www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-amazon.de.html malware-...


From: GNUN
Subject: www/proprietary malware-amazon.de.html malware-...
Date: Sun, 21 Oct 2018 04:58:07 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/21 04:58:07

Modified files:
        proprietary    : malware-amazon.de.html malware-google.de.html 
        proprietary/po : malware-amazon.de-diff.html 
                         malware-google.de-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.de.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.de.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.2&r2=1.3

Patches:
Index: malware-amazon.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.de.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-amazon.de.html      25 Oct 2017 11:30:12 -0000      1.4
+++ malware-amazon.de.html      21 Oct 2018 08:58:04 -0000      1.5
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-amazon.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-amazon.de.po">
+ https://www.gnu.org/proprietary/po/malware-amazon.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-amazon.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-amazon.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-08-22" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-amazon.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -21,6 +26,7 @@
 </style>
 
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Amazons Software ist Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -253,7 +259,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/10/25 11:30:12 $
+$Date: 2018/10/21 08:58:04 $
 
 <!-- timestamp end -->
 </p>

Index: malware-google.de.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.de.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-google.de.html      19 May 2018 11:33:05 -0000      1.9
+++ malware-google.de.html      21 Oct 2018 08:58:07 -0000      1.10
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/malware-google.de.po">
+ https://www.gnu.org/proprietary/po/malware-google.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/malware-google.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/malware-google.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-08-22" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/malware-google.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
 
 <!--#include virtual="/proprietary/po/malware-google.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Googles Software ist Schadsoftware</h2>
 
 <p><a href="/proprietary/">Weitere Beispiele proprietärer 
Schadsoftware</a></p>
@@ -403,7 +409,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/05/19 11:33:05 $
+$Date: 2018/10/21 08:58:07 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-amazon.de-diff.html      16 Apr 2017 09:59:32 -0000      1.1
+++ po/malware-amazon.de-diff.html      21 Oct 2018 08:58:07 -0000      1.2
@@ -11,42 +11,32 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: 1.79 --&gt;
-<span class="removed"><del><strong>&lt;title&gt;Malware in the Kindle 
Swindle</strong></del></span>
-<span class="inserted"><ins><em>&lt;title&gt;Amazon's Software Is 
Malware</em></ins></span>
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.86 --&gt;
+&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as &lt;li id="Mnnnnnnnn"&gt;!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~</em></ins></span>
+--&gt;
+&lt;title&gt;Amazon's Software Is Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-amazon.translist" --&gt;
-&lt;style type="text/css" <span 
class="removed"><del><strong>media="print,screen"&gt;
-&lt;!--
-#content</strong></del></span> <span 
class="inserted"><ins><em>media="print,screen"&gt;&lt;!--</em></ins></span>
-div.toc <span class="removed"><del><strong>li</strong></del></span> { <span 
class="removed"><del><strong>list-style: none; margin-bottom: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 100%; 
padding: 1.3em 3%;</em></ins></span> }
-<span class="removed"><del><strong>#content</strong></del></span>
-div.toc <span class="inserted"><ins><em>h3</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>display: inline; margin: 0 1.5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;
-&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>div.toc ul { display: inline; margin: 0; }
+<span class="removed"><del><strong>&lt;style type="text/css" 
media="print,screen"&gt;&lt;!--
+div.toc { width: 100%; padding: 1.3em 3%; }
+div.toc h3 { display: inline; margin: 0 1.5%; }
+div.toc ul { display: inline; margin: 0; }
 div.toc li {
    display: inline;
    list-style: none;
    font-size: 1.3em;
    margin: 0 1.5%;
 }
---&gt;&lt;/style&gt;</em></ins></span>
+--&gt;&lt;/style&gt;</strong></del></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
-<span class="removed"><del><strong>&lt;h2&gt;Malware in the Kindle 
Swindle&lt;/h2&gt;
-
-&lt;a</strong></del></span>
-<span class="inserted"><ins><em>&lt;h2&gt;Amazon's Software Is 
Malware&lt;/h2&gt;
+&lt;h2&gt;Amazon's Software Is Malware&lt;/h2&gt;
 
