www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-appliances.de-diff.h...


From: GNUN
Subject: www/proprietary/po malware-appliances.de-diff.h...
Date: Mon, 22 Oct 2018 06:28:27 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/22 06:28:26

Modified files:
        proprietary/po : malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po proprietary-drm.de.po 
                         proprietary-drm.fr.po 
                         proprietary-drm.it-diff.html 
                         proprietary-drm.it.po 
                         proprietary-drm.ja-diff.html 
                         proprietary-drm.ja.po proprietary-drm.pot 
                         proprietary-drm.ru.po 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru.po proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.16&r2=1.17

Patches:
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-appliances.de-diff.html     17 Oct 2018 10:01:35 -0000      1.12
+++ malware-appliances.de-diff.html     22 Oct 2018 10:28:25 -0000      1.13
@@ -64,18 +64,25 @@
 here, please write</em></ins></span>
 to <span class="removed"><del><strong>make</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
         of</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>conversation between</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span> 
two <span class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer 
can</strong></del></span>
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>conversation between</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span> 
two <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>to present the specifics.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201809260"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer 
can</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats</em></ins></span> 
communicate <span class="removed"><del><strong>with it,
       is a surveillance device.</strong></del></span>
     <span class="inserted"><ins><em>only through the company's server. They 
have
@@ -130,21 +137,22 @@
     <span class="inserted"><ins><em>broken devices continued. But I 
think</em></ins></span> that <span class="inserted"><ins><em>is a secondary 
issue;
     it made</em></ins></span> the <span class="removed"><del><strong>article 
uses</strong></del></span> <span class="inserted"><ins><em>nasty consequences 
extend to some additional people.
     The fundamental wrong was to design</em></ins></span> the
-  <span class="removed"><del><strong>term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>devices to depend on something
-    else that didn't respect users' freedom.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  <span class="removed"><del><strong>term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
   &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
   They have login accounts with hard-coded passwords, which can't be
-  changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way to
-  delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+  changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way</strong></del></span> <span 
class="inserted"><ins><em>devices</em></ins></span> to
+  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and 
other</strong></del></span>
+&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>depend on something
+    else</em></ins></span> that <span class="removed"><del><strong>runs 
pacemakers, insulin pumps, and other</strong></del></span> <span 
class="inserted"><ins><em>didn't respect users' freedom.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+  &lt;li id="M201804140"&gt;
     &lt;p&gt;A</em></ins></span> medical <span 
class="removed"><del><strong>devices is</strong></del></span> <span 
class="inserted"><ins><em>insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
@@ -420,93 +428,94 @@
 &ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: 
it</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
     users create an account on Anova's servers, their 
cookers</em></ins></span> won't <span class="removed"><del><strong>accept
-third-party printing materials.  It</strong></del></span>
+third-party printing materials.  It is the Keurig</strong></del></span>
     <span class="inserted"><ins><em>function&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703270"&gt;
-    &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher</em></ins></span> is <span 
class="inserted"><ins><em>&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to</em></ins></span> the <span 
class="removed"><del><strong>Keurig of printers.  Now it</strong></del></span> 
<span class="inserted"><ins><em>Internet, its security</em></ins></span> is
+    &lt;p&gt;When Miele's Internet</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it</strong></del></span>
+    <span class="inserted"><ins><em>Stings hospital disinfectant 
dishwasher</em></ins></span> is
 <span class="removed"><del><strong>being discontinued, which means that 
eventually authorized materials won't
-be available</strong></del></span> <span 
class="inserted"><ins><em>crap&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;For example, a cracker can gain access to the dishwasher's
-    filesystem, infect it with malware,</em></ins></span> and <span 
class="inserted"><ins><em>force</em></ins></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
+be available and the printers may become unusable.&lt;/p&gt;
 
-&lt;p&gt;With a</strong></del></span> <span 
class="inserted"><ins><em>dishwasher to launch
-    attacks on other devices in the network. Since these dishwashers are
+&lt;p&gt;With a</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
+even be</strong></del></span> <span class="inserted"><ins><em>Internet, its 
security is crap&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;For example,</em></ins></span> a <span 
class="removed"><del><strong>remote possibility.&lt;/p&gt;
+
+&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>cracker can gain access to</em></ins></span> the 
<span class="removed"><del><strong>author of that article says that there was
+&ldquo;nothing wrong&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>dishwasher's
+    filesystem, infect it</em></ins></span> with <span 
class="removed"><del><strong>designing</strong></del></span> <span 
class="inserted"><ins><em>malware, and force</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>dishwasher</em></ins></span> to <span 
class="removed"><del><strong>restrict users</strong></del></span> <span 
class="inserted"><ins><em>launch
+    attacks on other devices</em></ins></span> in the <span 
class="removed"><del><strong>first place.  This is like putting a &ldquo;cheat 
me and mistreat me&rdquo;
+sign</strong></del></span> <span class="inserted"><ins><em>network. Since 
these dishwashers are
     used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through</em></ins></span> the <span 
class="removed"><del><strong>Respects Your Freedom&lt;/a&gt;, this problem 
would not
-even be a remote possibility.&lt;/p&gt;
-
-&lt;p&gt;How pitiful that</strong></del></span> <span 
class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>author</strong></del></span> <span 
class="inserted"><ins><em>temperature</em></ins></span> of <span 
class="removed"><del><strong>that article says that there</strong></del></span> 
<span class="inserted"><ins><em>the vibrator minute by
-    minute (thus, indirectly, whether it</em></ins></span> was
-<span class="removed"><del><strong>&ldquo;nothing wrong&rdquo; with 
designing</strong></del></span> <span class="inserted"><ins><em>surrounded by a 
person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>device to restrict users in</strong></del></span> 
<span class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
-
-    &lt;p&gt;Note</em></ins></span> the <span 
class="removed"><del><strong>first place.  This is like 
putting</strong></del></span> <span class="inserted"><ins><em>totally 
inadequate proposed response:</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;cheat me</strong></del></span> <span 
class="inserted"><ins><em>labeling
-    standard with which manufacturers would make statements about their
-    products, rather than free software which users could have 
checked</em></ins></span>
-    and <span class="removed"><del><strong>mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all 
companies</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping</em></ins></span> on <span class="removed"><del><strong>your 
chest.  We should know better: we should condemn all companies
+that take advantage</strong></del></span> <span class="inserted"><ins><em>its 
users through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>people like him.  Indeed,</strong></del></span> 
<span class="inserted"><ins><em>the vibrator minute by
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was surrounded by a person's
+    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>acceptance of</strong></del></span> <span 
class="inserted"><ins><em>vibration frequency.&lt;/p&gt;
+
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    standard with which manufacturers would make statements 
about</em></ins></span> their <span class="removed"><del><strong>unjust 
practice</strong></del></span>
+    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked
+    and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>take advantage</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>teaches</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="inserted"><ins><em>personal information about how</em></ins></span> 
people <span class="removed"><del><strong>like him.  
Indeed,</strong></del></span>
+    was sued for collecting lots of personal information about 
how</em></ins></span> people <span 
class="removed"><del><strong>to</strong></del></span>
     <span class="inserted"><ins><em>used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>acceptance of
-their unjust practice that teaches people to</strong></del></span> <span 
class="inserted"><ins><em>data may</em></ins></span> be <span 
class="removed"><del><strong>doormats.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data 
may</em></ins></span> be <span class="removed"><del><strong>doormats.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs &lt;a
 
