone,
-    retrieve geo-location data from the GPS, take photographs, read
+    them</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>turn the 
phones on and off, listen</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
     text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed to disguise itself
+    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware is designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -555,19 +586,35 @@
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via
-    the universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There are &lt;a
+    detail here, it seems that</em></ins></span> this <span 
class="removed"><del><strong>point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>does not 
operate via</em></ins></span>
+    the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
+    phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal 
information</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in the <span 
class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones' 
radio software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS &lt;a
-    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
+    disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
+    yet another example of nonfree software pretending</strong></del></span>
+    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -578,45 +625,126 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT ithings --&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>user,
+    when it's actually doing something else.  Such a 
thing</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
     illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    this</em></ins></span> would <span class="removed"><del><strong>be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>require circumventing the iOS 
DRM.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In</em></ins></span> the <span class="removed"><del><strong>most 
popular Android apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral</strong></del></span> <span class="inserted"><ins><em>latest 
iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
-    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The 
clear</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced</em></ins></span> 
way <span class="removed"><del><strong>to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>really does turn
+    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>granted that the usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>you&mdash;&ldquo;We
+    know you want</em></ins></span> to <span class="removed"><del><strong>any 
file on the system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201702150"&gt;
-    &lt;p&gt;Apple proposes &lt;a
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple</em></ins></span> proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    fingerprint-scanning touch <span 
class="removed"><del><strong>screen&lt;/a&gt;
+      &mdash; which</strong></del></span> <span 
class="inserted"><ins><em>screen&lt;/a&gt;&mdash;which</em></ins></span> would 
mean no way
     to use it without having your fingerprints taken. Users would have
-    no way to tell whether the phone is snooping on them.&lt;/p&gt;
+    no way to tell whether the phone is snooping on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send</em></ins></span>
     lots of personal data to Apple's servers&lt;/a&gt;.  Big Brother can get
     them from there.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that the user types into it&lt;/a&gt;; the 
server records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving the code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47% of the most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
     take, and keeps them up to date on all your devices. Any edits you
-    make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
+    make are automatically updated everywhere. <span 
class="removed"><del><strong>[...]</strong></del></span> <span 
class="inserted"><ins><em>[&hellip;]</em></ins></span> 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
@@ -632,8 +760,12 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    security to get at them, but NSA can access any of them through &lt;a 
<span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:
+      the &lt;a class="not-a-duplicate"</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
@@ -658,13 +790,15 @@
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+    &lt;p&gt;The &lt;a class="not-a-duplicate"</em></ins></span>
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201312300"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
     Either Apple helps the NSA snoop on all the data in an iThing, or it
@@ -679,139 +813,195 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    &lt;p&gt;There</em></ins></span> is also a feature for web sites to track 
users, which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
+      turned off.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;
+    email address</em></ins></span> and <span 
class="removed"><del><strong>regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>receiving</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either</strong></del></span> <span 
class="inserted"><ins><em>verification code</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span>
+    to <span class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInAndroid"&gt;Android Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInTelephones"&gt;Spyware 
in</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInAndroid"&gt;Android</em></ins></span> 
Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInAndroid"&gt;#SpywareInAndroid&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT android --&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
-    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned off, even when
-    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to 
turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
+    the <span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
-    &lt;p&gt;Some portable phones &lt;a
+    &lt;p&gt;Some portable</em></ins></span> phones
+      <span class="removed"><del><strong>on and off, 
listen</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data</em></ins></span> to <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
-    &lt;p&gt;Google Play (a component</em></ins></span> of <span 
class="inserted"><ins><em>Android) &lt;a
+    &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the <span class="removed"><del><strong>top-ranked 
gratis
-  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>users' movements 
without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>tracking.  
This is
-    yet another example</em></ins></span> of <span 
class="removed"><del><strong>them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span class="inserted"><ins><em>nonfree 
software pretending to obey</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user,
+    tracks</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
+    <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</em></ins></span>
-    that <span class="inserted"><ins><em>users can't delete&lt;/a&gt;, 
and</em></ins></span> they <span class="removed"><del><strong>don't 
snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope</strong></del></span> 
<span class="inserted"><ins><em>send so much data</em></ins></span> that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>their
+    &lt;p&gt;Samsung</em></ins></span> phones come with &lt;a
+    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;, and they send so much data that their
     transmission is a substantial expense for users.  Said transmission,
     not wanted or requested by the user, clearly must constitute spying
-    of some kind.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    of some
+      <span class="removed"><del><strong>kind.&lt;/p&gt;&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234</strong></del></span>
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>kind.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+  &lt;li id="M201403120"&gt;
     &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps that track users</strong></del></span> <span 
class="inserted"><ins><em>phones (and Windows? laptops): The Wall Street
-    Journal (in an article blocked from us</em></ins></span> by <span 
class="inserted"><ins><em>a paywall) reports that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI can remotely activate the GPS and microphone</em></ins></span> in 
<span class="removed"><del><strong>stores or played</strong></del></span> <span 
class="inserted"><ins><em>Android phones
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
     and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
     href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present in some Android devices when they are
-    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
-    by <span class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and users cannot stop them:
+      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal 
purpose</strong></del></span>
 
-&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>Google, 
use a modified version</em></ins></span> of Android <span 
class="removed"><del><strong>apps can collude to transmit 
users'</strong></del></span> <span class="inserted"><ins><em>that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends</em></ins></span> personal data to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
+      the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
 
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal data 
in</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;</em></ins></span>
-    &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>will give Verizon</strong></del></span> <span 
class="inserted"><ins><em>developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>same
+   information about the users' searches</strong></del></span> <span 
class="inserted"><ins><em>personal details of users</em></ins></span> that 
<span class="removed"><del><strong>Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>install</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>not enough to
     legitimize actions like this.  At this point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on users, instead of
+    they are &ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and
+    <span class="inserted"><ins><em>honestly identify</em></ins></span> the
+    <span class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information in the
-    first place!&lt;/p&gt;
+    &lt;p&gt;However, to truly protect people's privacy, we</em></ins></span> 
must <span class="removed"><del><strong>explicitly opt-in before the app takes 
effect. However,</strong></del></span> <span class="inserted"><ins><em>prevent 
Google
+    and other companies from getting this personal information 
in</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
+    &lt;p&gt;Some manufacturers add</em></ins></span> a <span 
class="removed"><del><strong>Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
     hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -824,37 +1014,49 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT e-readers --&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
-    
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;E-books</em></ins></span> can <span 
class="inserted"><ins><em>contain JavaScript code, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
+    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots</em></ins></span> of <span 
class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+    send lots</em></ins></span> of data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212031"&gt;
-    &lt;p&gt;The Electronic Frontier Foundation has examined and 
found</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
-    kinds of surveillance in</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>Swindle</em></ins></span> and <span 
class="inserted"><ins><em>other e-readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Electronic Frontier Foundation has examined and found &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
+    kinds of surveillance</em></ins></span> in the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>Swindle</em></ins></span> and <span 
class="inserted"><ins><em>other e-readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
+    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance is inadequate as a protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps that include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -870,66 +1072,67 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apps --&gt;
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>what radio and TV programs</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must</strong></del></span> <span 
class="inserted"><ins><em>even when users</em></ins></span> disable <span 
class="removed"><del><strong>Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
-    yet another example</strong></del></span> <span 
class="inserted"><ins><em>other kinds</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>location
-    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on 
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn 
off the other kinds of location
+    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming</em></ins></span> app &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>suggests you</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to 
save</em></ins></span>
-    a <span class="removed"><del><strong>thing would</strong></del></span> 
<span class="inserted"><ins><em>recording. But I can't</em></ins></span> be 
<span class="removed"><del><strong>almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sure from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>73%</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of the <span class="removed"><del><strong>most 
popular</strong></del></span> <span 
class="inserted"><ins><em>5,855</em></ins></span> Android apps
-  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>studied by 
researchers were found to snoop</em></ins></span>
-    and <span class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>their users with 
third parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> the <span class="removed"><del><strong>app's 
functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;</strong></del></span>
 <span class="inserted"><ins><em>apps were</em></ins></span>
-    found <span class="inserted"><ins><em>to insecurely snitch on its users.  
Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described</strong></del></span> these 
<span class="inserted"><ins><em>proprietary</em></ins></span> apps <span 
class="removed"><del><strong>as
-  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>whose
-    source code they cannot look at.</em></ins></span>  The <span 
class="removed"><del><strong>clear way to say
-  &ldquo;zero price&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>other apps might be snooping
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>picture</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If</em></ins></span> you <span class="removed"><del><strong>take 
according</strong></del></span> <span 
class="inserted"><ins><em>learn</em></ins></span> to <span 
class="removed"><del><strong>who
+      is</strong></del></span> <span class="inserted"><ins><em>care much less 
about sports, you will benefit</em></ins></span> in
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+
+      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps 
studied by researchers were found</em></ins></span> to <span 
class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="inserted"><ins><em>insecurely 
snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might</em></ins></span> be
+      <span class="removed"><del><strong>sent across the wire to Facebook's 
servers</strong></del></span> <span class="inserted"><ins><em>snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>&ldquo;gratis.&rdquo;&lt;/p&gt;
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>freedom, Android users
+    need to get rid</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    and</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;
+  &lt;/li&gt;
 