-&lt;p&gt;&lt;a</em></ins></span> href="/proprietary/proprietary.html"&gt;Other 
examples of proprietary <span class="removed"><del><strong>malware&lt;/a&gt;
-
-&lt;p&gt;We refer to this product as the
-&lt;a href="/philosophy/why-call-it-the-swindle.html"&gt;Amazon 
Swindle&lt;/a&gt;
-because it has &lt;a href="/philosophy/proprietary-drm.html"&gt;Digital 
restrictions
-management (DRM)&lt;/a&gt;  and &lt;a href="/philosophy/ebooks.html"&gt;
-other malicious functionalities&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>malware&lt;/a&gt;&lt;/p&gt;</em></ins></span>
+&lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary malware&lt;/a&gt;&lt;/p&gt;
 
-&lt;div class="highlight-para"&gt;
+&lt;div <span 
class="removed"><del><strong>class="highlight-para"&gt;</strong></del></span> 
<span class="inserted"><ins><em>class="comment"&gt;</em></ins></span>
 &lt;p&gt;
 Malware and nonfree software are two different issues.  Malware means
 the program is designed to mistreat or harm users when it runs.  The
@@ -59,28 +49,41 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
-&lt;/div&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
-&lt;div <span 
class="removed"><del><strong>class="toc"&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="toc c"&gt;
+&lt;div <span class="removed"><del><strong>class="toc c"&gt;
   &lt;h3&gt;Type&nbsp;of product:&lt;/h3&gt;
   &lt;ul&gt;
     &lt;li&gt;&lt;a href="#swindle"&gt;Kindle&nbsp;Swindle&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a href="#echo"&gt;Echo&lt;/a&gt;&lt;/li&gt;
-  &lt;/ul&gt;
+  &lt;/ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="important"&gt;
+&lt;p&gt;If you know of an example that ought to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;h2 id="swindle"&gt;Malware in the Kindle Swindle&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
+
+&lt;p class="c" style="font-size: 1.2em"&gt;
+&nbsp;&lt;a href="#swindle"&gt;Kindle&nbsp;Swindle&lt;/a&gt;&nbsp;
+&nbsp;&lt;a href="#echo"&gt;Echo&lt;/a&gt;&nbsp;
+&nbsp;&lt;a href="#misc"&gt;Other&nbsp;products&lt;/a&gt;&nbsp;
+&lt;/p&gt;
+
+&lt;h3</em></ins></span> id="swindle"&gt;Malware in the Kindle <span 
class="removed"><del><strong>Swindle&lt;/h2&gt;</strong></del></span> <span 
class="inserted"><ins><em>Swindle&lt;/h3&gt;</em></ins></span>
 
 &lt;p&gt;We refer to this product as the
 &lt;a href="/philosophy/why-call-it-the-swindle.html"&gt;Amazon 
Swindle&lt;/a&gt;
-because it has &lt;a href="/philosophy/proprietary-drm.html"&gt;Digital 
restrictions
+because it has &lt;a href="/proprietary/proprietary-drm.html"&gt;Digital 
restrictions
 management (DRM)&lt;/a&gt;  and &lt;a href="/philosophy/ebooks.html"&gt;
-other malicious functionalities&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+other malicious functionalities&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div <span 
class="removed"><del><strong>class="malfunctions"&gt;</strong></del></span> 
<span class="inserted"><ins><em>class="summary" style="margin-top: 1em"&gt;
-    &lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;div class="summary" style="margin-top: 
1em"&gt;
+    &lt;h3&gt;Type&nbsp;of malware&lt;/h3&gt;
     &lt;ul&gt;
-<span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
       &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
       &lt;!--&lt;li&gt;&lt;a 
href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;--&gt;
       &lt;!--&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;--&gt;
@@ -89,73 +92,155 @@
       &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
       &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
          management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities 
designed
-       to restrict what users can do with the data in their 
computers.&lt;/li&gt;
+       to restrict what users can do with</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;h4 id="back-doors"&gt;Back Doors&lt;/h4&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201503210"&gt;
+    &lt;p&gt;Amazon &lt;a
+    
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml"&gt;
+    downgraded</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>software</em></ins></span> in <span 
class="removed"><del><strong>their computers.&lt;/li&gt;
       &lt;!--&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
          that impose censorship on application programs.&lt;/li&gt;--&gt;
-      &lt;!--&lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-         that reject any operating system not &ldquo;authorized&rdquo; by the
+      &lt;!--&lt;li&gt;&lt;a 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span> <span 
class="inserted"><ins><em>users' Swindles&lt;/a&gt; so</em></ins></span> that 
<span class="removed"><del><strong>reject any operating system not 
&ldquo;authorized&rdquo; by the
          manufacturer.&lt;/li&gt;--&gt;
     &lt;/ul&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
 
