www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.fr.html malware-a...


From: GNUN
Subject: www/proprietary malware-apple.fr.html malware-a...
Date: Sat, 27 Oct 2018 04:28:56 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/27 04:28:54

Modified files:
        proprietary    : malware-apple.fr.html malware-apple.ru.html 
        proprietary/po : malware-apple.de-diff.html 
                         malware-apple.fr-en.html 
                         malware-apple.it-diff.html 
                         malware-apple.ja-diff.html 
                         malware-apple.nl-diff.html 
                         malware-apple.ru-en.html 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.fr.po malware-cars.pot 
                         malware-cars.ru.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de.po proprietary.es.po 
                         proprietary.fr.po proprietary.it-diff.html 
                         proprietary.it.po proprietary.ja-diff.html 
                         proprietary.ja.po proprietary.nl-diff.html 
                         proprietary.nl.po proprietary.pl-diff.html 
                         proprietary.pl.po proprietary.pot 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.238&r2=1.239
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.331&r2=1.332
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.251&r2=1.252
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.224&r2=1.225
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.419&r2=1.420
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.18&r2=1.19

Patches:
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-apple.fr.html       25 Oct 2018 11:28:56 -0000      1.65
+++ malware-apple.fr.html       27 Oct 2018 08:28:51 -0000      1.66
@@ -634,12 +634,6 @@
 technique</a>.</p>
   </li>
 
-  <li id="M201405080">
-    <p>Apple peut – et elle le fait régulièrement – <a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>extraire
-à distance certaines données des iPhones pour l'État</a>.</p>
-  </li>
-
   <li id="M201401101">
     <p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>Le
@@ -781,7 +775,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/25 11:28:56 $
+$Date: 2018/10/27 08:28:51 $
 
 <!-- timestamp end -->
 </p>

Index: malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-apple.ru.html       25 Oct 2018 17:00:13 -0000      1.61
+++ malware-apple.ru.html       27 Oct 2018 08:28:51 -0000      1.62
@@ -624,12 +624,6 @@
 технический доклад</a>.</p>
   </li>
 
-  <li id="M201405080">
-    <p>Apple может <a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>извлекать
-данные с удаленных iPhone для государства</a> и 
регулярно делает это.</p>
-  </li>
-
   <li id="M201401101">
     <p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>средство
@@ -768,7 +762,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/25 17:00:13 $
+$Date: 2018/10/27 08:28:51 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-apple.de-diff.html       25 Oct 2018 10:31:06 -0000      1.13
+++ po/malware-apple.de-diff.html       27 Oct 2018 08:28:52 -0000      1.14
@@ -437,340 +437,299 @@
     censoring apps for the US government too&lt;/a&gt;. 
Specifically,</em></ins></span> it <span class="removed"><del><strong>still 
counts as a
       surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>is
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>is
     deleting apps developed by Iranians.&lt;/p&gt;
 
-    &lt;p&gt;The root</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends to Apple servers unsaved documents being
-  edited&lt;/a&gt;. The &lt;a
-  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
-  things you have not decided to save</strong></del></span> <span 
class="inserted"><ins><em>these wrongs</em></ins></span> are <span 
class="removed"><del><strong>even more sensitive than the
-  things you have stored</strong></del></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The root</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>these wrongs are in Apple. If Apple had not designed
+    the iMonsters</em></ins></span> to <span class="inserted"><ins><em>let 
Apple censor applications, Apple would not have
+    had the power to stop users from installing whatever kind of 
apps.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple has made various
-  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files to</strong></del></span> <span 
class="inserted"><ins><em>Apple. If</em></ins></span> Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
-  This exposes</strong></del></span> <span class="inserted"><ins><em>had not 
designed</em></ins></span>
-    the <span class="removed"><del><strong>files to Big Brother and 
perhaps</strong></del></span> <span 
class="inserted"><ins><em>iMonsters</em></ins></span> to <span 
class="removed"><del><strong>other snoops.&lt;/p&gt;
-
-  &lt;p&gt;It also demonstrates how you can't trust proprietary software,
-  because even if today's version doesn't</strong></del></span> <span 
class="inserted"><ins><em>let Apple censor applications, Apple would 
not</em></ins></span> have <span class="removed"><del><strong>a malicious
-  functionality, tomorrow's version might add it. The developer won't
-  remove the malfeature unless many users push back hard, 
and</strong></del></span>
-    <span class="inserted"><ins><em>had</em></ins></span> the <span 
class="inserted"><ins><em>power to stop</em></ins></span> users
-  <span class="removed"><del><strong>can't remove it 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>from installing whatever kind of 
apps.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201707290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
-  the latest MacOS send reports</strong></del></span>
+  &lt;li id="M201707290"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
     deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
-    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of the Chinese 
government.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in MacOS:
-  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;
+    own censorship power to strengthen that</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span class="inserted"><ins><em>the Chinese 
government.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple admits the</strong></del></span> <span 
class="inserted"><ins><em>enforce Russian surveillance</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-  spying</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-    by blocking distribution of the LinkedIn app</em></ins></span> in <span 
class="inserted"><ins><em>Russia&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201701064"&gt;
+    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>break</strong></del></span> <span 
class="inserted"><ins><em>enforce Russian surveillance &lt;a
+    
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is ironic because LinkedIn is</em></ins></span> a <span 
class="removed"><del><strong>search facility&lt;/a&gt;, but there's a lot
-  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-  more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-  Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>surveillance system itself.
-    While subjecting its users</em></ins></span> to <span 
class="removed"><del><strong>exist for no possible
-  purpose other than surveillance&lt;/a&gt;.  Here</strong></del></span> <span 
class="inserted"><ins><em>its own surveillance, it tries to
+    &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
+    While subjecting its users to its own surveillance, it tries to
     protect its users from Russian surveillance, and is therefore subject
     to Russian censorship.&lt;/p&gt;
 