-  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>evidence</em></ins></span> that <span 
class="inserted"><ins><em>proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to
-  <span class="removed"><del><strong>analyze what</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on</strong></del></span> proprietary <span 
class="removed"><del><strong>malware (DRM and snooping). In August
+      2015 it</strong></del></span> <span class="inserted"><ins><em>apps by 
getting apps from the free software
+    only</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -937,377 +1140,323 @@
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which</em></ins></span> users are <span class="removed"><del><strong>doing 
or how.  &ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>HIV-positive, then provides the information to
-    companies&lt;/a&gt;.&lt;/p&gt;
+    which</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some</strong></del></span> are <span 
class="removed"><del><strong>starting</strong></del></span> <span 
class="inserted"><ins><em>HIV-positive, then provides the 
information</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>snoop are
-  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each</em></ins></span>
-    other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>but not to the server's database.&lt;/p&gt;
+    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each
+    other but not to</em></ins></span> the <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    spy on users even more than users expected. It</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where</em></ins></span> they <span class="removed"><del><strong>present 
snooping as a way</strong></del></span> <span class="inserted"><ins><em>travel 
before and after going</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> a <span 
class="removed"><del><strong>typical example of
+      the attitude of the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular</em></ins></span> Android apps <span 
class="removed"><del><strong>(but not</strong></del></span>
-    <span class="inserted"><ins><em>is pervasive and sometimes very clever. 
Some trackers can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect to 100</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
+    &lt;p&gt;Tracking software in popular Android</em></ins></span> apps <span 
class="removed"><del><strong>the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    is <span class="removed"><del><strong>doing this in</strong></del></span> 
<span class="inserted"><ins><em>pervasive and sometimes very clever. Some 
trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow</em></ins></span> a <span class="removed"><del><strong>way that at 
least is visible</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>some Android devices when they are sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>user's address
-    book</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that this article misuses 
the words
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as 
what</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>zero price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;20 dishonest Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>any file</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on the <span class="removed"><del><strong>system.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;Google did not intend to make these</em></ins></span> apps <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>spy;</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is</strong></del></span> 
<span class="inserted"><ins><em>contrary, it
+    worked</em></ins></span> in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for</em></ins></span> the snooping <span class="removed"><del><strong>done 
by</strong></del></span> <span class="inserted"><ins><em>of these 
apps.&lt;/p&gt;
 
+    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>phone 
company,</strong></del></span> <span class="inserted"><ins><em>other hand, 
Google redistributes nonfree Android apps,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares</em></ins></span> in the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>responsibility for</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
 
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There</em></ins></span> is no <span 
class="removed"><del><strong>excuse for malware.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>contrary, it
-    worked in various ways</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>systematic way</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the 
user</strong></del></span> <span class="inserted"><ins><em>Google, or Android 
users,</em></ins></span>
+    to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>inspect executable 
proprietary apps</em></ins></span> to <span class="inserted"><ins><em>see what 
they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>app developer but</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it</em></ins></span> did <span 
class="removed"><del><strong>not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>a good job of this,</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>could more or less
+    prevent such snooping, except when</em></ins></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>app developers are clever
+    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>anyone?  A free 
software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the
+    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
-
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple proposes</strong></del></span> <span 
class="inserted"><ins><em>the responsibility for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Could Google</em></ins></span> have <span 
class="inserted"><ins><em>done a better job of preventing apps from
-    cheating? There is</em></ins></span> no <span 
class="inserted"><ins><em>systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
-    to <span class="removed"><del><strong>tell whether the phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps</em></ins></span> 
to <span class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother 
can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
+    on users&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>see what 
they do.&lt;/p&gt;
+    &lt;p&gt;With free software apps,</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends personal data 
about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could &lt;em&gt;make sure&lt;/em&gt; that they
+    don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers</strong></del></span> 
<span class="inserted"><ins><em>source code</em></ins></span> for <span 
class="removed"><del><strong>at least 30
-        days.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
-    the <span class="inserted"><ins><em>source</em></ins></span> code <span 
class="removed"><del><strong>Apple
-      sends</strong></del></span> <span 
class="inserted"><ins><em>somehow</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
-    various ways. If it did a good job</em></ins></span> of <span 
class="inserted"><ins><em>this, it could more or less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and the NSA takes advantage</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
+    to <span class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers all</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span class="removed"><del><strong>date on all 
your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed</em></ins></span> in 
<span class="removed"><del><strong>Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup</strong></del></span> <span class="inserted"><ins><em>protect 
us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>stores or 
played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by 
default</strong></del></span> <span class="inserted"><ins><em>the
-    public,</em></ins></span> so <span class="removed"><del><strong>it still 
counts as a
-      surveillance functionality.&lt;/p&gt;
+  &lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>we can depend on each 
other.&lt;/p&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span class="inserted"><ins><em>do 
lots of surveillance, judging by &lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>personal data</em></ins></span> in <span 
class="removed"><del><strong>on a child's speech, and even speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
-    on users&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
-    don't snoop.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>users through</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>access any of them through</strong></del></span> 
<span class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The</strong></del></span> app <span 
class="removed"><del><strong>was reporting</strong></del></span> <span 
class="inserted"><ins><em>would record</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which</strong></del></span> 
<span class="inserted"><ins><em>audio files</em></ins></span> users <span 
class="removed"><del><strong>could have
+      checked and changed.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets</strong></del></span> stores <span 
class="removed"><del><strong>determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>listen to
+    along with</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial 
number.&lt;/p&gt;</em></ins></span>
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
+    &lt;p&gt;The <span class="removed"><del><strong>company's 
statement</strong></del></span> <span class="inserted"><ins><em>suit 
accuses</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> was <span 
class="removed"><del><strong>anonymizing</strong></del></span> <span 
class="inserted"><ins><em>done without</em></ins></span> the <span 
class="removed"><del><strong>data may be
+      true, but it doesn't really matter.</strong></del></span> <span 
class="inserted"><ins><em>users' consent.</em></ins></span>
+    If <span class="removed"><del><strong>it had sold</strong></del></span> 
the <span class="removed"><del><strong>data to a
+      data broker,</strong></del></span> <span class="inserted"><ins><em>fine 
print of</em></ins></span> the <span class="removed"><del><strong>data broker 
would have been able to figure</strong></del></span> <span 
class="inserted"><ins><em>app said that users gave consent for this,
+    would that make it acceptable? No way! It should be flat</em></ins></span> 
out
+      <span class="removed"><del><strong>who the user was.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access</em></ins></span> it
-      <span class="removed"><del><strong>is still true</strong></del></span> 
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in 
<span class="removed"><del><strong>iOS 7.)&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Following this lawsuit,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
+    the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
+  &lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude</em></ins></span>
+    to <span class="removed"><del><strong>its customers.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should</em></ins></span> be
-      <span class="removed"><del><strong>turned 
off.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>flat out 
&lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract</strong></del></span>
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to 
<span class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    study</em></ins></span> found <span class="removed"><del><strong>a way to 
access the data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>tens 
of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on</em></ins></span> some <span class="removed"><del><strong>data from 
iPhones for</strong></del></span> <span class="inserted"><ins><em>of its 
phones. The app will give Verizon</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>same information
-    about the users' searches that Google normally gets when they use
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>same 
information
+    about</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>users' searches that Google normally gets when they 
use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before</em></ins></span> the <span 
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the 
<span class="removed"><del><strong>data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>iOS seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> is <span 
class="removed"><del><strong>the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>turn the 
phones
-      on</strong></del></span> <span class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks &lt;a
-    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before</em></ins></span> and <span 
class="removed"><del><strong>off, listen to the microphone, retrieve 
geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>user's
-    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>investigated the privacy</em></ins></span> and <span 
class="removed"><del><strong>they send so much data</strong></del></span> <span 
class="inserted"><ins><em>security of
-    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>their transmission is a
-      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite of the promises</em></ins></span>
-    for <span class="removed"><del><strong>users.  Said transmission, not 
wanted or
-      requested</strong></del></span> <span class="inserted"><ins><em>privacy, 
security, and anonymity given</em></ins></span> by the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>majority</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>VPN
+    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This example illustrates how &ldquo;getting the user's
+    consent&rdquo; for surveillance is inadequate as a protection against
+    massive surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611160"&gt;
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security, and anonymity given by the majority of VPN
     apps&mdash;millions of users may be unawarely subject to poor security
-    guarantees and abusive practices inflicted</em></ins></span> by <span 
class="inserted"><ins><em>VPN apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the 
<span class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>research 
paper,
-    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send</strong></del></span> 
<span class="inserted"><ins><em>infringe</em></ins></span> their <span 
class="removed"><del><strong>GPS location on
-      remote command</strong></del></span>
-    <span class="inserted"><ins><em>privacy:&lt;/p&gt;
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX</em></ins></span> 
and <span class="inserted"><ins><em>Appflood,
-      meant to track</em></ins></span> users <span 
class="removed"><del><strong>cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says</strong></del></span> <span class="inserted"><ins><em>and 
show them targeted ads.&lt;/dd&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>has full access to 
users'
+      permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="inserted"><ins><em>read logs
-      for other apps and also core system logs. TigerVPN 
developers</em></ins></span> have <span 
class="removed"><del><strong>GPS.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose 
is</strong></del></span>
-      <span class="inserted"><ins><em>confirmed this.&lt;/dd&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps and also core system logs. TigerVPN developers have
+      confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
       &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> the <span 
class="removed"><del><strong>use of data on</strong></del></span> <span 
class="inserted"><ins><em>UK government if requested.&lt;/dd&gt;
+      may turn them over to the UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> <span class="inserted"><ins><em>HTML 
pages returned</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="removed"><del><strong>user's list</strong></del></span>
-      <span class="inserted"><ins><em>users. The stated 
purpose</em></ins></span> of <span class="removed"><del><strong>other people's 
phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>the JS injection is</em></ins></span> to <span 
class="removed"><del><strong>do lots of surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
-      roughly five tracking libraries. Also,</em></ins></span> it <span 
class="removed"><del><strong>demands to personal data in</strong></del></span> 
<span class="inserted"><ins><em>redirects</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search</strong></del></span> <span 
class="inserted"><ins><em>user's
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection is to display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers of this</em></ins></span> app <span 
class="inserted"><ins><em>have confirmed</em></ins></span> that <span 
class="removed"><del><strong>it will&lt;/a&gt;
-        pre-install on some</strong></del></span>
-      <span class="inserted"><ins><em>the non-premium 
version</em></ins></span> of <span class="removed"><del><strong>its phones. 
The</strong></del></span> <span class="inserted"><ins><em>the</em></ins></span> 
app <span class="removed"><del><strong>will give Verizon</strong></del></span> 
<span class="inserted"><ins><em>does JavaScript injection for
-      tracking</em></ins></span> the <span class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>user and displaying ads.&lt;/dd&gt;
+      five tracking libraries. Developers of this app have confirmed that
+      the non-premium version of the app does JavaScript injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
@@ -1321,116 +1470,73 @@
     &lt;p&gt;Facebook's new Magic Photo app &lt;a
     