 &lt;h3 id="back-doors"&gt;Amazon Kindle Swindle Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to
-      &lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
-       remotely erase books&lt;/a&gt;.  One of the books erased was 1984, by 
George Orwell.
-    &lt;/p&gt;
-
-    &lt;p&gt;Amazon responded to criticism by saying it would delete books only
-      following orders from the state.  However, that policy didn't last.
-      In 2012
-      it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
-       a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered 
her
-      kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;
-    &lt;p&gt;The Kindle also has a
-      &lt;a 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
+  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>those 
already
+    rooted would cease to function at all.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201210221"&gt;</em></ins></span>
+    &lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to 
&lt;a
+    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+    remotely erase books&lt;/a&gt;.  One of the books erased was <span 
class="removed"><del><strong>1984,</strong></del></span>
+    <span 
class="inserted"><ins><em>&lt;cite&gt;1984&lt;/cite&gt;,</em></ins></span> by 
George <span class="removed"><del><strong>Orwell.
+    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Orwell.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;Amazon responded to criticism by saying it
+    would delete books only following orders from the
+    state.  However, that policy didn't last.  In 2012 it &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
+    wiped</em></ins></span> a user's Kindle-Swindle and deleted her 
account&lt;/a&gt;, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+  &lt;/li&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200700000"&gt;</em></ins></span>
+    &lt;p&gt;The Kindle also has a &lt;a
+    
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
        universal back door&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;Amazon &lt;a 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml"&gt;
+    <span class="removed"><del><strong>&lt;p&gt;Amazon &lt;a 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml"&gt;
        downgraded the software in users' Swindles&lt;/a&gt;
-      so that those already rooted would cease to function at 
all.&lt;/p&gt;&lt;/li&gt;
+      so that those already rooted would cease to function at 
all.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
-&lt;h3 id="surveillance"&gt;Amazon Kindle Swindle Surveillance&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 id="surveillance"&gt;Amazon Kindle 
Swindle Surveillance&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The Electronic Frontier Foundation has examined and found 
&lt;a
-  href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various kinds 
of
-       surveillance in the Swindle and other 
e-readers&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+
+<span class="inserted"><ins><em>&lt;h4 
id="surveillance"&gt;Surveillance&lt;/h4&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201212031"&gt;
+    &lt;p&gt;The</em></ins></span> Electronic Frontier Foundation has examined 
and found &lt;a
+    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
+    kinds of surveillance in the Swindle and other <span 
class="removed"><del><strong>e-readers&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>e-readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
-&lt;h3 id="drm"&gt;Amazon Kindle Swindle DRM&lt;/h3&gt;
+<span class="removed"><del><strong>&lt;h3 id="drm"&gt;Amazon Kindle Swindle 
DRM&lt;/h3&gt;
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+
+
+<span class="inserted"><ins><em>&lt;h4 id="drm"&gt;DRM&lt;/h4&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;&lt;a</em></ins></span> 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
        The Amazon Kindle has DRM&lt;/a&gt;. That article is flawed in that it
       fails to treat DRM as an ethical question; it takes for granted that
-      whatever Amazon might do to its users is legitimate. It refers to DRM
-      as digital &ldquo;rights&rdquo; management, which is the spin term
-      used to promote DRM. Nonetheless it serves as a reference for the
-      facts.&lt;/p&gt;&lt;/li&gt;
+    whatever Amazon might do to its users is legitimate.  It refers to
+    DRM as digital &ldquo;rights&rdquo; management, which is the spin
+    term used to promote DRM.  Nonetheless it serves as a reference for
+    the
+      <span 
class="removed"><del><strong>facts.&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>facts.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;h2 id="echo"&gt;Malware in the 
Echo&lt;/h2&gt;
+<span class="removed"><del><strong>&lt;h2</strong></del></span>
+
+
+
+<span class="inserted"><ins><em>&lt;h3</em></ins></span> id="echo"&gt;Malware 
in the <span class="removed"><del><strong>Echo&lt;/h2&gt;
 