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;</strong></del></span>
     <span class="inserted"><ins><em>true, but it doesn't really matter. If it 
had sold the data to a data
-    broker, the data broker would</em></ins></span> have been <span 
class="removed"><del><strong>designed not</strong></del></span> <span 
class="inserted"><ins><em>able</em></ins></span> to <span 
class="removed"><del><strong>interact with other companies' smart
-lightbulbs&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>figure out 
who the
+    broker, the data broker would</em></ins></span> have been <span 
class="removed"><del><strong>designed not</strong></del></span> <span 
class="inserted"><ins><em>able</em></ins></span> to <span 
class="removed"><del><strong>interact</strong></del></span> <span 
class="inserted"><ins><em>figure out who the
     user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
     
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>product is &ldquo;smart&rdquo;, and you didn't 
build it, it is
-cleverly serving</strong></del></span> <span class="inserted"><ins><em>total 
of C$4m&lt;/a&gt; to</em></ins></span> its <span 
class="removed"><del><strong>manufacturer &lt;em&gt;against 
you&lt;/em&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>customers.&lt;/p&gt;</em></ins></span>
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>other companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>microphones 
&lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>product is &ldquo;smart&rdquo;, and you didn't 
build it, it is
+cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
 &lt;p&gt;&lt;a
 
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
 DVDs and Bluray disks have DRM&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;That page uses spin terms that favor DRM,
-including</strong></del></span>
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>way to access 
the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;</em></ins></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+    &lt;p&gt;That <span class="removed"><del><strong>page uses spin terms that 
favor DRM,
+including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
 digital &ldquo;rights&rdquo; management&lt;/a&gt;
-and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess 
what?</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
-and it claims that &ldquo;artists&rdquo; (rather than companies) are
+and &lt;a 
href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
 <span class="inserted"><ins><em>the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>it claims that &ldquo;artists&rdquo; (rather than 
companies) are
 primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>reference for</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>facts.
+these disks.  Nonetheless, it is a reference for</strong></del></span> the 
<span class="removed"><del><strong>facts.
 &lt;/p&gt;
 
 &lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
@@ -516,10 +525,7 @@
 &lt;li id="cameras-bugs"&gt;
 &lt;p&gt;Over 70 brands of network-connected surveillance cameras have &lt;a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-security bugs that allow anyone</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
-    manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen</em></ins></span> 
to <span class="removed"><del><strong>watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
+security bugs that allow anyone</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -542,129 +548,67 @@
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything</em></ins></span> that <span 
class="removed"><del><strong>this</strong></del></span> is <span 
class="removed"><del><strong>an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>viewed on them, and 
not just broadcasts and
     cable&lt;/a&gt;. Even if</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>fault of app developers. That is clearly true 
if</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
-    the <span class="removed"><del><strong>apps are proprietary 
software.&lt;/p&gt;
+<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>coming from</em></ins></span> the <span 
class="removed"><del><strong>fault</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,
+    the TV reports what it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>app developers. That is clearly 
true</strong></del></span> <span class="inserted"><ins><em>a way to disable the
+    surveillance, even</em></ins></span> if <span class="inserted"><ins><em>it 
were not hidden as it was in these TVs,
+    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>apps are proprietary software.&lt;/p&gt;
 