-    &lt;p&gt;However, the point here</em></ins></span> is the <span 
class="removed"><del><strong>&lt;a
-  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-  Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>wrong of Apple's censorship of
-    apps.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;However, the point here is the wrong of</em></ins></span> Apple's
+      <span class="removed"><del><strong>security</strong></del></span> <span 
class="inserted"><ins><em>censorship of
+    apps.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce China's 
censorship</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>iThing is, and
-  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>New York Times 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201701050"&gt;
+    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access 
any</strong></del></span> <span class="inserted"><ins><em>enforce China's 
censorship &lt;a
+    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple censors games,</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning</em></ins></span> some <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>games</em></ins></span> from <span 
class="removed"><del><strong>iPhones for</strong></del></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>cr&hellip;app store&lt;/a&gt; because of which
+  &lt;li id="M201605190"&gt;
+    &lt;p&gt;Apple censors games, &lt;a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
     political points they suggest. Some political points are apparently
     considered acceptable.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
     banned a program from the App Store&lt;/a&gt; because its developers
-    committed the enormity of disassembling some 
iThings.&lt;/p&gt;</em></ins></span>
+    committed the enormity of disassembling some iThings.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
-
-&lt;p&gt;In this section, we list characteristics</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509230"&gt;
-    &lt;p&gt;As</em></ins></span> of <span 
class="inserted"><ins><em>2015,</em></ins></span> Apple <span 
class="removed"><del><strong>programs</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201509230"&gt;
+    &lt;p&gt;As of 2015, Apple &lt;a
     
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically bans apps</em></ins></span> that <span 
class="removed"><del><strong>block</strong></del></span> <span 
class="inserted"><ins><em>endorse abortion rights</em></ins></span> or
-<span class="removed"><del><strong>hinder users from switching to any 
alternative program&mdash;and, in
-particular, from switching to free software which can liberate the device
-the software runs on.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;
-&lt;p&gt;Apple devices lock users in</strong></del></span> <span 
class="inserted"><ins><em>would help
+    systematically bans apps that endorse abortion rights or would help
     women find abortions&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This particular political slant</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-solely to Apple services&lt;/a&gt; by being designed to be incompatible with 
all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects</em></ins></span> other <span 
class="removed"><del><strong>options, ethical or 
unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This particular political slant &lt;a
+    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;iWork (office software</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506250"&gt;
+  &lt;li id="M201506250"&gt;
     &lt;p&gt;Apple has banned iThing
-    applications</em></ins></span> that <span 
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
-formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means</strong></del></span> <span class="inserted"><ins><em>show the 
confederate flag.  &lt;a
+    applications that show the confederate flag.  &lt;a
     
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it as a symbol</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
-    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. iWork 
formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>represent 
confederate army units
-    fighting in</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
+    Not only those that use it as a symbol</em></ins></span> of <span 
class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
-    not be allowed to censor apps.  Even if Apple carried out this 
act</em></ins></span> of <span class="removed"><del><strong>thwarting &lt;a
-href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
-efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+  MacOS automatically sends</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
+    strategic games that use it</em></ins></span> to <span 
class="inserted"><ins><em>represent confederate army units
+    fighting in the Civil War.&lt;/p&gt;
 
-&lt;p&gt;iWork formats</strong></del></span>
-    <span class="inserted"><ins><em>censorship with some care, it would still 
be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are <span class="removed"><del><strong>considered &lt;a
-href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>not
-    the real issue.  Apple should not have the power to impose its views
-    about either of these questions, or any other.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This ludicrous rigidity illustrates the point 
that</em></ins></span> Apple <span class="removed"><del><strong>servers unsaved 
documents being
+  edited&lt;/a&gt;. The &lt;a
+  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have</strong></del></span> <span 
class="inserted"><ins><em>should</em></ins></span>
+    not <span class="removed"><del><strong>decided</strong></del></span> <span 
class="inserted"><ins><em>be allowed</em></ins></span> to <span 
class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried out this act of
+    censorship with some care, it would still be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are <span class="removed"><del><strong>even more 
sensitive than</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span>
+    the
+  <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In MacOS</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Apple has made various
+  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files to</strong></del></span> <span 
class="inserted"><ins><em>real issue.</em></ins></span>  Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
+  This exposes</strong></del></span> <span class="inserted"><ins><em>should 
not have</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>power</em></ins></span> to <span 
class="removed"><del><strong>Big Brother</strong></del></span> <span 
class="inserted"><ins><em>impose its views
+    about either of these questions, or any other.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
+  &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>iOS,</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
+    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>perhaps</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>other snoops.&lt;/p&gt;
+
+  &lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>procedure</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> for <span 
class="inserted"><ins><em>a time.  It also &lt;a
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  
It</em></ins></span> also <span class="removed"><del><strong>demonstrates how 
you can't trust proprietary software,
+  because even if today's version doesn't have</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    banned</em></ins></span> a <span class="removed"><del><strong>malicious
+  functionality, tomorrow's version might add it. The developer won't
+  remove</strong></del></span> <span class="inserted"><ins><em>game about 
growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
     killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the locations
+    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>malfeature unless many users push back hard, 
and</strong></del></span> <span class="inserted"><ins><em>locations
     of US drone assassinations, giving various excuses. Each
     time the developers fixed one &ldquo;problem&rdquo;, Apple
     complained about another.  After the fifth rejection, Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
+    admitted it was censoring the app based on</em></ins></span> the <span 
class="removed"><del><strong>users
+  can't remove it themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations in
+  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
 