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
     scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>picture you take according to who is
+    and suggests you to share the picture you take according to who is
     in the frame.&lt;/p&gt;
 
     &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>pictures are likely to be
-    sent across the wire to Facebook's servers</em></ins></span> and <span 
class="inserted"><ins><em>face-recognition
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if</em></ins></span> the user <span class="removed"><del><strong>must 
explicitly opt-in before the app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>didn't &ldquo;upload&rdquo; them 
to</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
+    even if the user didn't &ldquo;upload&rdquo; them to the service.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu 
photo-editing</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's</em></ins></span> app <span 
class="inserted"><ins><em>listens all the time,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A</strong></del></span> <span 
class="inserted"><ins><em>or watching&lt;/a&gt;. In addition,
+  &lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
     it may be analyzing people's conversations to serve them with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604250"&gt;
-    &lt;p&gt;A</em></ins></span> pregnancy test controller application not 
only can &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy</em></ins></span> on many sorts of data in the phone, and in server 
accounts,
-    it can alter them <span class="removed"><del><strong>too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
-        for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that include &lt;a
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps that include &lt;a
     
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
     such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
+  &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated</em></ins></span> to <span 
class="removed"><del><strong>share</strong></del></span> the <span 
class="removed"><del><strong>picture you take according to who
-      is</strong></del></span> <span class="inserted"><ins><em>app's 
functionality, was &lt;a
+    unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found</em></ins></span> in the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures</strong></del></span> 
<span class="inserted"><ins><em>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they</em></ins></span> are <span 
class="removed"><del><strong>likely</strong></del></span> <span 
class="inserted"><ins><em>not free software.  The clear way</em></ins></span>
-    to <span class="removed"><del><strong>be
-      sent across</strong></del></span> <span class="inserted"><ins><em>say 
&ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
-    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate, but is that valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73%</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>47%</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>mobile 
applications, from Android and iOS
+    &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
     respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
     personal, behavioral and location information&lt;/a&gt; of their users with
-    third parties.&lt;/p&gt;</em></ins></span>
+    third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
-    &lt;p&gt;Like</em></ins></span> most &ldquo;music screaming&rdquo; 
disservices, Spotify is
+  &lt;li id="M201508210"&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
     based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
     demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
     to realize that it is nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows the &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</em></ins></span>
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
     twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
     typical example of the attitude of the proprietary software industry
@@ -1438,40 +1544,30 @@
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
+  &lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
-    study in 2015&lt;/a&gt; found that 90% of the top-ranked 
gratis</em></ins></span> proprietary
-    <span class="inserted"><ins><em>Android</em></ins></span> apps <span 
class="removed"><del><strong>for mobile devices report which other
-    apps</strong></del></span> <span class="inserted"><ins><em>contained 
recognizable tracking libraries. For</em></ins></span> the <span 
class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</strong></del></span> <span class="inserted"><ins><em>paid
+    study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis proprietary
+    Android apps contained recognizable tracking libraries. For the paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>fact &lt;a
+    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for</em></ins></span> 
that <span class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>word</em></ins></span>
-    is <span class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as what the others 
do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
+    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>(but 
not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100 &lt;a
+  &lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis Android apps (but not &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;</em></ins></span>
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely</em></ins></span> used &lt;a
+  &lt;li id="M201504060"&gt;
+    &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
     QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
     the snooping done by the phone company, and perhaps by the OS in
@@ -1482,9 +1578,7 @@
     malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
+  &lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
@@ -1507,9 +1601,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201312060"&gt;
-    &lt;p&gt;The</em></ins></span> Brightest Flashlight app &lt;a
+    &lt;p&gt;The Brightest Flashlight app &lt;a
     
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use by <span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
     approve sending personal data to the app developer but did not ask
@@ -1519,21 +1613,20 @@
     anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
+  &lt;li id="M201212100"&gt;
     &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
     
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT skype --&gt;
   &lt;li id="M201307110"&gt;
     &lt;p&gt;Skype contains &lt;a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
@@ -1545,21 +1638,16 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT games --&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span> <span 
class="inserted"><ins><em>games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers</em></ins></span> and <span 
class="removed"><del><strong>then</strong></del></span> sends <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>it to third parties&lt;/a&gt;.&lt;/p&gt;
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
@@ -1589,26 +1677,23 @@
   &lt;li id="M201509160"&gt;
     &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
     