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely 
going</strong></del></span> <span class="inserted"><ins><em>TV reports what it 
is. The existence of a way</em></ins></span> to
-<span class="removed"><del><strong>screw you.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Malware found on &lt;a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;A camera that records locally on physical media, and has no network
-connection, does not threaten people with surveillance&mdash;neither
-by watching people through</strong></del></span> <span 
class="inserted"><ins><em>disable</em></ins></span> the <span 
class="removed"><del><strong>camera, nor through malware</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
-    does not legitimize</em></ins></span> the
-<span class="removed"><del><strong>camera.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612230"&gt;
+  &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
     creates the potential for the most intimate
-    surveillance ever. All it takes to make this potential 
real</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have a Bluetooth vulnerability&lt;/a&gt; that allows
-attackers to send malware to the devices, which can subsequently
-spread to computers and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
-    software as malicious as many</em></ins></span> other <span 
class="removed"><del><strong>FitBit trackers that interact with
-them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do</strong></del></span> 
<span class="inserted"><ins><em>programs listed in this
+    surveillance ever. All it takes to make this potential real &lt;a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You can bet Facebook will implement</em></ins></span> the <span 
class="removed"><del><strong>encryption with
-proprietary firmware so you can't</strong></del></span> <span 
class="inserted"><ins><em>maximum possible
-    surveillance on Oculus Rift devices. The moral is, never</em></ins></span> 
trust <span class="removed"><del><strong>it.  Western Digital's &lt;a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have</strong></del></span> a <span 
class="removed"><del><strong>back 
door&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>VR
-    system with nonfree software in it.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;You can bet Facebook will implement the maximum possible
+    surveillance on Oculus Rift devices. The moral is, never trust a VR
+    system with nonfree software in it.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which are used to administer drugs 
to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612200"&gt;
+  &lt;li id="M201612200"&gt;
     &lt;p&gt;The developer of Ham Radio Deluxe &lt;a
-    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged</em></ins></span>
-    a <span class="removed"><del><strong>patient, were rated &ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>customer's 
installation as punishment for posting</em></ins></span> a <span 
class="removed"><del><strong>security
-researcher.&lt;/p&gt;
-
-&lt;p&gt;Depending on what drug</strong></del></span> <span 
class="inserted"><ins><em>negative
+    
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml"&gt;sabotaged
+    a customer's installation as punishment for posting a negative
     review&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Most proprietary software companies don't use their power so
-    harshly, but it</em></ins></span> is <span 
class="removed"><del><strong>being infused, the insecurity could
-open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an injustice that they all &lt;em&gt;have&lt;/em&gt; 
such
-    power.&lt;/p&gt;</em></ins></span>
+    harshly, but it is an injustice that they all &lt;em&gt;have&lt;/em&gt; 
such
+    power.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Due</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612061"&gt;
+  &lt;li id="M201612061"&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
     controlled with a mobile phone&lt;/a&gt;; physical access is not
-    necessary. This would enable crackers</em></ins></span> to <span 
class="removed"><del><strong>bad security</strong></del></span> <span 
class="inserted"><ins><em>listen</em></ins></span> in <span 
class="inserted"><ins><em>on</em></ins></span> a <span 
class="removed"><del><strong>drug pump, crackers</strong></del></span> <span 
class="inserted"><ins><em>child's
+    necessary. This would enable crackers to listen in on a child's
     conversations, and even speak into the toys themselves.&lt;/p&gt;
 
-    &lt;p&gt;This means a burglar</em></ins></span> could <span 
class="removed"><del><strong>use it</strong></del></span> <span 
class="inserted"><ins><em>speak into the toys and ask the 
child</em></ins></span>
-    to <span class="removed"><del><strong>&lt;a
-href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unlock the front door while Mommy's not 
looking.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This means a burglar could speak into the toys and ask the child
+    to unlock the front door while Mommy's not looking.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly 
vulnerable</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609200"&gt;
+  &lt;li id="M201609200"&gt;
     &lt;p&gt;HP's firmware downgrade &lt;a
     
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update"&gt;imposed
-    DRM on some printers, which now refuse</em></ins></span> to
-<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>function with third-party
-    ink cartridges&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    DRM on some printers, which now refuse to function with third-party
+    ink cartridges&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201608080"&gt;
-    &lt;p&gt;Ransomware</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished a company</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;
-    has been developed</em></ins></span> for <span 
class="removed"><del><strong>making webcams with bad security&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>a 
thermostat</em></ins></span> that <span class="removed"><del><strong>it was 
easy for anyone to watch them.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>uses proprietary
-    software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201608080"&gt;
+    &lt;p&gt;Ransomware &lt;a
+    
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;
+    has been developed for a thermostat that uses proprietary
+    software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;It is possible to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605020"&gt;
-    &lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security 
hole;</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-    unauthorized</em></ins></span> people <span 
class="removed"><del><strong>by taking</strong></del></span> <span 
class="inserted"><ins><em>can remotely</em></ins></span> control <span 
class="removed"><del><strong>of medical implants by radio&lt;/a&gt;.  More
-information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC 
News&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>it&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201605020"&gt;
+    &lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
+    
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+    unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
     problem is partly the fault of app developers. That is clearly true
@@ -679,27 +623,22 @@
     
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
     security cameras available through Amazon&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;A camera that records locally on physical 
media,</em></ins></span> and <span class="inserted"><ins><em>has no network
+    &lt;p&gt;A camera that records locally on physical media, and has no 
network
     connection, does not threaten people with surveillance&mdash;neither
     by watching people through the camera, nor through malware in the
     camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604050"&gt;
-    &lt;p&gt;Google/Alphabet</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
+    &lt;p&gt;Google/Alphabet &lt;a
+    
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
     intentionally broke Revolv home automatic control products that
     depended on a server&lt;/a&gt; to function, by shutting down the server.
     The lesson is, reject all such products.  Insist on self-contained
-    computers that run free software!&lt;/p&gt;</em></ins></span>
+    computers that run free software!&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
+  &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
@@ -709,15 +648,13 @@
     &lt;p&gt;The &lt;a
     href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
     &ldquo;Cube&rdquo; 3D printer was designed with DRM&lt;/a&gt;: it
-    won't accept third-party printing materials.  It is the 
Keurig</em></ins></span> of
-    <span class="inserted"><ins><em>printers.  Now it is being discontinued, 
which means that eventually
+    won't accept third-party printing materials.  It is the Keurig of
+    printers.  Now it is being discontinued, which means that eventually
     authorized materials won't be available and the printers may become
     unusable.&lt;/p&gt;
 