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send</strong></del></span> <span 
class="inserted"><ins><em>software.  This section</em></ins></span> reports 
<span class="inserted"><ins><em>examples of hard sell and other unjust 
commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
-    &lt;p&gt;Apple Siri</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-converting images from the Photos format&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
-    to <span class="removed"><del><strong>a free format is so tedious
-and time-consuming that users just</strong></del></span> give <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>you information&lt;/a&gt; about music 
charts</em></ins></span> if <span class="removed"><del><strong>they have a lot 
of them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>you're 
not an Apple
+    &lt;p&gt;Apple Siri &lt;a
+    
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions"&gt;refuses</em></ins></span>
+    to <span class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>give 
you information&lt;/a&gt; about music charts if you're not an Apple
     Music subscriber.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-&lt;h3 <span class="removed"><del><strong>id="drm"&gt;Apple DRM&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;iTunes videos have DRM,</strong></del></span> <span 
class="inserted"><ins><em>id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations in</em></ins></span> which <span 
class="removed"><del><strong>allows</strong></del></span> Apple <span 
class="inserted"><ins><em>employs its power over users</em></ins></span>
-to <span class="inserted"><ins><em>directly intervene in ways that harm them 
or block their work.&lt;/p&gt;
+&lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
+
+&lt;p&gt;These are situations</em></ins></span> in <span 
class="removed"><del><strong>MacOS:
+  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span> 
<span class="inserted"><ins><em>which Apple employs its power over 
users</em></ins></span>
+to <span class="removed"><del><strong>Apple.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple admits the
+  &lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying</strong></del></span> <span class="inserted"><ins><em>directly 
intervene</em></ins></span> in <span class="removed"><del><strong>a search 
facility&lt;/a&gt;, but there's a lot
+  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> that <span 
class="removed"><del><strong>Apple</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201805310"&gt;
-    &lt;p&gt;Apple has</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where</strong></del></span>
+    &lt;p&gt;Apple</em></ins></span> has <span 
class="removed"><del><strong>not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo; of iOS seem to exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here is the &lt;a
+  
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;The &lt;a class="not-a-duplicate"
+  
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+  get other info too.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading</em></ins></span> its <span 
class="removed"><del><strong>customers can
-  watch the videos</strong></del></span> <span class="inserted"><ins><em>app 
for a month&lt;/a&gt;.&lt;/p&gt;
+    Telegram</em></ins></span> from <span 
class="removed"><del><strong>iPhones</strong></del></span> <span 
class="inserted"><ins><em>upgrading its app</em></ins></span> for <span 
class="removed"><del><strong>the state&lt;/a&gt;.
+  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
month&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    &lt;p&gt;This <span class="removed"><del><strong>may have 
improved</strong></del></span> <span class="inserted"><ins><em>evidently has to 
do</em></ins></span> with
+  <span class="removed"><del><strong>&lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>Russia's command to Apple to block
     Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
+    &lt;p&gt;The Telegram client is free software on other 
platforms,</em></ins></span> but
+  <span class="removed"><del><strong>&lt;a 
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</strong></del></span>
 not <span class="removed"><del><strong>as much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>on
     iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;,</em></ins></span> they <span 
class="removed"><del><strong>purchased&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>don't permit any app to be free 
software.&lt;/p&gt;</em></ins></span>
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
DMCA</strong></del></span>
+&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+
+&lt;p&gt;In this section, we list characteristics</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot 
drives,</em></ins></span> and <span class="removed"><del><strong>the EU 
Copyright Directive make it</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
-    changes</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>file 
system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of 
MacOS.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
+    
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
+    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="inserted"><ins><em>MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a
-  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
+  &lt;li id="M201706060"&gt;
     &lt;p&gt;Apple will stop &lt;a
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="removed"><del><strong>uses DRM software to prevent</strong></del></span> 
<span class="inserted"><ins><em>stops</em></ins></span> people from <span 
class="removed"><del><strong>charging an iThing with a 
-  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;&lt;a
-  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-  focuses on</strong></del></span> <span class="inserted"><ins><em>fixing 
problems themselves;
-    that's</em></ins></span> the <span class="removed"><del><strong>fact that 
a new model</strong></del></span> <span 
class="inserted"><ins><em>nature</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
-  for monitors to have malicious hardware, but DRM software in MacOS is
-  involved in activating the hardware. The software for accessing iTunes
-  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>proprietary software.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Meanwhile,</em></ins></span> Apple <span 
class="removed"><del><strong>programs that block or
+hinder users</strong></del></span> <span class="inserted"><ins><em>stops 
people</em></ins></span> from <span 
class="removed"><del><strong>switching</strong></del></span> <span 
class="inserted"><ins><em>fixing problems themselves;
+    that's the nature of proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704070"&gt;
+  &lt;li id="M201704070"&gt;
     &lt;p id="iphone7-sabotage"&gt;The
-    iPhone 7 contains</em></ins></span> DRM <span 
class="removed"><del><strong>that caters</strong></del></span> <span 
class="inserted"><ins><em>specifically designed</em></ins></span> to <span 
class="removed"><del><strong>Bluray disks&lt;/a&gt;.  
(The</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    iPhone 7 contains DRM specifically designed</em></ins></span> to <span 
class="removed"><del><strong>any alternative program&mdash;and, in
+particular, from switching</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://motherboard.vice.com/en_us/article/kbjm8e/iphone-7-home-button-unreplaceable-repair-software-lock"&gt;
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>focused on Windows
-  and said that MacOS would do</strong></del></span> <span 
class="inserted"><ins><em>uses</em></ins></span> the <span 
class="removed"><del><strong>same thing subsequently.)&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;</em></ins></span>
+    to <span class="removed"><del><strong>free software which can 
liberate</strong></del></span> <span 
class="inserted"><ins><em>describe</em></ins></span> the <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span 
class="removed"><del><strong>software runs on.&lt;/p&gt;
 