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of</em></ins></span> data about <span 
class="removed"><del><strong>them</strong></del></span> <span 
class="inserted"><ins><em>their users and their users'
+    collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>manipulate people to buy things, and hunt for
+    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
     &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
-    can use the same tactics.&lt;/p&gt;</em></ins></span>
+    can use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry</em></ins></span> Birds &lt;a
+  &lt;li id="M201401280"&gt;
+    &lt;p&gt;Angry Birds &lt;a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
     spies for companies, and the NSA takes advantage
     to spy through it too&lt;/a&gt;.  Here's information on &lt;a
@@ -1620,56 +1705,33 @@
     More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M200510200"&gt;
+  &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that &lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
-&lt;div <span class="removed"><del><strong>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Connected Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT stings --&gt;
-  &lt;li id="M201708280"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major</strong></del></span> <span 
class="inserted"><ins><em>bad</em></ins></span> security <span 
class="removed"><del><strong>vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen</strong></del></span> in <span 
class="removed"><del><strong>on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop</em></ins></span> on <span class="removed"><del><strong>its users 
through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The app was reporting the temperature of</strong></del></span> 
the <span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>people that use 
them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>article uses 
the term &lt;a
+    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1680,107 +1742,54 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</em></ins></span> a <span 
class="removed"><del><strong>labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked</strong></del></span> <span class="inserted"><ins><em>joke: The 
other day a woman came up to me</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</em></ins></span> the <span 
class="removed"><del><strong>vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently</em></ins></span> that 
<span class="removed"><del><strong>it</strong></del></span> was <span 
class="removed"><del><strong>anonymizing the data may be
-      true, but it doesn't really matter. If it had sold the 
data</strong></del></span>
-<span class="inserted"><ins><em>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT tvsets --&gt;
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link</em></ins></span> to <span class="removed"><del><strong>a
-      data broker,</strong></del></span> the <span 
class="removed"><del><strong>data broker would have been able to figure out
-      who</strong></del></span> <span class="inserted"><ins><em>article 
for</em></ins></span> the <span class="removed"><del><strong>user was.&lt;/p&gt;
+    load downgrades that</em></ins></span> install <span 
class="inserted"><ins><em>a surveillance app&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>facts it presents. It
-    is too bad that</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>article finishes by 
advocating the
-    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;We link to the article for the facts it presents. 
It</em></ins></span>
+    is <span class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>too bad that 
the article finishes by advocating the
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+  &lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span class="inserted"><ins><em>image is coming 
from the user's own computer,
-    the TV reports what it is. The existence of</em></ins></span> a way to 
<span class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was in these TVs,
-    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
+    surveillance, even if it were not hidden as it was in these TVs,
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web</em></ins></span> and <span 
class="removed"><del><strong>the FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>TV advertisements play inaudible
-    sounds</em></ins></span> to <span class="removed"><del><strong>these 
conversations
-      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>be picked up</em></ins></span> by <span 
class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Some web and TV advertisements play inaudible
+    sounds to be picked up by proprietary malware running
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware running</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>range so as to 
determine</em></ins></span> that <span class="removed"><del><strong>the 
specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>range so as</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and 
other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers</em></ins></span> in <span class="removed"><del><strong>its 
own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+    manufacturers in spying</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1861,9 +1870,9 @@
     <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
     what people are</em></ins></span> watching&lt;/a&gt;, even <span 
class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span 
class="inserted"><ins><em>if</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
-      you.&lt;/p&gt;
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>isn't a TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
@@ -1872,10 +1881,9 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span> <span class="inserted"><ins><em>isn't a TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
+    and</strong></del></span>
 
-  &lt;li id="M201505290"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
     this code</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
@@ -1917,79 +1925,80 @@
     &lt;p&gt;That's easy</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
+    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident</strong></del></span> that <span 
class="removed"><del><strong>Nissan has no
+    access.  The software in the car is
+    proprietary,</strong></del></span> <span class="inserted"><ins><em>when 
first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in the car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span class="inserted"><ins><em>and would then 
have to give</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>and would then have</em></ins></span> to <span 
class="removed"><del><strong>the car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>give it</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
-    the time;</strong></del></span> <span class="inserted"><ins><em>be trusted 
unless</em></ins></span> it is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>done by free
-    software in your own computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span> <span class="inserted"><ins><em>third
+    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it is <span class="removed"><del><strong>possible to physically remove the cell 
phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary</strong></del></span> 
<span class="inserted"><ins><em>done by free</em></ins></span>
+    software in <span class="removed"><del><strong>cars</strong></del></span> 
<span class="inserted"><ins><em>your own computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive</em></ins></span> information <span 
class="removed"><del><strong>about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span> <span 
class="inserted"><ins><em>will be transmitted</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+  &lt;li id="M201411090"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article,</strong></del></span> <span 
class="inserted"><ins><em>Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is 
<span class="removed"><del><strong>not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span class="removed"><del><strong>cell 
phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>case</strong></del></span> 
<span class="inserted"><ins><em>report was as</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> <span class="inserted"><ins><em>2014, but we don't 
expect</em></ins></span> this <span class="removed"><del><strong>article, is not
-      really a matter of proprietary surveillance. These 
systems</strong></del></span> <span class="inserted"><ins><em>has got
+    &lt;p&gt;The report was as</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be replaced with anonymous
+      payment systems,</strong></del></span> <span 
class="inserted"><ins><em>2014,</em></ins></span> but <span 
class="removed"><del><strong>the invasion isn't done by malware. The other
+      cases mentioned</strong></del></span> <span class="inserted"><ins><em>we 
don't expect this has got
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned</strong></del></span> <span class="inserted"><ins><em>TV 
will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware 
in</strong></del></span> <span class="inserted"><ins><em>totally inadequate.
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs</em></ins></span> are <span 
class="removed"><del><strong>done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the <span class="removed"><del><strong>car's location at 
any time. (See</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>user watches, and</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span class="inserted"><ins><em>turn 
this off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>transmission reports 
a 404 error
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store</strong></del></span> <span class="inserted"><ins><em>the switch 
to turn</em></ins></span> this <span class="removed"><del><strong>information, 
but if</strong></del></span> <span class="inserted"><ins><em>off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
@@ -2027,7 +2036,6 @@
   lot</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT cameras --&gt;
   &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>data about the 
user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
@@ -2056,7 +2064,6 @@
 <span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT toys --&gt;
   &lt;li id="M201711244"&gt;
     &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
@@ -2122,35 +2129,33 @@
     user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
       &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
       link them your IP address&lt;/a&gt; so that advertisers can track you 
       across devices.&lt;/p&gt;
  
-      &lt;p&gt;It is possible to turn</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
-
-    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by default
-      is an injustice already.&lt;/p&gt;
+      &lt;p&gt;It is possible</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it enabled by default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
-      the 600 millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the company <span class="removed"><del><strong>already
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>microphones 
&lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
       monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>has been ordered to pay a total of 
C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
       advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way</em></ins></span> to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>access the 
data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
     manufacturer's snooping.&lt;/p&gt;
 
@@ -2168,24 +2173,27 @@
     &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
       even if it isn't</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
+    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV
+      &lt;a 
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span> <span class="inserted"><ins><em>speech 
recognition
     company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;</em></ins></span>
+    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going</em></ins></span> to <span class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>would then have</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2194,12 +2202,11 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT drones --&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2209,12 +2216,10 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT home --&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>would then have to
-      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to
+      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
@@ -2253,7 +2258,7 @@
     a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
       &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying
-    on you.  Even if it is air-gapped,</em></ins></span> it <span 
class="inserted"><ins><em>could be saving up records
+    on you.  Even if</em></ins></span> it <span class="inserted"><ins><em>is 
air-gapped, it could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2278,7 +2283,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT wearables --&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
@@ -2295,7 +2299,6 @@
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT watches --&gt;
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
@@ -2332,7 +2335,6 @@
 &lt;li&gt;&lt;p&gt;Users</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT cars --&gt;
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
@@ -2363,25 +2365,25 @@
 If</strong></del></span> <span class="inserted"><ins><em>do 
because</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>system has no 
authentication
     when accessed through</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
 would that make</strong></del></span> <span class="inserted"><ins><em>modem.  
However, even if</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
-    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal to design</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
-    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and report</strong></del></span>
+    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to the 
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the 
cell phone modem
+    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track the car's movements all</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company to track the car's movements all the time;
-    it is possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>time;
+    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
@@ -2428,7 +2430,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT virtual --&gt;
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
     creates the potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
@@ -2466,7 +2467,6 @@
   &lt;li&gt;&lt;p&gt;When</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT websites --&gt;
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
@@ -2555,136 +2555,125 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger that
+      &lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT javascript --&gt;
   &lt;li id="M201807190"&gt;
-    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends Google every URL</strong></del></span>
+    &lt;p&gt;British Airways used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones and transmits audio</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal data on
-    its customers&lt;/a&gt;.&lt;/p&gt;
+    JavaScript on its web site</em></ins></span> to <span 
class="inserted"><ins><em>give other companies personal data 
on</em></ins></span>
+    its <span 
class="removed"><del><strong>servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>customers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201712300"&gt;
-    &lt;p&gt;Some JavaScript malware &lt;a
-    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome makes it 
easy for an extension to do</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201712300"&gt;
+    &lt;p&gt;Some JavaScript malware</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712210"&gt;
     &lt;p&gt;Many web sites use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
-    to snoop on information that users have</em></ins></span> typed <span 
class="removed"><del><strong>in&lt;/a&gt;, one key at</strong></del></span> 
<span class="inserted"><ins><em>into</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>form but not sent&lt;/a&gt;, in order to 
learn their identity. Some are &lt;a
+    to snoop</em></ins></span> on <span class="inserted"><ins><em>information 
that users have typed into a
+    form but not sent&lt;/a&gt;, in order to learn their identity. Some are 
&lt;a
     