 &lt;h3&gt;Amazon Echo Back Doors&lt;/h3&gt;
 &lt;ul&gt;
-    &lt;li&gt;&lt;p&gt;The Amazon Echo appears to have a universal back door, 
since
-      &lt;a 
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+    &lt;li&gt;&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>Echo&lt;/h3&gt;
+
+&lt;h4 id="echo-back-doors"&gt;Back Doors&lt;/h4&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201606060"&gt;
+    &lt;p&gt;The</em></ins></span> Amazon Echo appears to have a universal 
back door, since &lt;a
+    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
       it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;We have found nothing explicitly documenting the lack of any way 
to
-      disable remote changes to the software, so we are not completely sure
-      there isn't one, but it seems pretty clear.&lt;/p&gt;
+
+    &lt;p&gt;We have found nothing explicitly documenting the lack of any way
+    to disable remote changes to the software, so we are not completely
+    sure there isn't one, but <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> seems pretty clear.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+<span class="inserted"><ins><em>&lt;h4 
id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;h3 id="misc"&gt; Malware in other products&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
+    it, the system has a grave security flaw.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
+
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -203,17 +288,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2014, 2015, 2016, 2017 Free Software Foundation, 
Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/04/16 09:59:32 $
+$Date: 2018/10/21 08:58:07 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-google.de-diff.html      30 Sep 2017 11:02:06 -0000      1.2
+++ po/malware-google.de-diff.html      21 Oct 2018 08:58:07 -0000      1.3
@@ -11,7 +11,12 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- 
+<span 
class="inserted"><ins><em>~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as &lt;li id="Mnnnnnnnn"&gt;!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;
+&lt;!--</em></ins></span> Parent-Version: 1.84 --&gt;
 &lt;title&gt;Google's Software Is Malware
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/malware-google.translist" --&gt;
@@ -22,11 +27,11 @@
 &lt;p&gt;&lt;a href="/proprietary/proprietary.html"&gt;Other examples of 
proprietary
 malware&lt;/a&gt;&lt;/p&gt;
 
-&lt;div class="highlight-para"&gt;
+&lt;div <span 
class="removed"><del><strong>class="highlight-para"&gt;</strong></del></span> 
<span class="inserted"><ins><em>class="comment"&gt;</em></ins></span>
 &lt;p&gt;
 &lt;em&gt;Malware&lt;/em&gt; means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
-This page explains how Google software is malware.
+This page explains how <span 
class="removed"><del><strong>Google</strong></del></span> <span 
class="inserted"><ins><em>Google's</em></ins></span> software is malware.
 &lt;/p&gt;
 
 &lt;p&gt;Malware and nonfree software are two different issues.  The
@@ -39,83 +44,177 @@
 because the developer's awareness that the users would be powerless to fix
 any malicious functionalities tempts the developer to impose some.
 &lt;/p&gt;
+<span class="removed"><del><strong>&lt;/div&gt;</strong></del></span>
+
+&lt;div <span class="removed"><del><strong>class="summary" 
style="margin-top:</strong></del></span> <span 
class="inserted"><ins><em>class="important" 
style="margin-bottom:</em></ins></span> 2em"&gt;
+<span class="inserted"><ins><em>&lt;p&gt;If you know of an example that ought 
to be in this page but isn't
+here, please write
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;
+&lt;/div&gt;
 &lt;/div&gt;
 