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
-
-&lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS,</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
-    to describe</em></ins></span> the <span 
class="removed"><del><strong>operating system of</strong></del></span> <span 
class="inserted"><ins><em>DRM, but we prefer to use</em></ins></span> the <span 
class="removed"><del><strong>Apple iThings, is</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201606080"&gt;
-    &lt;p&gt;Apple &lt;a
+  &lt;li id="M201606080"&gt;</em></ins></span>
+    &lt;p&gt;Apple <span class="removed"><del><strong>devices 
lock</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/"&gt;
-    stops users from fixing</em></ins></span> the <span 
class="removed"><del><strong>prototype
-of a jail&lt;/a&gt;.  It was</strong></del></span> <span 
class="inserted"><ins><em>security bugs in Quicktime for Windows&lt;/a&gt;,
-    while refusing to fix them itself.&lt;/p&gt;
+    stops</em></ins></span> users <span class="inserted"><ins><em>from fixing 
the security bugs</em></ins></span> in <span class="removed"><del><strong>&lt;a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely</strong></del></span> <span class="inserted"><ins><em>Quicktime for 
Windows&lt;/a&gt;,
+    while refusing</em></ins></span> to <span class="inserted"><ins><em>fix 
them itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605040"&gt;
-    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>that introduced</strong></del></span> <span 
class="inserted"><ins><em>Music client program &lt;a
-    
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
-    the <span class="removed"><del><strong>practice of
-designing general purpose computers with censorship of application
-programs.&lt;/p&gt;
+    &lt;p&gt;The</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt; by being 
designed</strong></del></span> <span class="inserted"><ins><em>Music client 
program &lt;a
+    
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
+    the user's file system for music files, copies them</em></ins></span> to 
<span class="removed"><del><strong>be incompatible with all
+other options, ethical or unethical.&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;Here is</strong></del></span> <span class="inserted"><ins><em>user's 
file system for music files, copies them to</em></ins></span> an <span 
class="removed"><del><strong>article about the</strong></del></span> <span 
class="inserted"><ins><em>Apple server,
-    and deletes them&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats</strong></del></span> <span class="inserted"><ins><em>an Apple 
server,</em></ins></span>
+    and <span class="inserted"><ins><em>deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602050"&gt;
-    &lt;p&gt;iOS version 9 for iThings</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-code signing&lt;/a&gt; that</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages
-    them irreparably if they were repaired by someone other than
-    Apple&lt;/a&gt;. Apple eventually backed off from this policy under
-    criticism from</em></ins></span> the <span 
class="inserted"><ins><em>users. However, it has not acknowledged that this
-    was wrong.&lt;/p&gt;
+    &lt;p&gt;iOS version 9 for iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means
+of converting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair"&gt;sabotages</em></ins></span>
+    them <span class="removed"><del><strong>to or from Open Document 
Formats&lt;/a&gt;. iWork formats
+have changed several times since</strong></del></span> <span 
class="inserted"><ins><em>irreparably if</em></ins></span> they were <span 
class="removed"><del><strong>first introduced. This may have
+had the effect of thwarting &lt;a
+href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+efforts&lt;/a&gt;, thus preventing free software</strong></del></span> <span 
class="inserted"><ins><em>repaired by someone other than
+    Apple&lt;/a&gt;. Apple eventually backed off</em></ins></span> from <span 
class="removed"><del><strong>fully supporting them.&lt;/p&gt;
+
+&lt;p&gt;iWork formats are considered &lt;a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>this policy under
+    criticism from the users. However, it has not acknowledged that this
+    was wrong.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201510020"&gt;
-    &lt;p&gt;Apple forced millions of</em></ins></span> iThings <span 
class="removed"><del><strong>use</strong></del></span> to <span 
class="removed"><del><strong>lock up</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
-    a system upgrade without asking</em></ins></span> the <span 
class="removed"><del><strong>user.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;In MacOS and iOS,</strong></del></span>
 