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege"&gt;
-    getting sued&lt;/a&gt; for this.&lt;/p&gt;</em></ins></span>
+    getting sued&lt;/a&gt; for this.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome includes 
a module that</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711150"&gt;
+  &lt;li id="M201711150"&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all the user's input,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-       activates microphones</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
+    JavaScript code to collect all</em></ins></span> the user's <span 
class="removed"><del><strong>browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>input, &lt;a
+    
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;
+    code.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInFlash"&gt;Spyware in 
Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInFlash"&gt;Flash&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT flash --&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
-    &lt;p&gt;Flash</em></ins></span> and <span 
class="removed"><del><strong>transmits audio</strong></del></span> <span 
class="inserted"><ins><em>JavaScript are used for &lt;a
+    &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201003010"&gt;
-    &lt;p&gt;Flash Player's &lt;a
+    &lt;p&gt;Flash</em></ins></span> Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash is also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+&lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
+is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT chrome --&gt;
-  &lt;li id="M201507280"&gt;
-    &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
-    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;!-- #SpywareEverywhere --&gt;</strong></del></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware in Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash Player's
-      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The natural</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201507280"&gt;
+    &lt;p&gt;Google Chrome makes it easy for an</em></ins></span> extension 
<span class="removed"><del><strong>of monitoring people through 
+      &ldquo;their&rdquo; phones is &lt;a 
+      
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+      proprietary software</strong></del></span> to <span 
class="removed"><del><strong>make sure they can't 
&ldquo;fool&rdquo;</strong></del></span> <span class="inserted"><ins><em>do 
&lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on</em></ins></span> the 
+      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Flash is also used for</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will be able</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
-    &lt;p&gt;Google Chrome includes a module that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>its 
servers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Google Chrome includes a module that &lt;a
+    
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>listen for speech all the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;p&gt;&lt;a href="/philosophy/javascript-trap.html"&gt;Javascript 
code&lt;/a&gt;
-is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
-
-
-&lt;!-- #SpywareEverywhere --&gt;
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareEverywhere"&gt;Spyware Everywhere&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The natural extension of monitoring people through 
-      &ldquo;their&rdquo; phones is</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
-    &lt;p&gt;Google Chrome</em></ins></span> &lt;a 
-      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software to make sure they can't &ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+  &lt;li id="M201308040"&gt;
+    &lt;p&gt;Google Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
-    software.&lt;/p&gt;</em></ins></span>
+    software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will be able to listen for speech all the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200809060"&gt;
+  &lt;li id="M200809060"&gt;
     &lt;p&gt;Google Chrome contains a key logger that &lt;a
     href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
     sends Google every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</em></ins></span>
@@ -2708,7 +2697,6 @@
       real</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT networks --&gt;
   &lt;li id="M201606030"&gt;
     &lt;p&gt;Investigation Shows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
       software as malicious as many other programs listed in this
@@ -2792,7 +2780,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- po/proprietary-surveillance.ja-diff.html    7 Oct 2018 22:29:14 -0000       
1.86
+++ po/proprietary-surveillance.ja-diff.html    17 Oct 2018 10:01:36 -0000      
1.87
@@ -219,7 +219,6 @@
   &lt;li&gt;&lt;p&gt;By</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT windows --&gt;
   &lt;li id="M201712110"&gt;
     &lt;p&gt;HP's proprietary operating system &lt;a
     href="http://www.bbc.com/news/technology-42309371"&gt;includes a
@@ -309,7 +308,8 @@
 
     &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+  Windows 10</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
@@ -320,8 +320,8 @@
 
   &lt;li id="M201508130"&gt;
     &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
-    Windows 10 <span class="inserted"><ins><em>sends identifiable information 
to Microsoft&lt;/a&gt;, even if
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
@@ -421,7 +421,6 @@
       edited&lt;/a&gt;. The</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT macos --&gt;
   &lt;li id="M201809070"&gt;
     &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
@@ -501,7 +500,6 @@
   behavioral</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT bios --&gt;
   &lt;li id="M201509220"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
@@ -570,7 +568,6 @@
       lots</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT phones --&gt;
   &lt;li id="M201601110"&gt;
     &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>personal data</strong></del></span> <span 
class="inserted"><ins><em>monitoring
     people through &ldquo;their&rdquo; phones is &lt;a
@@ -626,7 +623,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT ithings --&gt;
   &lt;li id="M201711250"&gt;
     &lt;p&gt;The DMCA and the EU Copyright Directive</em></ins></span> make 
<span class="removed"><del><strong>an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
@@ -697,64 +693,61 @@
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites to track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, though that can be
-      turned off.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a
+    &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
-  <span class="removed"><del><strong>&lt;/li&gt;
+    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>web sites to track users, which 
is</strong></del></span> <span class="inserted"><ins><em>the 
state&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either</strong></del></span>
+    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks 
about</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;</em></ins></span>
+    iOS <span class="removed"><del><strong>6,</strong></del></span> <span 
class="inserted"><ins><em>8 security improvements&lt;/a&gt;;</em></ins></span> 
but <span class="removed"><del><strong>it
+      is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
 
-    <span class="inserted"><ins><em>&lt;p&gt;This may have improved with &lt;a
-    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-    iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as</em></ins></span> Apple <span 
class="removed"><del><strong>helps the NSA snoop on all the data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as</em></ins></span> Apple <span 
class="removed"><del><strong>its geolocation&lt;/a&gt; by default, though that 
can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
+    Several &ldquo;features&rdquo; of iOS seem to exist</em></ins></span>
+    for <span class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here is</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
+  &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
-    get other info too.&lt;/p&gt;
+    get other info too.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312300"&gt;
-    &lt;p&gt;&lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312300"&gt;
+    &lt;p&gt;&lt;a</em></ins></span>
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
     Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    is totally <span 
class="removed"><del><strong>incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308080"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
     tells Apple its geolocation&lt;/a&gt; by default, though that can be
@@ -762,8 +755,10 @@
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    &lt;p&gt;There is also a feature</em></ins></span> for <span 
class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>web sites to track 
users, which</em></ins></span> is <span 
class="removed"><del><strong>the</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
     enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
     still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
@@ -773,8 +768,8 @@
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
     to install even gratis apps&lt;/a&gt;) without giving a valid
     email address and receiving the verification code Apple sends
-    to it.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+    to it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
 
@@ -787,7 +782,6 @@
   &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT android --&gt;
   &lt;li id="M201711210"&gt;
     &lt;p&gt;Android tracks location for Google</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
       by</strong></del></span>
@@ -909,7 +903,6 @@
         movements before</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT e-readers --&gt;
   &lt;li id="M201603080"&gt;
     &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
 
@@ -963,7 +956,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT apps --&gt;
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>various sites 
       such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
@@ -1068,11 +1060,10 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass</em></ins></span> app
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
-    spy on users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    &lt;p&gt;The moviepass</em></ins></span> app <span 
class="inserted"><ins><em>and dis-service
+    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
@@ -1158,7 +1149,8 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
@@ -1167,20 +1159,19 @@
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
+    &lt;p&gt;Apps</em></ins></span> for <span 
class="removed"><del><strong>collecting</strong></del></span> <span 
class="inserted"><ins><em>BART &lt;a
     
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
     on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>makes 
internet-controlled vibrators</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1379,9 +1370,19 @@
     283 Android VPN apps concluded that &ldquo;in spite of</em></ins></span> 
the <span class="removed"><del><strong>e-reader used</strong></del></span> 
<span class="inserted"><ins><em>promises
     for privacy, security, and anonymity given</em></ins></span> by <span 
class="removed"><del><strong>most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span> <span class="inserted"><ins><em>the 
majority</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>VPN
-    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>check DRM!&lt;/p&gt;
+      send lots</strong></del></span> <span class="inserted"><ins><em>the 
majority</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span class="inserted"><ins><em>poor 
security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
+
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1396,83 +1397,71 @@
   snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>poor security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
 