-&lt;div class="summary" style="margin-top: 2em"&gt;
-    &lt;h3&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/h3&gt;
-    &lt;ul&gt;
+&lt;div class="summary"&gt;</em></ins></span>
+&lt;h3&gt;&lt;strong&gt;Type&nbsp;of malware&lt;/strong&gt;&lt;/h3&gt;
+&lt;ul&gt;
       &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
       &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-      &lt;li&gt;&lt;a href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
-      &lt;!--&lt;li&gt;&lt;a 
href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;--&gt;
+      <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
+&lt;!--&lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;--&gt;
       &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-      &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;--&gt;</em></ins></span>
       &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
-         management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities 
designed
+    management&lt;/a&gt; or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means 
functionalities</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM&rdquo;&mdash;functionalities</em></ins></span>
 designed
        to restrict what users can do with the data in their 
computers.&lt;/li&gt;
-      &lt;!--&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
+  <span class="inserted"><ins><em>&lt;li&gt;&lt;a 
href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;!--&lt;li&gt;&lt;a href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
          that impose censorship on application programs.&lt;/li&gt;--&gt;
-      &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
+  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a</em></ins></span> 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
        that reject any operating system not &ldquo;authorized&rdquo; by the
        manufacturer.&lt;/li&gt;
-      &lt;!--&lt;li&gt;&lt;a 
href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;--&gt;
-    &lt;/ul&gt;
+      <span class="removed"><del><strong>&lt;!--&lt;li&gt;&lt;a 
href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;--&gt;</strong></del></span>
+&lt;/ul&gt;
 &lt;/div&gt;
 
 &lt;h3 id="back-doors"&gt;Google Back Doors&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li id="back-door-dup1"&gt;&lt;p&gt;Chrome has a back door &lt;a 
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;for
-    remote erasure of add-ons&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;In Android, &lt;a 
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-       Google has a back door to remotely delete apps.&lt;/a&gt;  (It is in a 
program
-      called GTalkService).&lt;/p&gt;
-    
-    &lt;p&gt;Google can also
-      &lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-       forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
-      seems, since that article, to have been merged into Google Play).
-      This is not equivalent to a universal back door, but permits various
-      dirty tricks.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201809140"&gt;
+    &lt;p&gt;Android has a &lt;a
+    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
+    back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article suggests it might be a universal back door, but this
+    isn't clear.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201202280"&gt;</em></ins></span>
+    &lt;p&gt;ChromeOS has a universal back
+    door. At least, Google says it does&mdash;in &lt;a
+    href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
+    section 4 of the EULA&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;</em></ins></span>
+    &lt;p&gt;In Android, &lt;a
+    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+    Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> in a
+    program called <span 
class="removed"><del><strong>GTalkService).&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>GTalkService, which seems since then to have 
been
+    merged into Google Play.)&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;Google can also &lt;a
+    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
+      seems, since that article, to have been merged into Google 
Play).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.</em></ins></span>  This is
+    not equivalent to a universal back door, but permits various dirty
+    tricks.&lt;/p&gt;
     
     &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
       malicious so far, the point is that nobody should have such power,
-      which could also be used maliciously.  You might well decide to let a
-      security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs that 
it
-      considers malicious.  But there is no excuse for allowing it
-      to &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the 
right to
-      decide who (if anyone) to trust in this way.&lt;/p&gt;&lt;/li&gt;
-  
+    which could also be used maliciously.  You might well decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for allowing it to
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    who (if anyone) to trust in this <span 
class="removed"><del><strong>way.&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>way.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
+
+
 &lt;h3 id="censorship"&gt;Google Censorship&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome, running on Windows, &lt;a
-  
href="https://thenextweb.com/google/2014/05/27/google-starts-blocking-extensions-chrome-web-store-windows-users-disables-installed-ones/"&gt;
-  is a jail&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
     