-&lt;p&gt;Curiously,</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.</em></ins></span> Apple <span 
class="removed"><del><strong>is beginning to allow limited passage 
through</strong></del></span> <span class="inserted"><ins><em>did not
-    forcibly install</em></ins></span> the
-<span class="removed"><del><strong>walls</strong></del></span> <span 
class="inserted"><ins><em>upgrade but the downloading alone caused 
lots</em></ins></span>
-    of <span class="inserted"><ins><em>trouble.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201510020"&gt;
+    &lt;p&gt;Apple forced millions of iThings to &lt;a
+    href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
+    a system upgrade without asking</em></ins></span> the <span 
class="removed"><del><strong>procedure for</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;. Apple did not
+    forcibly install the upgrade but the downloading alone caused lots
+    of trouble.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412040"&gt;
-    &lt;p&gt;Apple &lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
-    deleted from iPods</em></ins></span> the <span 
class="removed"><del><strong>iThing jail:</strong></del></span> <span 
class="inserted"><ins><em>music that</em></ins></span> users <span 
class="removed"><del><strong>can now install apps built</strong></del></span> 
<span class="inserted"><ins><em>had got</em></ins></span> from
-<span class="removed"><del><strong>source code, provided the source code is 
written in Swift.  Users
-cannot do this freely because they are required to identify
-themselves.</strong></del></span> <span class="inserted"><ins><em>internet 
music
+    &lt;p&gt;Apple</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+converting images</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs"&gt;
+    deleted</em></ins></span> from <span 
class="inserted"><ins><em>iPods</em></ins></span> the <span 
class="removed"><del><strong>Photos format&lt;/a&gt; to a free format is so 
tedious
+and time-consuming</strong></del></span> <span 
class="inserted"><ins><em>music</em></ins></span> that users <span 
class="removed"><del><strong>just give up if they have a lot of 
them.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>had got 
from internet music
     stores that competed with iTunes&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -779,104 +738,151 @@
     
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html"&gt;
     An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
     unlocked&lt;/a&gt;.  The &ldquo;upgrade&rdquo; also deactivated 
applications
-    not approved by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://developer.apple.com/xcode/"&gt;Here
-are details&lt;/a&gt;. While</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Apple
-    censorship&lt;/a&gt;.  All</em></ins></span> this <span 
class="removed"><del><strong>is a crack in</strong></del></span> <span 
class="inserted"><ins><em>was apparently intentional.&lt;/p&gt;
+    not approved by &lt;a href="/proprietary/proprietary-jails.html"&gt;Apple
+    censorship&lt;/a&gt;.  All this was apparently 
intentional.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="drm"&gt;Apple DRM&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;iTunes videos have DRM, which allows Apple 
to</strong></del></span> <span 
class="inserted"><ins><em>id="surveillance"&gt;Apple Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809070"&gt;
-    &lt;p&gt;Adware Doctor, an ad blocker for MacOS, &lt;a
-    
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
-    the <span class="removed"><del><strong>prison walls,</strong></del></span> 
<span class="inserted"><ins><em>user's browsing history&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Adware Doctor, an ad blocker for MacOS,</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its customers can
+  watch</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history"&gt;reports</em></ins></span>
+    the <span class="removed"><del><strong>videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's browsing 
history&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>is not
-big enough</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711250"&gt;
+    &lt;p&gt;The</em></ins></span> DMCA and the EU Copyright Directive make it 
&lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="removed"><del><strong>mean 
that</strong></del></span> <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    illegal to study how iOS <span 
class="removed"><del><strong>cr...apps</strong></del></span> <span 
class="inserted"><ins><em>cr&hellip;apps</em></ins></span> spy on <span 
class="removed"><del><strong>users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
+  Apple uses DRM software to prevent people from charging an iThing with a 
+  generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;&lt;a
+  
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
+  DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+  focuses on the fact that a new model of Macbook introduced a requirement
+  for monitors to have malicious hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
+  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+
+&lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
+iOS, the operating system of the Apple iThings, is the prototype
+of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
+designing general purpose computers with censorship of application
+programs.&lt;/p&gt;
+
+&lt;p&gt;Here is an article about</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>&lt;a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+code signing&lt;/a&gt; that</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the <span 
class="inserted"><ins><em>latest</em></ins></span> iThings <span 
class="removed"><del><strong>are no longer jails.&lt;/p&gt;
+    &lt;p&gt;In</em></ins></span> the <span 
class="inserted"><ins><em>latest</em></ins></span> iThings <span 
class="removed"><del><strong>use to lock up</strong></del></span> <span 
class="inserted"><ins><em>system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>user.&lt;/p&gt;
 