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it</em></ins></span> has <span 
class="removed"><del><strong>a built-in cell phone modem which allows
   effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to</strong></del></span>
 <span class="inserted"><ins><em>full</em></ins></span> access <span 
class="removed"><del><strong>its computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>infringe their
-    privacy:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;
-      &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>do because 
the system has no authentication when
-    accessed through the modem.  However, even if</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
-
-      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that 
Nissan</strong></del></span> has <span class="removed"><del><strong>no
-    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>full access to users'
+    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> <span 
class="inserted"><ins><em>users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
-      for other apps and also core system logs. TigerVPN developers have
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to read 
logs
+      for other apps and also core</em></ins></span> system <span 
class="removed"><del><strong>has no authentication when
+    accessed through</strong></del></span> <span 
class="inserted"><ins><em>logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>stores detailed logs and
-      may turn them over</em></ins></span> to the <span 
class="removed"><del><strong>car remotely, the cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>UK 
government if requested.&lt;/dd&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+      may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even</strong></del></span> <span 
class="inserted"><ins><em>UK government</em></ins></span> if <span 
class="removed"><del><strong>it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.</strong></del></span> <span 
class="inserted"><ins><em>requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>HTML pages returned</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span>
-      <span class="inserted"><ins><em>users. The stated purpose 
of</em></ins></span> the <span class="removed"><del><strong>time; 
it</strong></del></span> <span class="inserted"><ins><em>JS 
injection</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
-      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users.</em></ins></span> The <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>stated purpose 
of</em></ins></span> the <span 
class="removed"><del><strong>car</strong></del></span> <span 
class="inserted"><ins><em>JS injection</em></ins></span> is
+    <span class="removed"><del><strong>proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>user's
+    &lt;p&gt;Even if no one connects</strong></del></span> to <span 
class="inserted"><ins><em>display ads. Uses
+      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="removed"><del><strong>car remotely,</strong></del></span> 
<span class="inserted"><ins><em>user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
       &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
-
-      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>also uses roughly
-      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> this <span class="removed"><del><strong>article, is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>app have confirmed that
-      the non-premium version</em></ins></span> of <span 
class="removed"><del><strong>privacy,</strong></del></span> <span 
class="inserted"><ins><em>the app does JavaScript injection for
-      tracking the user</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers of this app have confirmed 
that</em></ins></span>
+      the <span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of</em></ins></span> the <span 
class="removed"><del><strong>phone company to track</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection for
+      tracking</em></ins></span> the <span class="removed"><del><strong>car's 
movements</strong></del></span> <span class="inserted"><ins><em>user and 
displaying ads.&lt;/dd&gt;
     &lt;/dl&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609210"&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</em></ins></span>
+    all
+    <span class="removed"><del><strong>the time; it is possible to physically 
remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion of privacy,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>suggests you to share</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
       cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>picture you take according to who 
is</em></ins></span>
     in the <span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
@@ -1488,22 +1477,8 @@
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even</em></ins></span> if the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> the <span 
class="inserted"><ins><em>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
-    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only can &lt;a
-    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of</em></ins></span> data <span 
class="inserted"><ins><em>in the phone,</em></ins></span> and <span 
class="removed"><del><strong>hand</strong></del></span> <span 
class="inserted"><ins><em>in server accounts,</em></ins></span>
-    it <span class="removed"><del><strong>over, the 
state</strong></del></span> can <span class="removed"><del><strong>store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>alter them 
too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    even</em></ins></span> if the <span class="removed"><del><strong>state 
orders it</strong></del></span> <span class="inserted"><ins><em>user didn't 
&ldquo;upload&rdquo; them</em></ins></span> to <span 
class="removed"><del><strong>get the data
+      and hand it over,</strong></del></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1511,10 +1486,10 @@
 &lt;!-- #SpywareAtHome --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include &lt;a
-    
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a
+    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
@@ -1524,82 +1499,107 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed to spy</strong></del></span> <span 
class="inserted"><ins><em>what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>what people are listening to or watching&lt;/a&gt;. 
In addition,
+    it may be analyzing people's conversations</em></ins></span> to <span 
class="inserted"><ins><em>serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  &lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;</em></ins></span>
+    spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>many sorts of data</em></ins></span> in <span 
class="removed"><del><strong>TV Sets&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
-    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated</em></ins></span> to <span class="removed"><del><strong>me and
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>app's 
functionality,</em></ins></span> was
-<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently</strong></del></span> 
<span class="inserted"><ins><em>phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps</em></ins></span> that <span class="removed"><del><strong>was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span 
class="inserted"><ins><em>include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop</em></ins></span> on <span 
class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>report 
was</strong></del></span> <span class="inserted"><ins><em>article should not 
have described these apps</em></ins></span> as <span 
class="removed"><del><strong>of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>&ldquo;free&rdquo;&mdash;they</em></ins></span> are 
<span class="removed"><del><strong>totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV 
will</strong></del></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would</strong></del></span> <span 
class="inserted"><ins><em>free software.  The clear way
-    to</em></ins></span> say <span class="inserted"><ins><em>&ldquo;zero 
price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>TVs</strong></del></span> <span 
class="inserted"><ins><em>the usual analytics tools</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span>
-    <span class="inserted"><ins><em>legitimate, but is that valid? Software 
developers have no right</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span>
-    <span class="inserted"><ins><em>analyze</em></ins></span> what
-      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users are doing or how.  &ldquo;Analytics&rdquo; tools
+      consent before collecting personal data are totally inadequate.
+      And</strong></del></span> what <span 
class="removed"><del><strong>happens if a user declines consent?  Probably 
the</strong></del></span> <span class="inserted"><ins><em>radio 
and</em></ins></span> TV
+      <span class="removed"><del><strong>will say, &ldquo;Without your 
consent</strong></del></span> <span class="inserted"><ins><em>programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511190"&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    unrelated</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article should</em></ins></span> not <span 
class="removed"><del><strong>work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say that TVs</strong></del></span> <span 
class="inserted"><ins><em>have described these apps as
+    &ldquo;free&rdquo;&mdash;they</em></ins></span> are not <span 
class="removed"><del><strong>allowed</strong></del></span> <span 
class="inserted"><ins><em>free software.  The clear way</em></ins></span>
+    to <span class="removed"><del><strong>report what</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash;</strong></del></span> <span 
class="inserted"><ins><em>usual analytics tools are
+    legitimate, but is that valid? Software developers have</em></ins></span> 
no <span 
class="removed"><del><strong>exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
     &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>other TV manufacturers in spying on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>73%</em></ins></span> and 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>73% and 47% of mobile applications, from Android and 
iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
+    personal, behavioral</em></ins></span> and 
       <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
       across devices.&lt;/p&gt;
  
-      &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>47% of 
mobile applications, from Android and iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral and location information&lt;/a&gt; of their users with
+      &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span 
class="removed"><del><strong>possible</strong></del></span>
-    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015 it &lt;a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having</strong></del></span> 
<span class="inserted"><ins><em>increased snooping&lt;/a&gt;, and some are 
starting
-    to realize that</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice already.&lt;/p&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>possible to 
turn this off, but having</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015</em></ins></span> it <span 
class="removed"><del><strong>enabled by default
+      is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing 
all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded</em></ins></span> users <span 
class="inserted"><ins><em>submit</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>increased snooping&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>some are 
starting</em></ins></span>
+    to <span class="removed"><del><strong>be
+      picked up by proprietary malware running on other devices in
+      range so</strong></del></span> <span class="inserted"><ins><em>realize 
that it is nasty.&lt;/p&gt;
 
     &lt;p&gt;This article shows the &lt;a
     
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way</em></ins></span> to 
<span class="inserted"><ins><em>&ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>attitude 
of</em></ins></span> the <span class="removed"><del><strong>company already
-      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>proprietary software industry
+    twisted ways that they present snooping</em></ins></span> as <span 
class="inserted"><ins><em>a way</em></ins></span> to <span 
class="removed"><del><strong>determine that</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether</em></ins></span> they 
<span class="inserted"><ins><em>want that. This is a
+    typical example of the attitude of the proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1613,31 +1613,28 @@
     proprietary apps, it was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>not in fact</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>not in 
fact</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.  It also uses the
     ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
 
-  &lt;li id="M201505060"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>100 &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
-    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds to be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs,</em></ins></span> on 
<span class="removed"><del><strong>other devices</strong></del></span> <span 
class="inserted"><ins><em>the average.&lt;/p&gt;
+    and <span class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on the 
average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This 
is</em></ins></span> in
-      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>addition</em></ins></span> to <span 
class="removed"><del><strong>determine that they</strong></del></span>
-    <span class="inserted"><ins><em>the snooping done by the phone company, 
and perhaps by the OS in
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+    the snooping done by the phone company, and perhaps by the OS in
     the phone.&lt;/p&gt;
 