-  &lt;li&gt;&lt;p&gt;Google 
-      &lt;a 
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201703160"&gt;
+    &lt;p&gt;Google &lt;a
+    
href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;
        offers censorship software&lt;/a&gt;, ostensibly for parents to put into
       their children's computers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Chrome is &lt;a href="#back-door-dup1"&gt;censored by a 
back door&lt;/a&gt;
-      described above.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;Google
-       censored installation of Samsung's ad-blocker,&lt;/a&gt; saying that
-      blocking ads is &ldquo;interference&rdquo; with the sites that
-      advertise (and surveil users through ads).&lt;/p&gt;
-    
-    &lt;p&gt;The ad-blocker is proprietary software, just like the program 
(Google
-      Play) that Google used to deny access to install it. Using a nonfree 
program
-      gives the owner power over you, and Google has exercised that 
power.&lt;/p&gt;
-    
-    &lt;p&gt;Google's censorship, unlike that of Apple and Microsoft, is not 
total:
-      Android allows users to install apps in other ways. You can install
-      free programs from f-droid.org.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201701180"&gt;</em></ins></span>
+    &lt;p&gt;On Windows and MacOS, Chrome &lt;a
+    
href="https://sites.google.com/a/chromium.org/dev/developers/extensions-deployment-faq"&gt;
+    disables extensions&lt;/a&gt; that are not hosted in the Chrome Web
+    Store.&lt;/p&gt;
+
+    &lt;p&gt;For example, an extension was &lt;a
+    
href="https://consumerist.com/2017/01/18/why-is-google-blocking-this-ad-blocker-on-chrome/"&gt;
+    banned from the Chrome Web Store, and permanently disabled&lt;/a&gt; on
+    more than 40,000 <span 
class="removed"><del><strong>computers.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>computers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201602030"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"&gt;
+    Google censored installation of Samsung's ad-blocker&lt;/a&gt; on Android
+    phones, saying that blocking ads is &ldquo;interference&rdquo; with
+    the sites that advertise (and surveil users through ads).&lt;/p&gt;
+
+    &lt;p&gt;The ad-blocker is proprietary software, just like the program
+    (Google Play) that Google used to deny access to install it. Using
+    a nonfree program gives the owner power over you, and Google has
+    exercised that power.&lt;/p&gt;
+
+    &lt;p&gt;Google's censorship, unlike that of Apple, is not total: Android
+    allows users to install apps in other ways. You can install free
+    programs from <span 
class="removed"><del><strong>f-droid.org.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>f-droid.org.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="drm"&gt;Google DRM&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201705150"&gt;</em></ins></span>
+    &lt;p&gt;Google <span class="inserted"><ins><em>now allows Android
+    apps to detect whether a device has been rooted,</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.csmonitor.com/Technology/2017/0316/Google-Family-Link-gives-parents-a-way-to-monitor-preteens-accounts"&gt;
+      offers censorship software&lt;/a&gt;, ostensibly for 
parents</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
+    refuse</em></ins></span> to <span class="removed"><del><strong>put into
+      their children's computers.&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>install if so&lt;/a&gt;. The Netflix app uses 
this ability to
+    enforce DRM by refusing to install on rooted Android devices.&lt;/p&gt;
+
+    &lt;p&gt;Update: Google &lt;i&gt;intentionally&lt;/i&gt; changed Android 
so that apps &lt;a
+    
href="https://torrentfreak.com/netflix-use-of-google-drm-means-rooted-android-devices-are-banned-170515/"&gt;can
+    detect rooted devices and refuse to run on them&lt;/a&gt;. The Netflix app
+    is proprietary malware, and one shouldn't use it. However, that does
+    not make what Google has done any less wrong.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701300"&gt;
+    &lt;p&gt;Chrome &lt;a
+    
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html"&gt;implements
+    DRM&lt;/a&gt;. So does Chromium, through nonfree software that is 
effectively
+    part of it.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430"&gt;More
+    information&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201102250"&gt;
+    &lt;p&gt;Android &lt;a
+    
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;
+    contains facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
+
 &lt;h3 id="insecurity"&gt;Google Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
@@ -123,98 +222,226 @@
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-      The NSA can tap data in smart phones, including iPhones, Android, and
-      BlackBerry&lt;/a&gt;.  While there is not much detail here, it seems that
-      this does not operate via the universal back door that we know nearly
-      all portable phones have.  It may involve exploiting various bugs.
-      There are &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-      lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201311120"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;</em></ins></span>
+    The NSA can tap data in smart phones, including iPhones,
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via
+    the universal back door that we know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
+    
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+    lots of bugs in the phones' radio <span 
class="removed"><del><strong>software&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
+
 &lt;h3 id="sabotage"&gt;Google Sabotage&lt;/h3&gt;
 
 &lt;p&gt;The wrongs in this section are not precisely malware, since they do
 not involve making the program that runs in a way that hurts the user.
 But they are a lot like malware, since they are technical Google
-actions that harm to the users of specific Google software.&lt;/p&gt;
+actions that harm <span class="removed"><del><strong>to</strong></del></span> 
the users of specific Google software.&lt;/p&gt;
 