-&lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Apple</strong></del></span> <span 
class="inserted"><ins><em>system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious 
way</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-      deleted several VPNs from its app store</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+&lt;p&gt;Curiously,</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
+    
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>China&lt;/a&gt;, thus using
-      its own censorship power</strong></del></span> <span 
class="inserted"><ins><em>you&mdash;&ldquo;We
-    know you want</em></ins></span> to <span 
class="removed"><del><strong>strengthen that of the Chinese
-      government.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
+    them off&mdash;only until 5am.  That's</em></ins></span> Apple <span 
class="removed"><del><strong>is beginning</strong></del></span> <span 
class="inserted"><ins><em>for you&mdash;&ldquo;We
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>allow limited passage 
through</strong></del></span> <span class="inserted"><ins><em>be spied 
on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702150"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>is</strong></del></span> 
<span class="inserted"><ins><em>proposes</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
-      censoring apps for the US government too&lt;/a&gt;. Specifically, it
-      is deleting apps developed by Iranians.&lt;/p&gt;
-    &lt;p&gt;The root of these wrongs are in Apple. If Apple had not designed
-      the iMonsters</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>let Apple censor applications, 
Apple</strong></del></span> <span class="inserted"><ins><em>use it without 
having your fingerprints taken. Users</em></ins></span> would <span 
class="removed"><del><strong>not</strong></del></span> have
-      <span class="removed"><del><strong>had</strong></del></span>
-    <span class="inserted"><ins><em>no way to tell whether</em></ins></span> 
the <span class="removed"><del><strong>power</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
+  &lt;li id="M201702150"&gt;
+    &lt;p&gt;Apple proposes &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
+    to use it without having your fingerprints taken. Users would have
+    no way to tell whether</em></ins></span> the
+<span class="removed"><del><strong>walls</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots of personal data</em></ins></span> to <span 
class="removed"><del><strong>stop users</strong></del></span> <span 
class="inserted"><ins><em>Apple's servers&lt;/a&gt;.  Big Brother can get
-    them</em></ins></span> from <span class="removed"><del><strong>installing 
whatever kind of apps.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>there.&lt;/p&gt;</em></ins></span>
+    lots</em></ins></span> of <span class="removed"><del><strong>the iThing 
jail: users</strong></del></span> <span class="inserted"><ins><em>personal data 
to Apple's servers&lt;/a&gt;.  Big Brother</em></ins></span> can <span 
class="removed"><del><strong>now install apps built</strong></del></span> <span 
class="inserted"><ins><em>get
+    them</em></ins></span> from
+<span class="removed"><del><strong>source code, provided the source code is 
written in Swift.  Users
+cannot do this freely because they are required to identify
+themselves.</strong></del></span> <span 
class="inserted"><ins><em>there.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple used its censorship system</strong></del></span>
+  &lt;li id="M201609280"&gt;
+    &lt;p&gt;The iMessage app on iThings</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://developer.apple.com/xcode/"&gt;Here
+are details&lt;/a&gt;. While this is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</em></ins></span>
+    a <span class="removed"><del><strong>crack in the prison walls, it is not
+big enough to mean</strong></del></span> <span 
class="inserted"><ins><em>server every phone number</em></ins></span> that the 
<span class="removed"><del><strong>iThings are no longer jails.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201609280"&gt;
-    &lt;p&gt;The iMessage app on iThings &lt;a
-    
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-    a server every phone number that the user types into it&lt;/a&gt;; the
-    server records these numbers for at least 30 days.&lt;/p&gt;
+&lt;h4&gt;Examples of censorship by Apple jails&lt;/h4&gt;
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Apple &lt;a
+      
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+      deleted several VPNs from its app store</strong></del></span> <span 
class="inserted"><ins><em>user types into it&lt;/a&gt;; the
+    server records these numbers</em></ins></span> for <span 
class="removed"><del><strong>China&lt;/a&gt;, thus using
+      its own censorship power</strong></del></span> <span 
class="inserted"><ins><em>at least 30 days.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers all the photos
+    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>strengthen that of</strong></del></span> <span 
class="inserted"><ins><em>Apple's servers all</em></ins></span> the <span 
class="removed"><del><strong>Chinese
+      government.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple is</strong></del></span> <span 
class="inserted"><ins><em>photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up</em></ins></span> to <span 
class="removed"><del><strong>enforce Russian surveillance</strong></del></span> 
<span class="inserted"><ins><em>date on all your devices. Any edits you
+    take, and keeps them up to date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span> 
by <span class="removed"><del><strong>blocking distribution 
of</strong></del></span> the <span class="removed"><del><strong>LinkedIn app in 
Russia&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;This is ironic because LinkedIn</strong></del></span>
-    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
+      <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
+      censoring apps for the US government too&lt;/a&gt;. Specifically, 
it</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</em></ins></span> is <span class="removed"><del><strong>deleting apps 
developed</strong></del></span>
+    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated</em></ins></span> 
by <span class="removed"><del><strong>Iranians.&lt;/p&gt;
+    &lt;p&gt;The root of these wrongs are in Apple. If Apple had not designed
+      the iMonsters to let Apple censor applications, Apple would not have
+      had</strong></del></span> the <span class="removed"><del><strong>power 
to stop users from installing whatever kind</strong></del></span>
+    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple used its censorship system</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There</em></ins></span> is a <span 
class="removed"><del><strong>surveillance system itself.
-      While subjecting its users</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>its own surveillance,</strong></del></span>
-    <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
-    iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>tries to
+    &lt;p&gt;There is a way</em></ins></span> to <span 
class="removed"><del><strong>enforce Russian surveillance</strong></del></span>
+    &lt;a
+      <span 
class="removed"><del><strong>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://support.apple.com/en-us/HT201104"&gt; 
deactivate
+    iCloud&lt;/a&gt;, but it's active</em></ins></span> by <span 
class="removed"><del><strong>blocking distribution of the LinkedIn app in 
Russia&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is ironic because LinkedIn is</strong></del></span> <span 
class="inserted"><ins><em>default so it still counts as</em></ins></span> a
+    surveillance <span class="removed"><del><strong>system itself.
+      While subjecting its users to its own surveillance, it tries to
       protect its users from Russian surveillance, and is therefore
-      subject</strong></del></span> <span class="inserted"><ins><em>still 
counts as a
-    surveillance functionality.&lt;/p&gt;
+      subject</strong></del></span> <span 
class="inserted"><ins><em>functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of 
this</em></ins></span> to <span class="removed"><del><strong>Russian 
censorship.&lt;/p&gt;
     &lt;p&gt;However, the point here is the wrong</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
@@ -991,15 +997,10 @@
     Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405080"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>used this censorship 
power in 2014</strong></del></span> <span class="inserted"><ins><em>can, and 
regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Apple used this censorship power in 2014</strong></del></span>
 