     &lt;p&gt;Don't be distracted by the question of whether the app developers
@@ -1694,7 +1691,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT skype --&gt;
   &lt;li id="M201307110"&gt;
     &lt;p&gt;Skype contains &lt;a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
@@ -1711,7 +1707,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT games --&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
@@ -1793,7 +1788,6 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT stings --&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -1818,7 +1812,6 @@
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT tvsets --&gt;
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
@@ -1925,10 +1918,9 @@
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>nearby.  Once</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without</em></ins></span> your
-      <span class="removed"><del><strong>Internet</strong></del></span> <span 
class="inserted"><ins><em>consent to tracking, the TV will not
+    say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
@@ -1944,7 +1936,7 @@
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other</em></ins></span> devices <span 
class="inserted"><ins><em>on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
@@ -1958,7 +1950,7 @@
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who</em></ins></span> are <span 
class="removed"><del><strong>paired</strong></del></span> <span 
class="inserted"><ins><em>watching TV.&lt;/p&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1969,7 +1961,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT cameras --&gt;
   &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
@@ -1993,7 +1984,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT toys --&gt;
   &lt;li id="M201711244"&gt;
     &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
@@ -2018,8 +2008,7 @@
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard</em></ins></span> with <span class="removed"><del><strong>your 
TV, advertisers can
-      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>which manufacturers would make statements about their
+    standard with which manufacturers would make statements about their
     products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
@@ -2033,47 +2022,50 @@
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Web activity,</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
     leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
     Crackers found a way to access the data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and
-      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen to these
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>listening all</strong></del></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on the internet</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
+    conversations</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.</strong></del></span> Nuance <span 
class="inserted"><ins><em>Communications&lt;/a&gt;, a speech recognition
     company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>save it and</strong></del></span> 
<span class="inserted"><ins><em>remotely control the toys with a mobile phone. 
This</em></ins></span> would <span class="removed"><del><strong>then have to
+      give it</strong></del></span> <span class="inserted"><ins><em>enable
+    crackers</em></ins></span> to <span class="inserted"><ins><em>listen in on 
a child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>US or some other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not</strong></del></span>
+    <span class="inserted"><ins><em>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>spy on children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -2083,12 +2075,12 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT drones --&gt;
   &lt;li id="M201708040"&gt;
     &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+    to snoop on other people, DJI is</em></ins></span> in <span 
class="inserted"><ins><em>many cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2098,51 +2090,43 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT home --&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>would then have to
-      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the US
-    <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span> 
or <span class="removed"><del><strong>some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>cease</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
-    by free software</strong></del></span> <span 
class="inserted"><ins><em>sell the product</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>that country,
+    &lt;p&gt;Crackers found a way to break</em></ins></span> the <span 
class="removed"><del><strong>user watches,</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
+    and
+      <span class="removed"><del><strong>the switch to</strong></del></span> 
<span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;</em></ins></span>
+    turn <span class="removed"><del><strong>this off has no effect.  (The fact 
that the
+      transmission reports</strong></del></span> <span 
class="inserted"><ins><em>it into</em></ins></span> a <span 
class="removed"><del><strong>404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>listening 
device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>server
+      could save</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it</strong></del></span> <span 
class="inserted"><ins><em>country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
     &lt;p&gt;These crackers are probably hackers too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what 
the</strong></del></span>
+  &lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its</em></ins></span> 
user <span class="removed"><del><strong>watches, and</strong></del></span> 
<span class="inserted"><ins><em>by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that</em></ins></span> snoops on 
<span class="removed"><del><strong>other devices on</strong></del></span> <span 
class="inserted"><ins><em>its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact that</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>server
-      could save</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
-    on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
+    listen</em></ins></span> to <span class="removed"><del><strong>stop this, 
but</strong></del></span> <span class="inserted"><ins><em>everyone in the 
house, all the time&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped,</em></ins></span> it 
<span class="removed"><del><strong>had installed a patch to stop this, but any 
product</strong></del></span> could <span class="removed"><del><strong>spy this 
way.&lt;/p&gt;
+    &lt;p&gt;Today's technological practice does not include</em></ins></span> 
any <span class="removed"><del><strong>product</strong></del></span> <span 
class="inserted"><ins><em>way of making
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it</em></ins></span> could <span 
class="removed"><del><strong>spy this way.&lt;/p&gt;
 
       &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
     about you for later examination.&lt;/p&gt;
@@ -2169,43 +2153,42 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT wearables --&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often</em></ins></span> people <span 
class="removed"><del><strong>watch, and even</strong></del></span> <span 
class="inserted"><ins><em>wear it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;</em></ins></span>
+    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="inserted"><ins><em>&lt;h5 
id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
+&lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
-&lt;ul class="blurbs"&gt;</em></ins></span>
-&lt;!-- <span 
class="removed"><del><strong>#SpywareAtPlay</strong></del></span> <span 
class="inserted"><ins><em>INSERT watches</em></ins></span> --&gt;
-<span class="removed"><del><strong>&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware</strong></del></span>
-  <span class="inserted"><ins><em>&lt;li id="M201603020"&gt;
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly 
surveillance,</em></ins></span> at <span 
class="removed"><del><strong>Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>least.&lt;/p&gt;
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407090"&gt;
     &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else and to transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;
+    to report its location</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>someone else and to transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
   &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
@@ -2215,11 +2198,9 @@
   &lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT cars --&gt;
   &lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
     track your every move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2233,14 +2214,15 @@
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;That's easy to do because the system has no authentication
     when accessed through the modem.  However, even if it asked
     for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even if no one connects</em></ins></span> to the 
@@ -2296,7 +2278,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT virtual --&gt;
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
     creates</em></ins></span> the <span class="removed"><del><strong>game 
play</strong></del></span> <span 
class="inserted"><ins><em>potential</em></ins></span> for <span 
class="removed"><del><strong>specific players.&lt;/p&gt;
@@ -2334,7 +2315,6 @@
   &lt;li&gt;&lt;p&gt;Online</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT websites --&gt;
   &lt;li id="M201805170"&gt;
     &lt;p&gt;The Storyful program &lt;a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch"&gt;spies
@@ -2418,7 +2398,6 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT javascript --&gt;
   &lt;li id="M201807190"&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
@@ -2445,35 +2424,34 @@
     &lt;p&gt;Some websites send
     JavaScript code to collect all</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>user's input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
-    can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
+    can then be used</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;
+    code.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
 
-&lt;div class="big-subsection"&gt;
+
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT flash --&gt;
   &lt;li id="M201310110"&gt;
     &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>identify users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>identify 
users.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201003010"&gt;
     &lt;p&gt;Flash Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items on top under each subsection --&gt;</strong></del></span>
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
@@ -2485,7 +2463,6 @@
   &lt;li&gt;&lt;p&gt;Google</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT chrome --&gt;
   &lt;li id="M201507280"&gt;
     &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
@@ -2567,7 +2544,6 @@
       real</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-&lt;!-- INSERT networks --&gt;
   &lt;li id="M201606030"&gt;
     &lt;p&gt;Investigation Shows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
       software as malicious as many other programs listed in this
@@ -2651,7 +2627,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/proprietary-surveillance.ru-en.html      7 Oct 2018 22:29:14 -0000       
1.130
+++ po/proprietary-surveillance.ru-en.html      17 Oct 2018 10:01:36 -0000      
1.131
@@ -179,7 +179,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT windows -->
   <li id="M201712110">
     <p>HP's proprietary operating system <a
     href="http://www.bbc.com/news/technology-42309371";>includes a
@@ -345,7 +344,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT macos -->
   <li id="M201809070">
     <p>Adware Doctor, an ad blocker for MacOS, <a
     
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history";>reports
@@ -408,7 +406,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT bios -->
   <li id="M201509220">
     <p><a
     
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
@@ -435,7 +432,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT phones -->
   <li id="M201601110">
     <p>The natural extension of monitoring
     people through &ldquo;their&rdquo; phones is <a
@@ -483,7 +479,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT ithings -->
   <li id="M201711250">
     <p>The DMCA and the EU Copyright Directive make it <a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html";>
@@ -606,7 +601,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT android -->
   <li id="M201711210">
     <p>Android tracks location for Google <a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml";>
@@ -700,7 +694,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT e-readers -->
   <li id="M201603080">
     <p>E-books can contain JavaScript code, and <a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds";>
@@ -742,7 +735,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT apps -->
   <li id="M201808030">
     <p>Some Google apps on Android <a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile";>
@@ -1145,7 +1137,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT skype -->
   <li id="M201307110">
     <p>Skype contains <a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>spyware</a>.
@@ -1162,7 +1153,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT games -->
   <li id="M201806240">
     <p>Red Shell is a spyware that
     is found in many proprietary games. It <a
@@ -1244,7 +1234,6 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-<!-- INSERT stings -->
   <li id="M201708280">
     <p>The bad security in many Internet of Stings devices allows <a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml";>ISPs
@@ -1269,7 +1258,6 @@
 before Amazon &ldquo;smart&rdquo; TVs.</p>
 
 <ul class="blurbs">
-<!-- INSERT tvsets -->
   <li id="M201804010">
     <p>Some &ldquo;Smart&rdquo; TVs automatically <a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928";>
@@ -1419,7 +1407,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT cameras -->
   <li id="M201603220">
     <p>Over 70 brands of network-connected surveillance cameras have <a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>
@@ -1443,7 +1430,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT toys -->
   <li id="M201711244">
     <p>The Furby Connect has a <a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect";>
@@ -1526,7 +1512,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT drones -->
   <li id="M201708040">
     <p>While you're using a DJI drone
     to snoop on other people, DJI is in many cases <a
@@ -1541,7 +1526,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT home -->
   <li id="M201808120">
     <p>Crackers found a way to break the security of an Amazon device,
     and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html";>
@@ -1595,7 +1579,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT wearables -->
   <li id="M201807260">
     <p>Tommy Hilfiger clothing <a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers";>will
@@ -1610,7 +1593,6 @@
 <h5 id="SpywareOnSmartWatches">&ldquo;Smart&rdquo; Watches</h5>
 