-    &lt;p&gt;With a</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+    &lt;p&gt;With a &lt;a
+    href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
     printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would
     not even be a remote possibility.&lt;/p&gt;
 
@@ -787,50 +724,116 @@
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>most 
likely going</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to
+<span class="removed"><del><strong>screw you.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Malware found on &lt;a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+security cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera that records locally on physical media, and has no network
+connection, does not threaten people</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>surveillance&mdash;neither
+by watching people through</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households
+    to</em></ins></span> the <span class="removed"><del><strong>camera, nor 
through malware in</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
     users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit fitness trackers have a &lt;a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+    &lt;p&gt;FitBit</em></ins></span> fitness trackers have a <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;</em></ins></span>
     Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with them.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201510200"&gt;
-    &lt;p&gt;&ldquo;Self-encrypting&rdquo; disk drives
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
+    &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    can't trust it.  Western Digital's <span class="removed"><del><strong>&lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</strong></del></span>
 &ldquo;My Passport&rdquo; drives <span class="inserted"><ins><em>&lt;a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</em></ins></span>
     have a back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people</em></ins></span> are <span class="removed"><del><strong>used 
to administer drugs to
+a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>watching&lt;/a&gt;, 
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
+researcher.&lt;/p&gt;
+
+&lt;p&gt;Depending on what drug is being infused, the insecurity could
+open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506080"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;</em></ins></span>
     &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished a company for making webcams with bad security&lt;/a&gt; so
+that it was easy for anyone to watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible to &lt;a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill people by taking control of medical implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
+&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of &lt;a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
     snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>it can be fatal.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
@@ -1208,7 +1211,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:35 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-appliances.de.po    7 Oct 2018 20:58:30 -0000       1.58
+++ malware-appliances.de.po    22 Oct 2018 10:28:25 -0000      1.59
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -104,6 +104,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";

Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-appliances.fr.po    8 Oct 2018 17:12:34 -0000       1.88
+++ malware-appliances.fr.po    22 Oct 2018 10:28:25 -0000      1.89
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-08 19:03+0200\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";

Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-appliances.pot      7 Oct 2018 20:58:30 -0000       1.44
+++ malware-appliances.pot      22 Oct 2018 10:28:25 -0000      1.45
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\";>
 "
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a "

Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- malware-appliances.ru.po    8 Oct 2018 07:58:03 -0000       1.119
+++ malware-appliances.ru.po    22 Oct 2018 10:28:25 -0000      1.120
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-01 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";

Index: proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-drm.de.po       7 Oct 2018 21:27:57 -0000       1.57
+++ proprietary-drm.de.po       22 Oct 2018 10:28:25 -0000      1.58
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -101,6 +101,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The game Metal Gear Rising for MacOS was tethered to a server.  The company "
 "<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-";
 "unplayable-drm\"> shut down the server, and all copies stopped working</a>."

Index: proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-drm.fr.po       8 Oct 2018 17:12:34 -0000       1.52
+++ proprietary-drm.fr.po       22 Oct 2018 10:28:25 -0000      1.53
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-08 19:03+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -91,6 +92,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The game Metal Gear Rising for MacOS was tethered to a server.  The company "
 "<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-";
 "unplayable-drm\"> shut down the server, and all copies stopped working</a>."

Index: proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-drm.it-diff.html        17 Oct 2018 10:01:36 -0000      1.17
+++ proprietary-drm.it-diff.html        22 Oct 2018 10:28:25 -0000      1.18
@@ -60,6 +60,14 @@
 &lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
     MacOS was tethered to a server.  The company &lt;a
@@ -221,9 +229,9 @@
     
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
     forces the use of Google DNS&lt;/a&gt;. This</em></ins></span> is <span 
class="removed"><del><strong>flawed in that it
 fails to treat DRM as an ethical question; it takes for 
granted</strong></del></span> <span class="inserted"><ins><em>one of the 
methods</em></ins></span> that
-<span class="removed"><del><strong>whatever Amazon might do to its users is 
legitimate.  It refers</strong></del></span>
-    <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span 
class="removed"><del><strong>DRM
-as digital &ldquo;rights&rdquo; management, which is</strong></del></span> 
<span class="inserted"><ins><em>enforce</em></ins></span> the <span 
class="removed"><del><strong>spin term
+<span class="removed"><del><strong>whatever Amazon might 
do</strong></del></span>
+    <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span 
class="removed"><del><strong>its users is legitimate.  It refers to DRM
+as digital &ldquo;rights&rdquo; management, which is the spin term
 used to promote DRM.  Nonetheless it serves as a reference for the
 facts.
 &lt;/p&gt;
@@ -249,8 +257,8 @@
 &lt;p&gt;&lt;a 
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;DRM
 in MacOS&lt;/a&gt;.  This article focuses on the fact that a new model of
 Macbook introduced a requirement for monitors to have malicious
-hardware, but DRM software in MacOS is involved in activating the
-hardware.  The software for accessing iTunes is also responsible.
+hardware, but DRM software in MacOS is involved in 
activating</strong></del></span> <span 
class="inserted"><ins><em>enforce</em></ins></span> the
+<span class="removed"><del><strong>hardware.  The software for accessing 
iTunes is also responsible.
 &lt;/p&gt;
 
 &lt;p&gt;A further consequence of this malware is that users may have
@@ -302,18 +310,18 @@
 
     &lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
     don't use Bluray <span class="removed"><del><strong>disks!
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201102250"&gt;
+  &lt;li id="M201102250"&gt;
     &lt;p&gt;Android &lt;a
     
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;
-    contains facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
+    contains facilities specifically to support 
DRM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201002180"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201002180"&gt;
     &lt;p&gt;DRM does more nastiness to published works than merely stopping
     people from looking at and/or copying them. Even when it allows you to
     look, it harasses you in many ways. Cory Doctorow's article presents
@@ -435,7 +443,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-drm.it.po       7 Oct 2018 21:27:57 -0000       1.46
+++ proprietary-drm.it.po       22 Oct 2018 10:28:25 -0000      1.47
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2017-12-30 14:17+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -88,6 +88,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The game Metal Gear Rising for MacOS was tethered to a server.  The company "
 "<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-";
 "unplayable-drm\"> shut down the server, and all copies stopped working</a>."