-  &lt;li id="M201401101"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201401101"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="inserted"><ins><em>Apple.&lt;/p&gt;
@@ -1148,7 +1149,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:06 $
+$Date: 2018/10/27 08:28:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/malware-apple.fr-en.html 25 Oct 2018 11:28:59 -0000      1.61
+++ po/malware-apple.fr-en.html 27 Oct 2018 08:28:52 -0000      1.62
@@ -614,12 +614,6 @@
     Technical presentation</a>.</p>
   </li>
 
-  <li id="M201405080">
-    <p>Apple can, and regularly does, <a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
-    remotely extract some data from iPhones for the state</a>.</p>
-  </li>
-
   <li id="M201401101">
     <p><a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
@@ -740,7 +734,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/25 11:28:59 $
+$Date: 2018/10/27 08:28:52 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- po/malware-apple.it-diff.html       25 Oct 2018 10:31:06 -0000      1.20
+++ po/malware-apple.it-diff.html       27 Oct 2018 08:28:52 -0000      1.21
@@ -436,19 +436,19 @@
     is bad, whether educating people about drone attacks is bad, are not
     the real issue.  Apple should not have the power</em></ins></span> to 
<span class="removed"><del><strong>render
     a certain kind</strong></del></span> <span 
class="inserted"><ins><em>impose its views
-    about either of these questions, or any other.&lt;/p&gt;
+    about either</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these questions, or any 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201412110"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples</em></ins></span> of <span 
class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
+  &lt;li id="M201405250"&gt;
     &lt;p&gt;Apple used this censorship power</em></ins></span> in <span 
class="inserted"><ins><em>2014 to &lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
     ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the iThings <span 
class="removed"><del><strong>Messages
@@ -514,22 +514,22 @@
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
     Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command</em></ins></span> 
to <span class="removed"><del><strong>the users of 
specific</strong></del></span> Apple <span class="inserted"><ins><em>to block
+    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
     Telegram in Russia.&lt;/p&gt;
 