 <ul class="blurbs">
-<!-- INSERT watches -->
   <li id="M201603020">
     <p>A very cheap &ldquo;smart watch&rdquo; comes with an Android app <a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/";>
@@ -1635,7 +1617,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT cars -->
   <li id="M201711230">
     <p>AI-powered driving apps can <a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move";>
@@ -1698,7 +1679,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT virtual -->
   <li id="M201612230">
     <p>VR equipment, measuring every slight motion,
     creates the potential for the most intimate
@@ -1728,7 +1708,6 @@
    but the surveillance is an abuse all the same.</p>
 
 <ul class="blurbs">
-<!-- INSERT websites -->
   <li id="M201805170">
     <p>The Storyful program <a
     
href="https://www.theguardian.com/world/2018/may/17/revealed-how-storyful-uses-tool-monitor-what-journalists-watch";>spies
@@ -1794,7 +1773,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT javascript -->
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -1835,7 +1813,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT flash -->
   <li id="M201310110">
     <p>Flash and JavaScript are used for <a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
@@ -1856,7 +1833,6 @@
 </div>
 
 <ul class="blurbs">
-<!-- INSERT chrome -->
   <li id="M201507280">
     <p>Google Chrome makes it easy for an extension to do <a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
@@ -1892,7 +1868,6 @@
 <div style="clear: left;"></div>
 
 <ul class="blurbs">
-<!-- INSERT networks -->
   <li id="M201606030">
     <p>Investigation Shows <a
     
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
@@ -1969,7 +1944,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/07 22:29:14 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-tethers.fr-en.html   9 Oct 2018 13:30:42 -0000       1.19
+++ po/proprietary-tethers.fr-en.html   17 Oct 2018 10:01:36 -0000      1.20
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
 
 <ul class="blurbs">
-<!-- INSERT tethers -->
   <li id="M201809260">
     <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -219,7 +218,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary-tethers.ja-diff.html 9 Oct 2018 13:30:42 -0000       1.17
+++ po/proprietary-tethers.ja-diff.html 17 Oct 2018 10:01:36 -0000      1.18
@@ -47,10 +47,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-tethers"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT tethers --&gt;
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -92,7 +91,7 @@
     turning off the server through which the products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect this</em></ins></span> is <span 
class="inserted"><ins><em>to pressure them to buy a newer model. If
+    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
     they are wise, they will learn, rather, to distrust any product that
     requires users to talk with them through some specialized 
service.&lt;/p&gt;
   &lt;/li&gt;
@@ -100,10 +99,7 @@
   &lt;li id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and</em></ins></span> tethered to a <span 
class="removed"><del><strong>server.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>server that 
requires
+    with a universal back door, and tethered to a server that requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -117,8 +113,8 @@
     &lt;p&gt;With manufacturers like these, who needs security 
breakers?&lt;/p&gt;
 
     &lt;p&gt;The purchasers should learn the larger lesson and reject connected
-    appliances with embedded proprietary software. Every such product is
-    a temptation to commit sabotage.&lt;/p&gt;
+    appliances with embedded proprietary software. Every such 
product</em></ins></span> is
+    <span class="inserted"><ins><em>a temptation to commit sabotage.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705180"&gt;
@@ -130,7 +126,10 @@
 
   &lt;li id="M201704120"&gt;
     &lt;p&gt;Anova sabotaged users' cooking devices
-    with a downgrade that tethered them to a remote server. &lt;a
+    with a downgrade that</em></ins></span> tethered <span 
class="inserted"><ins><em>them</em></ins></span> to a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>remote 
server. &lt;a
     
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
     users create an account on Anova's servers, their cookers won't
     function&lt;/a&gt;.&lt;/p&gt;
@@ -248,7 +247,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-tethers.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary-tethers.ru-en.html   9 Oct 2018 13:30:42 -0000       1.18
+++ po/proprietary-tethers.ru-en.html   17 Oct 2018 10:01:36 -0000      1.19
@@ -33,10 +33,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tethers"></div>
 
 <ul class="blurbs">
-<!-- INSERT tethers -->
   <li id="M201809260">
     <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -219,7 +218,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tyrants.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-tyrants.fr-en.html   9 Oct 2018 13:30:42 -0000       1.19
+++ po/proprietary-tyrants.fr-en.html   17 Oct 2018 10:01:36 -0000      1.20
@@ -35,10 +35,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
 
 <ul class="blurbs">
-<!-- INSERT tyrants -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -161,7 +160,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tyrants.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-tyrants.it-diff.html 9 Oct 2018 13:30:42 -0000       1.8
+++ po/proprietary-tyrants.it-diff.html 17 Oct 2018 10:01:36 -0000      1.9
@@ -51,10 +51,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-tyrants"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT tyrants --&gt;
   &lt;li id="M201607150"&gt;
     &lt;p&gt;Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has &lt;a
@@ -221,7 +220,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-tyrants.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ja-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-tyrants.ja-diff.html 9 Oct 2018 13:30:42 -0000       1.8
+++ po/proprietary-tyrants.ja-diff.html 17 Oct 2018 10:01:36 -0000      1.9
@@ -51,10 +51,9 @@
 to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
-&lt;div class="column-limit"&gt;&lt;/div&gt;
+&lt;div class="column-limit" id="proprietary-tyrants"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT tyrants --&gt;
   &lt;li id="M201607150"&gt;
     &lt;p&gt;Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has &lt;a
@@ -221,7 +220,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-tyrants.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-tyrants.ru-en.html   9 Oct 2018 13:30:42 -0000       1.19
+++ po/proprietary-tyrants.ru-en.html   17 Oct 2018 10:01:36 -0000      1.20
@@ -35,10 +35,9 @@
 to present the specifics.</p>
 </div>
 </div>
-<div class="column-limit"></div>
+<div class="column-limit" id="proprietary-tyrants"></div>
 
 <ul class="blurbs">
-<!-- INSERT tyrants -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -161,7 +160,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 13:30:42 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- po/proprietary.fr-en.html   14 Oct 2018 12:58:19 -0000      1.28
+++ po/proprietary.fr-en.html   17 Oct 2018 10:01:36 -0000      1.29
@@ -141,7 +141,6 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-<!-- INSERT proprietary -->
   <li id="M201805080">
     <p>A cracker used an exploit in outdated software to <a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
@@ -256,7 +255,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 12:58:19 $
+$Date: 2018/10/17 10:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary.it-diff.html 14 Oct 2018 11:58:30 -0000      1.13
+++ po/proprietary.it-diff.html 17 Oct 2018 10:01:37 -0000      1.14
@@ -179,7 +179,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT proprietary --&gt;
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -294,7 +293,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/proprietary.ja-diff.html 14 Oct 2018 11:58:30 -0000      1.15
+++ po/proprietary.ja-diff.html 17 Oct 2018 10:01:37 -0000      1.16
@@ -152,10 +152,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -176,7 +176,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT proprietary --&gt;
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -291,7 +290,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/proprietary.nl-diff.html 14 Oct 2018 11:58:30 -0000      1.13
+++ po/proprietary.nl-diff.html 17 Oct 2018 10:01:37 -0000      1.14
@@ -44,13 +44,13 @@
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 40em; }
-&lt;/style&gt;</em></ins></span>
+#TOC { width: 40em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -154,10 +154,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -179,7 +179,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT proprietary --&gt;
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -294,7 +293,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- po/proprietary.pl-diff.html 14 Oct 2018 11:58:30 -0000      1.31
+++ po/proprietary.pl-diff.html 17 Oct 2018 10:01:37 -0000      1.32
@@ -40,8 +40,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -122,17 +122,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -153,10 +153,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -177,7 +177,6 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT proprietary --&gt;
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -292,7 +291,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/14 11:58:30 $
+$Date: 2018/10/17 10:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pt-br-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary.pt-br-en.html        14 Oct 2018 23:57:58 -0000      1.4
+++ po/proprietary.pt-br-en.html        17 Oct 2018 10:01:37 -0000      1.5
@@ -141,7 +141,6 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-<!-- INSERT proprietary -->
   <li id="M201805080">
     <p>A cracker used an exploit in outdated software to <a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
@@ -256,7 +255,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 23:57:58 $
+$Date: 2018/10/17 10:01:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/proprietary.ru-en.html   14 Oct 2018 13:28:28 -0000      1.29
+++ po/proprietary.ru-en.html   17 Oct 2018 10:01:37 -0000      1.30
@@ -141,7 +141,6 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
-<!-- INSERT proprietary -->
   <li id="M201805080">
     <p>A cracker used an exploit in outdated software to <a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito";>
@@ -256,7 +255,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/14 13:28:28 $
+$Date: 2018/10/17 10:01:37 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]