Index: proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-drm.ja-diff.html        17 Oct 2018 10:01:36 -0000      1.18
+++ proprietary-drm.ja-diff.html        22 Oct 2018 10:28:25 -0000      1.19
@@ -61,6 +61,14 @@
 &lt;div class="column-limit" id="proprietary-drm"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
     MacOS was tethered to a server.  The company &lt;a
@@ -225,10 +233,10 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201501030"&gt;
     &lt;p id="netflix-app-geolocation-drm"&gt;The Netflix Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#bluray"&gt;Bluray&lt;/a&gt;
-disks.  (The article talks about how the same malware would later be
-introduced in MacOS.  That had not been done at</strong></del></span>
+disks.  (The article talks about how</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/"&gt;
-    forces</em></ins></span> the <span class="removed"><del><strong>time, but 
it was
+    forces</em></ins></span> the <span class="removed"><del><strong>same 
malware would later be
+introduced in MacOS.  That had not been done at the time, but it was
 done subsequently.)
 &lt;/p&gt;
 &lt;/li&gt;
@@ -291,18 +299,18 @@
 
     &lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
     don't use Bluray <span class="removed"><del><strong>disks!
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disks!&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201102250"&gt;
+  &lt;li id="M201102250"&gt;
     &lt;p&gt;Android &lt;a
     
href="https://developer.android.com/reference/android/drm/package-summary.html"&gt;
-    contains facilities specifically to support DRM&lt;/a&gt;.&lt;/p&gt;
+    contains facilities specifically to support 
DRM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201002180"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201002180"&gt;
     &lt;p&gt;DRM does more nastiness to published works than merely stopping
     people from looking at and/or copying them. Even when it allows you to
     look, it harasses you in many ways. Cory Doctorow's article presents
@@ -424,7 +432,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-drm.ja.po       7 Oct 2018 21:27:57 -0000       1.42
+++ proprietary-drm.ja.po       22 Oct 2018 10:28:25 -0000      1.43
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:55+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -84,6 +84,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The game Metal Gear Rising for MacOS was tethered to a server.  The company "
 "<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-";
 "unplayable-drm\"> shut down the server, and all copies stopped working</a>."

Index: proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-drm.pot 7 Oct 2018 21:27:57 -0000       1.26
+++ proprietary-drm.pot 22 Oct 2018 10:28:25 -0000      1.27
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -69,6 +69,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\";>
 "
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The game Metal Gear Rising for MacOS was tethered to a server.  The company "
 "<a "
 
"href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm\";>
 "

Index: proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary-drm.ru.po       8 Oct 2018 07:58:03 -0000       1.69
+++ proprietary-drm.ru.po       22 Oct 2018 10:28:25 -0000      1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-08 17:34+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -91,6 +92,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The game Metal Gear Rising for MacOS was tethered to a server.  The company "
 "<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-";
 "unplayable-drm\"> shut down the server, and all copies stopped working</a>."

Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-sabotage.de.po  10 Oct 2018 07:58:36 -0000      1.102
+++ proprietary-sabotage.de.po  22 Oct 2018 10:28:25 -0000      1.103
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-08-29 02:40+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -74,6 +74,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Jawbone fitness tracker was tethered to a proprietary phone app.  In "
 "2017, the company shut down and made the app stop working. <a href=\"https://";
 "www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"

Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-sabotage.fr.po  10 Oct 2018 10:48:03 -0000      1.110
+++ proprietary-sabotage.fr.po  22 Oct 2018 10:28:25 -0000      1.111
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-10 12:47+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -73,6 +74,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Jawbone fitness tracker was tethered to a proprietary phone app.  In "
 "2017, the company shut down and made the app stop working. <a href=\"https://";
 "www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"

Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-sabotage.it-diff.html   17 Oct 2018 10:01:36 -0000      1.18
+++ proprietary-sabotage.it-diff.html   22 Oct 2018 10:28:25 -0000      1.19
@@ -49,6 +49,14 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201807050"&gt;
     &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. &lt;a
@@ -686,7 +694,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary-sabotage.it.po  10 Oct 2018 07:58:36 -0000      1.95
+++ proprietary-sabotage.it.po  22 Oct 2018 10:28:25 -0000      1.96
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -68,6 +68,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Jawbone fitness tracker was tethered to a proprietary phone app.  In "
 "2017, the company shut down and made the app stop working. <a href=\"https://";
 "www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"

Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-sabotage.ja-diff.html   17 Oct 2018 10:01:36 -0000      1.22
+++ proprietary-sabotage.ja-diff.html   22 Oct 2018 10:28:25 -0000      1.23
@@ -47,6 +47,14 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201807050"&gt;
     &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
     app.  In 2017, the company shut down and made the app stop working. &lt;a
@@ -672,7 +680,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-sabotage.ja.po  10 Oct 2018 07:58:36 -0000      1.87
+++ proprietary-sabotage.ja.po  22 Oct 2018 10:28:25 -0000      1.88
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -67,6 +67,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Jawbone fitness tracker was tethered to a proprietary phone app.  In "
 "2017, the company shut down and made the app stop working. <a href=\"https://";
 "www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"

Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-sabotage.pot    10 Oct 2018 07:58:36 -0000      1.55
+++ proprietary-sabotage.pot    22 Oct 2018 10:28:25 -0000      1.56
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\";>
 "
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Jawbone fitness tracker was tethered to a proprietary phone app.  In "
 "2017, the company shut down and made the app stop working. <a "
 
"href=\"https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which\";>All
 "

Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary-sabotage.ru.po  11 Oct 2018 06:59:25 -0000      1.145
+++ proprietary-sabotage.ru.po  22 Oct 2018 10:28:25 -0000      1.146
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-10 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -70,6 +71,16 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Jawbone fitness tracker was tethered to a proprietary phone app.  In "
 "2017, the company shut down and made the app stop working. <a href=\"https://";
 "www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.de.po   14 Oct 2018 11:58:30 -0000      1.56
+++ proprietary.de.po   22 Oct 2018 10:28:25 -0000      1.57
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -98,19 +98,19 @@
 "übers Ohr gehauen zu werden&#160;…"
 
 #. type: Content of: <p>
-# | As of [-April, 2017,-] {+September, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+nearly 350+} instances of malicious
-# | [-functionalities,-] {+functionalities (with close to 400 references to
-# | back them up),+} but there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2017, the files in this directory list around 300 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
 "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -423,6 +423,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -444,14 +462,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -475,18 +485,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.es.po   14 Oct 2018 11:58:30 -0000      1.55
+++ proprietary.es.po   22 Oct 2018 10:28:25 -0000      1.56
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-09-19 10:49+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -92,19 +92,19 @@
 "de ser engañado."
 
 #. type: Content of: <p>
-# | As of September, 2018, the [-files-] {+pages+} in this directory list
-# | [-around 400-] {+nearly 350+} instances of malicious [-functionalities,-]
-# | {+functionalities (with close to 400 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-September,-] {+October 22,+} 2018, the [-files-] {+pages+} in this
+# | directory list [-around 400-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of September, 2018, the files in this directory list around 400 "
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "Hasta septiembre de 2018, los archivos de este directorio ofrecían una lista 
"
 "de alrededor de 400 ejemplos de funcionalidades maliciosas, pero seguramente "
@@ -436,6 +436,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -457,14 +475,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -488,18 +498,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.fr.po   14 Oct 2018 12:35:22 -0000      1.63
+++ proprietary.fr.po   22 Oct 2018 10:28:25 -0000      1.64
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-14 13:36+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -86,10 +87,19 @@
 "typiquement un moyen de mal se conduire."
 
 #. type: Content of: <p>
-msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-September,-] {+October 22,+} 2018, the pages in this directory
+# | list [-nearly 350-] {+339+} instances of malicious functionalities (with
+# | [-close to 400-] {+403+} references to back them up), but there are surely
+# | thousands more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2018, the pages in this directory list nearly 350 "
+#| "instances of malicious functionalities (with close to 400 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "En septembre 2018, les pages de ce répertoire dénombraient environ 350 cas "
 "de fonctionnalités malveillante (appuyés par près de 400 références), 
mais "
@@ -290,6 +300,28 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+"Un jeu vidéo non libre proposé par le client Steam non libre <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\">comprenait un « mineur »</a>, c'est-à-dire un 
exécutable qui "
+"pirate le processeur de l'ordinateur client pour générer une cryptomonnaie."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -324,18 +356,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-"Un jeu vidéo non libre proposé par le client Steam non libre <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\">comprenait un « mineur »</a>, c'est-à-dire un 
exécutable qui "
-"pirate le processeur de l'ordinateur client pour générer une cryptomonnaie."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -373,24 +393,6 @@
 "\">cacher des commandes vocales dans d'autres flux audio</a>. Elles sont "
 "inaudibles pour les humains, mais Alexa et Siri peuvent les entendre."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-"Android a une <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\">porte dérobée permettant de modifier à distance la configuration "
-"« utilisateur »</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-"L'article suggère qu'il pourrait s'agir d'une porte dérobée universelle, "
-"mais ce n'est pas clair."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -468,6 +470,23 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Android has a <a href=\"https://www.theverge.com/platform/";
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
+#~ msgstr ""
+#~ "Android a une <a href=\"https://www.theverge.com/platform/";
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\">porte dérobée permettant de modifier à distance la 
configuration "
+#~ "« utilisateur »</a>."
+
+#~ msgid ""
+#~ "The article suggests it might be a universal back door, but this isn't "
+#~ "clear."
+#~ msgstr ""
+#~ "L'article suggère qu'il pourrait s'agir d'une porte dérobée 
universelle, "
+#~ "mais ce n'est pas clair."
+
+#~ msgid ""
 #~ "One version of Windows 10 <a href=\"https://www.ghacks.net/2018/09/12/";
 #~ "microsoft-intercepting-firefox-chrome-installation-on-windows-10/\"> "
 #~ "harangues users if they try to install Firefox (or Chrome)</a>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary.it-diff.html    17 Oct 2018 10:01:37 -0000      1.14
+++ proprietary.it-diff.html    22 Oct 2018 10:28:25 -0000      1.15
@@ -81,8 +81,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>nearly 350</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with close to 400 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 22, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>339</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 403 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -179,6 +179,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807310"&gt;
+    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
+    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -197,13 +212,6 @@
     specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201807310"&gt;
-    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
-    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
-    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
-    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -224,15 +232,6 @@
     hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809140"&gt;
-    &lt;p&gt;Android has a &lt;a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
-    back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article suggests it might be a universal back door, but this
-    isn't clear.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -293,7 +292,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.it.po   14 Oct 2018 11:58:30 -0000      1.65
+++ proprietary.it.po   22 Oct 2018 10:28:25 -0000      1.66
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -94,19 +94,19 @@
 "norma. Il software proprietario moderno è tipicamente una fregatura."
 