-&lt;ul&gt;
-  <span class="inserted"><ins><em>&lt;li&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201605150"&gt;</em></ins></span>
     &lt;p&gt;Revolv is an IoT device which managed &ldquo;smart home&rdquo;
       operations: switching the lights, operate motion sensors, regulating
-      temperature, etc. On May 15th, 2016, Google said it would shut down the
-      service linked to the device, making it unusable.&lt;/p&gt;
-    &lt;p&gt;Although you may own the device, its functioning depended on the 
server
-      that never belonged to you. So you never really had control of it. This
-      unjust design is called
-      &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
+    temperature, etc. On May 15th, 2016, Google said it would shut down
+    the service linked to the device, making it unusable.&lt;/p&gt;
+
+    &lt;p&gt;Although you may own the device, its functioning depended
+    on the server that never belonged to you. So you never
+    really had control of it. This unjust design is called &lt;a
+    href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
       Service as a Software Substitute (SaaSS)&lt;/a&gt;. That is what gave the
-      company the power to convert it into a $300 out-of-warranty brick, for
-      your &ldquo;dumb home&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-  &lt;li&gt;&lt;p&gt;Google has long had &lt;a
+    company the power to convert it into a $300 out-of-warranty brick,
+    for your &ldquo;dumb home&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google has long 
had</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604050"&gt;
+    &lt;p&gt;Google/Alphabet</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
+      back door</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+    intentionally broke Revolv home automatic control products that
+    depended on a server&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>remotely unlock an</strong></del></span> <span 
class="inserted"><ins><em>function, by shutting down the server.
+    The lesson is, reject all such products.  Insist on self-contained
+    computers that run free software!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511244"&gt;
+    &lt;p&gt;Google has long had &lt;a
       
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
-      back door to remotely unlock an Android device&lt;/a&gt;, unless its
-      disk is encrypted (possible since Android 5.0 Lollipop, but
-      still not quite the default).&lt;/p&gt;&lt;/li&gt;
+    back door to remotely unlock an</em></ins></span> Android 
device&lt;/a&gt;, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
+    quite the <span 
class="removed"><del><strong>default).&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>default).&lt;/p&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
+
 &lt;h3 id="surveillance"&gt;Google Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger that
-      &lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="removed"><del><strong>is pervasive and
+      sometimes very clever. Some trackers can</strong></del></span> <span 
class="inserted"><ins><em>on Android</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the</em></ins></span> user's <span 
class="removed"><del><strong>movements around a physical 
store</strong></del></span> <span class="inserted"><ins><em>location even when 
users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked</em></ins></span> by <span 
class="removed"><del><strong>noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the misleading control.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711210"&gt;
+    &lt;p&gt;Android</em></ins></span> tracks location for Google &lt;a
+    
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM <span 
class="removed"><del><strong>card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span> <span 
class="inserted"><ins><em>card&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609140"&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable</em></ins></span> Google <span 
class="removed"><del><strong>every URL typed in&lt;/a&gt;, one key 
at</strong></del></span> <span class="inserted"><ins><em>Maps and location 
tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>thing would be almost
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that
-      &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
+    &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506180"&gt;
+    &lt;p&gt;Google</em></ins></span> Chrome includes a module that &lt;a
+    
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
        activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
       Some Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers</em></ins></span> send 
<span class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot 
of</em></ins></span>
+    data <span class="removed"><del><strong>to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>about the user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS and microphone in Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308040"&gt;
+    &lt;p&gt;Google Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    spies on browser history, affiliations&lt;/a&gt;, and other installed
+    software.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201308010"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in Android phones (and Windows? 
laptops): The Wall Street
+    Journal (in an article blocked from us by a paywall) reports that &lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+    the FBI can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li id="nest-thermometers"&gt;
-    &lt;p&gt;Nest thermometers
-      send &lt;a 
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-      lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware is present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Many web sites report all their visitors to Google by 
using
-      the Google Analytics service, which
-      &lt;a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
-      tells Google the IP address and the page that was 
visited.&lt;/a&gt;&lt;/p&gt;
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice</em></ins></span> all <span 
class="removed"><del><strong>conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span class="removed"><del><strong>id="nest-thermometers"&gt;
+    &lt;p&gt;Nest thermometers
+      send</strong></del></span> <span 
class="inserted"><ins><em>id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+      lot</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details</em></ins></span> of <span 
class="removed"><del><strong>data about</strong></del></span> <span 
class="inserted"><ins><em>users that install</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201208210"&gt;
+    &lt;p&gt;Many</em></ins></span> web sites report all their visitors
+    to Google by using the Google Analytics service, which &lt;a
+    
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/"&gt;
+    tells Google the IP address and the page that was <span 
class="removed"><del><strong>visited.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>visited&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome makes it 
easy for an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;h3 id="drm"&gt;Google DRM&lt;/h3&gt;
-&lt;ul&gt;
+&lt;ul&gt;</strong></del></span>
 
-&lt;li&gt;
-&lt;p&gt;Google now allows Android apps to detect whether a device has been
+  &lt;li <span 
class="removed"><del><strong>id="netflix-app-geolocation-drm"&gt;&lt;p&gt;The 
Netflix Android app &lt;a 
+href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
+forces the use of Google DNS&lt;/a&gt;. This is one of the methods that Netflix
+uses to enforce the geolocation restrictions dictated by the movie
+studios.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M200809060"&gt;</em></ins></span>
+    &lt;p&gt;Google <span class="removed"><del><strong>now allows Android apps 
to detect whether</strong></del></span> <span class="inserted"><ins><em>Chrome 
contains</em></ins></span> a <span class="removed"><del><strong>device has been
 rooted, &lt;a 
href="http://www.androidpolice.com/2017/05/13/netflix-confirms-blocking-rootedunlocked-devices-app-still-working-now/"&gt;and
 refuse to install
 if so&lt;/a&gt;.&lt;/p&gt;
 
@@ -225,27 +452,38 @@
 
 &lt;li&gt;
   &lt;p&gt;Chrome &lt;a 
href="http://boingboing.net/2017/01/30/google-quietly-makes-optiona.html"&gt;implements
-  DRM&lt;/a&gt;. So does Chromium, through nonfree software that is
+  DRM&lt;/a&gt;. So does Chromium, through nonfree 
software</strong></del></span> <span class="inserted"><ins><em>key 
logger</em></ins></span> that <span class="removed"><del><strong>is
   effectively part of it.&lt;/p&gt;
                                                                                
         
   &lt;p&gt;&lt;a 
href="https://bugs.chromium.org/p/chromium/issues/detail?id=686430"&gt;More 
information&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   
-&lt;li&gt;&lt;p&gt;Android &lt;a 
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;contains
-facilities specifically to support DRM.&lt;/a&gt;&lt;/p&gt;
-&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;Android</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;contains
+facilities specifically to support 
DRM.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+    sends Google every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
+
 &lt;h3 id="tyrants"&gt;Google Tyrants&lt;/h3&gt;
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
  &lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
-Some Android phones made by Google are tyrants&lt;/a&gt; (though someone found 
a way to
-crack the restriction).  Fortunately, most Android devices are not tyrants.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;p&gt;&lt;a</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201304080"&gt;
+    &lt;p&gt;Motorola, then owned by Google, made &lt;a</em></ins></span>
+    
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html"&gt;
+<span class="removed"><del><strong>Some</strong></del></span>
+    Android phones <span class="removed"><del><strong>made by 
Google</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> are tyrants&lt;/a&gt; (though 
someone found a way to
+    crack the restriction).  Fortunately, most Android devices are not <span 
class="removed"><del><strong>tyrants.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>tyrants.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 &lt;/ul&gt;
 
+
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -293,17 +531,18 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2017 Free Software Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2017, 2018 Free Software Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
-href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
-Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+<span 
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative</strong></del></span>
+<span 
class="inserted"><ins><em>href="http://creativecommons.org/licenses/by/4.0/"&gt;Creative</em></ins></span>
+Commons <span 
class="removed"><del><strong>Attribution-NoDerivatives</strong></del></span> 
<span class="inserted"><ins><em>Attribution</em></ins></span> 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
 
 &lt;!--#include virtual="/server/bottom-notes.html" --&gt;
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/09/30 11:02:06 $
+$Date: 2018/10/21 08:58:07 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;



reply via email to

[Prev in Thread] Current Thread [Next in Thread]