 #. type: Content of: <p>
-# | As of [-April, 2017,-] {+September, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+nearly 350+} instances of malicious
-# | [-functionalities,-] {+functionalities (with close to 400 references to
-# | back them up),+} but there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2017, the files in this directory list around 300 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
 "ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -427,6 +427,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -448,14 +466,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -479,18 +489,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.ja-diff.html    17 Oct 2018 10:01:37 -0000      1.16
+++ proprietary.ja-diff.html    22 Oct 2018 10:28:25 -0000      1.17
@@ -77,8 +77,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 260</strong></del></span> <span 
class="inserted"><ins><em>nearly 350</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with close to 400 references to
+&lt;p&gt;As of <span class="removed"><del><strong>January, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 22, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 260</strong></del></span> <span 
class="inserted"><ins><em>339</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 403 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -176,6 +176,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807310"&gt;
+    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
+    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -194,13 +209,6 @@
     specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201807310"&gt;
-    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
-    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
-    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
-    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -221,15 +229,6 @@
     hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809140"&gt;
-    &lt;p&gt;Android has a &lt;a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
-    back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article suggests it might be a universal back door, but this
-    isn't clear.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -290,7 +289,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary.ja.po   14 Oct 2018 11:58:30 -0000      1.48
+++ proprietary.ja.po   22 Oct 2018 10:28:25 -0000      1.49
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -95,9 +95,9 @@
 #| "instances of malicious functionalities, but there are surely thousands "
 #| "more we don't know about."
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 
"2017年1月時点で、ここには、約260の異なる悪意のある機能の実例が掲載されていま"
 
"すが、確実にわたしたちが知らない何千もの例があるでしょう。"
@@ -349,6 +349,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -370,14 +388,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -401,18 +411,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary.nl-diff.html    17 Oct 2018 10:01:37 -0000      1.14
+++ proprietary.nl-diff.html    22 Oct 2018 10:28:25 -0000      1.15
@@ -81,8 +81,8 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>September, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>nearly 350</em></ins></span>
-instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with close to 400 references to
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October 22, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span 
class="removed"><del><strong>around 300</strong></del></span> <span 
class="inserted"><ins><em>339</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with 403 references to
 back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
 <span class="removed"><del><strong>&lt;div class="toc"&gt;
@@ -179,6 +179,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807310"&gt;
+    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
+    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -197,13 +212,6 @@
     specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201807310"&gt;
-    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
-    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
-    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
-    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -224,15 +232,6 @@
     hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809140"&gt;
-    &lt;p&gt;Android has a &lt;a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
-    back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article suggests it might be a universal back door, but this
-    isn't clear.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -293,7 +292,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:25 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.nl.po   14 Oct 2018 11:58:30 -0000      1.38
+++ proprietary.nl.po   22 Oct 2018 10:28:26 -0000      1.39
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -96,19 +96,19 @@
 "je meestal belazerd."
 
 #. type: Content of: <p>
-# | As of [-April, 2017,-] {+September, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+nearly 350+} instances of malicious
-# | [-functionalities,-] {+functionalities (with close to 400 references to
-# | back them up),+} but there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
 #, fuzzy
 #| msgid ""
 #| "As of April, 2017, the files in this directory list around 300 instances "
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
 "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
@@ -420,6 +420,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -441,14 +459,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -472,18 +482,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary.pl-diff.html    17 Oct 2018 10:01:37 -0000      1.32
+++ proprietary.pl-diff.html    22 Oct 2018 10:28:26 -0000      1.33
@@ -85,8 +85,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>September, 2018, the pages in this directory 
list nearly 350
-instances of malicious functionalities (with close to 400 references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October 22, 2018, the pages in this directory 
list 339
+instances of malicious functionalities (with 403 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -177,6 +177,21 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
+    use of independent replacement ink cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807310"&gt;
+    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
+    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
+    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
+    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201805080"&gt;
     &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
     
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
@@ -195,13 +210,6 @@
     specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201807310"&gt;
-    &lt;p&gt;A nonfree video game, available through the nonfree Steam client, 
&lt;a
-    
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-"&gt;
-    included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
-    the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201809260"&gt;
     &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
     only through the company's server. They have
@@ -222,15 +230,6 @@
     hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
     them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809140"&gt;
-    &lt;p&gt;Android has a &lt;a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
-    back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article suggests it might be a universal back door, but this
-    isn't clear.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -291,7 +290,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:26 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary.pl.po   14 Oct 2018 11:58:30 -0000      1.33
+++ proprietary.pl.po   22 Oct 2018 10:28:26 -0000      1.34
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -135,9 +135,9 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <table><tr><th>
@@ -501,6 +501,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -522,14 +540,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -553,18 +563,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary.pot     14 Oct 2018 11:58:30 -0000      1.30
+++ proprietary.pot     22 Oct 2018 10:28:26 -0000      1.31
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -70,9 +70,9 @@
 
 #. type: Content of: <p>
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 
 #. type: Content of: <table><tr><th>
@@ -241,6 +241,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\";>
 "
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a "
+"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-\";>
 "
+"included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks the CPU "
+"in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a "
 
"href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\";>
 "
 "inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This type "
@@ -263,14 +280,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a "
-"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-\";>
 "
-"included a &ldquo;miner&rdquo;</a>, i.e. an executable that hijacks the CPU "
-"in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a "
@@ -295,19 +304,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a "
-"href=\"https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change\";>
 "
-"back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't "
-"clear."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary.pt-br.po        14 Oct 2018 23:57:58 -0000      1.13
+++ proprietary.pt-br.po        22 Oct 2018 10:28:26 -0000      1.14
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-14 20:35-0300\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -84,10 +85,15 @@
 "de ser mal."
 
 #. type: Content of: <p>
-msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+#, fuzzy
+#| msgid ""
+#| "As of September, 2018, the pages in this directory list nearly 350 "
+#| "instances of malicious functionalities (with close to 400 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "Desde setembro de 2018, as páginas neste diretório listam quase 350 
exemplos "
 "de funcionalidades maliciosas (com cerca de 400 referências para confirmá-"
@@ -288,6 +294,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+"Um videogame não livre, disponível através do cliente não livre Steam, <a 
"
+"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-";
+"hijacking-systems-with-\"> incluiu um \"minerador\"</a>, ou seja, um "
+"executável que sequestra a CPU nos computadores dos usuários para minerar "
+"uma criptomoeda."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -323,19 +352,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-"Um videogame não livre, disponível através do cliente não livre Steam, <a 
"
-"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-";
-"hijacking-systems-with-\"> incluiu um \"minerador\"</a>, ou seja, um "
-"executável que sequestra a CPU nos computadores dos usuários para minerar "
-"uma criptomoeda."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -372,24 +388,6 @@
 "comandos de voz em outro áudio</a>, para que as pessoas não possam 
ouvi-las, "
 "mas Alexa e Siri podem."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-"Android tem um <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door para alterar remotamente as configurações do 
“usuário”</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-"O artigo sugere que pode ser uma porta traseira universal, mas isso não 
está "
-"claro."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -468,6 +466,23 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Android has a <a href=\"https://www.theverge.com/platform/";
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
+#~ msgstr ""
+#~ "Android tem um <a href=\"https://www.theverge.com/platform/";
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door para alterar remotamente as configurações do "
+#~ "“usuário”</a>."
+
+#~ msgid ""
+#~ "The article suggests it might be a universal back door, but this isn't "
+#~ "clear."
+#~ msgstr ""
+#~ "O artigo sugere que pode ser uma porta traseira universal, mas isso não "
+#~ "está claro."
+
+#~ msgid ""
 #~ "One version of Windows 10 <a href=\"https://www.ghacks.net/2018/09/12/";
 #~ "microsoft-intercepting-firefox-chrome-installation-on-windows-10/\"> "
 #~ "harangues users if they try to install Firefox (or Chrome)</a>."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.ru.po   14 Oct 2018 13:28:28 -0000      1.82
+++ proprietary.ru.po   22 Oct 2018 10:28:26 -0000      1.83
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-10-14 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,10 +89,19 @@
 "способ дать себя одурачить."
 
 #. type: Content of: <p>
-msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-September,-] {+October 22,+} 2018, the pages in this directory
+# | list [-nearly 350-] {+339+} instances of malicious functionalities (with
+# | [-close to 400-] {+403+} references to back them up), but there are surely
+# | thousands more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2018, the pages in this directory list nearly 350 "
+#| "instances of malicious functionalities (with close to 400 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "На сентябрь 2018 на страницах этого 
каталога перечислено около 350 примеров "
 "вредоносных функций (и почти 400 ссылок, 
подкрепляющих их), но есть, "
@@ -294,6 +304,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+"Несвободная видеоигра, доступная через 
несвободный клиент Steam, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> содержала &ldquo;майнера&rdquo;</a>, т.е. 
программу, "
+"которая захватывала процессор в 
компьютере пользователя, чтобы получать "
+"криптовалюту."
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -330,19 +363,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-"Несвободная видеоигра, доступная через 
несвободный клиент Steam, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> содержала &ldquo;майнера&rdquo;</a>, т.е. 
программу, "
-"которая захватывала процессор в 
компьютере пользователя, чтобы получать "
-"криптовалюту."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -379,23 +399,6 @@
 "голосовые команды в других звукозаписях
</a>, так что люди эти команды не "
 "слышат, но их слышат Alexa и Siri."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-"В системе Android есть <a 
href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> лазейка для удаленного изменения 
настроек &ldquo;"
-"пользователя&rdquo;</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-"В статье предполагается, что это 
универсальная лазейка, но это не ясно."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -475,6 +478,22 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Android has a <a href=\"https://www.theverge.com/platform/";
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
+#~ msgstr ""
+#~ "В системе Android есть <a 
href=\"https://www.theverge.com/platform/";
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> лазейка для удаленного изменения 
настроек &ldquo;"
+#~ "пользователя&rdquo;</a>."
+
+#~ msgid ""
+#~ "The article suggests it might be a universal back door, but this isn't "
+#~ "clear."
+#~ msgstr ""
+#~ "В статье предполагается, что это 
универсальная лазейка, но это не ясно."
+
+#~ msgid ""
 #~ "One version of Windows 10 <a href=\"https://www.ghacks.net/2018/09/12/";
 #~ "microsoft-intercepting-firefox-chrome-installation-on-windows-10/\"> "
 #~ "harangues users if they try to install Firefox (or Chrome)</a>."

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.zh-tw.po        14 Oct 2018 11:58:30 -0000      1.16
+++ proprietary.zh-tw.po        22 Oct 2018 10:28:26 -0000      1.17
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -92,9 +92,9 @@
 #| "of malicious functionalities, but there are surely thousands more we "
 #| "don't know about."
 msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
 msgstr ""
 "到2017年4月為止,此目錄列出的檔案已整理出約 300 
種惡意功能的實例,但是絕對還"
 "有上千種我們不瞭解的利用方式。"
@@ -338,6 +338,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Printer manufacturers are very innovative&mdash;at blocking the use of "
+"independent replacement ink cartridges. Their &ldquo;security "
+"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
+"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker used an exploit in outdated software to <a href=\"https://www.";
 "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
 "visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
@@ -359,14 +377,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
-"systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 "company's server. They have all the nasty characteristics of such devices: "
 "<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
@@ -390,18 +400,6 @@
 "Alexa and Siri can."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/";
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]