     &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
     iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;, they don't permit any app to be 
free</em></ins></span> software.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;/li&gt;
+    are jails&lt;/a&gt;, they don't permit any app</em></ins></span> to <span 
class="inserted"><ins><em>be free software.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
-    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    changes</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+  to APFS&lt;/a&gt;, which 
cannot be
+    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="removed"><del><strong>specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;</em></ins></span>
@@ -742,11 +742,11 @@
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410300"&gt;
-    &lt;p&gt; MacOS automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
+    &lt;p&gt; MacOS automatically &lt;a
+    
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
     sends to Apple servers unsaved documents being edited&lt;/a&gt;. The
-    things you have not decided to save are &lt;a
-    
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
+    things you have not decided to save are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
     even more sensitive&lt;/a&gt; than</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -830,35 +830,29 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
   iOS, the operating system of the Apple iThings, is a jail for
-  users.&lt;/a&gt;  That means it imposes censorship</strong></del></span>
+  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
+
+  &lt;p&gt;Apple has used this power to
+  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
+
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from iThing users, who
+  referred</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>application programs.&lt;/p&gt;
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;Apple has used this power</strong></del></span> <span 
class="inserted"><ins><em>iOS seem</em></ins></span> to
-  <span class="removed"><del><strong>&lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-  censor all bitcoin apps&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
-    for <span class="removed"><del><strong>the iThings.&lt;/p&gt;
-
-  &lt;p&gt;Apple, in the iThings, pioneered the practice of 
general</strong></del></span> <span class="inserted"><ins><em>no 
possible</em></ins></span> purpose
-  <span class="removed"><del><strong>computers that are jails, and the term 
comes from iThing users, who
-  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>other 
than surveillance&lt;/a&gt;.  Here</em></ins></span> is <span 
class="removed"><del><strong>an article about</strong></del></span> the &lt;a
+  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  
Here</em></ins></span> is <span class="removed"><del><strong>an article 
about</strong></del></span> the &lt;a
   <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-  code signing&lt;/a&gt; that</strong></del></span>
+  code signing&lt;/a&gt; that the iThings use</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405080"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>iThings use</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201401101"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
@@ -1011,7 +1005,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:06 $
+$Date: 2018/10/27 08:28:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/malware-apple.ja-diff.html       25 Oct 2018 10:31:06 -0000      1.33
+++ po/malware-apple.ja-diff.html       27 Oct 2018 08:28:52 -0000      1.34
@@ -198,67 +198,71 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API 
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201704071"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software to prevent people from charging</em></ins></span> 
an <span class="removed"><del><strong>attacker</strong></del></span> <span 
class="inserted"><ins><em>iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200811210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on the fact that a new model of Macbook introduced a
-    requirement for monitors to have malicious hardware, but DRM software
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that a new model of Macbook 
introduced</em></ins></span> a
+    <span class="inserted"><ins><em>requirement for monitors to 
have</em></ins></span> malicious <span class="removed"><del><strong>web 
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM 
software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-    and said that MacOS would do the same thing subsequently.)&lt;/p&gt;
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows Apple</em></ins></span> to 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
+    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
+    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching 
to</em></ins></span> any <span 
class="removed"><del><strong>application</strong></del></span> <span 
class="inserted"><ins><em>alternative program&mdash;and, in
-particular, from switching to free software</em></ins></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>can liberate the device
+&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up</strong></del></span> 
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program&mdash;and, in
+particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>user's 
system. They are like sabotage, but</strong></del></span> <span 
class="inserted"><ins><em>device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201803300"&gt;
     &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-    converting images from the Photos format&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>render</strong></del></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>free format is so
-    tedious and time-consuming that users just give up if they have a
-    lot</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+    converting images from the Photos format&lt;/a&gt; to a free format is so
+    tedious and time-consuming that users just give up if</em></ins></span> 
they <span class="removed"><del><strong>are not grave 
enough</strong></del></span> <span class="inserted"><ins><em>have a
+    lot of them.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users</em></ins></span> in <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in &lt;a
     
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
     solely to Apple services&lt;/a&gt; by being designed to be incompatible
     with all other options, ethical or unethical.&lt;/p&gt;
@@ -433,34 +437,26 @@
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the iThings <span 
class="removed"><del><strong>Messages
-      app</strong></del></span> <span class="inserted"><ins><em>for a time.  
It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
+    ban all bitcoin apps&lt;/a&gt;</em></ins></span> for the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples of Apple committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of</strong></del></span> iThings 
<span class="removed"><del><strong>to download</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned</em></ins></span> a <span class="removed"><del><strong>malicious 
web site to extract all the user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>game 
about growing marijuana&lt;/a&gt;, while permitting games
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
-    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
+    killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
-for</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span>
-    of <span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings to download a system 
upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without 
asking</strong></del></span>
-    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>fifth rejection,</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201402070"&gt;
+    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>did not forcibly 
install</strong></del></span>
+    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span class="removed"><del><strong>upgrade 
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection, 
Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>upgrade but</strong></del></span> <span 
class="inserted"><ins><em>app based on</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -683,7 +679,7 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them <span 
class="removed"><del><strong>through
+    security to <span class="removed"><del><strong>get at them, but NSA can 
access any of them through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
@@ -692,7 +688,7 @@
   edited&lt;/a&gt;. The &lt;a
   
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
   things you have not decided to save are even more sensitive than the
-  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>through &lt;a
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>get at them, but NSA can access any of them 
through &lt;a
     
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -798,35 +794,29 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
   iOS, the operating system of the Apple iThings, is a jail for
-  users.&lt;/a&gt;  That means it imposes censorship</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>application programs.&lt;/p&gt;
+  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
 
-  &lt;p&gt;Apple has used this power</strong></del></span> <span 
class="inserted"><ins><em>iOS seem</em></ins></span> to
-  <span class="removed"><del><strong>&lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-  censor all bitcoin apps&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
-    for <span class="removed"><del><strong>the iThings.&lt;/p&gt;
+  &lt;p&gt;Apple has used this power to
+  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
 
   &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
   computers that are jails, and the term comes from iThing users, who
-  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+  referred</strong></del></span>
 
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>no 
possible purpose other than surveillance&lt;/a&gt;.  Here</em></ins></span> is 
<span class="removed"><del><strong>an article about</strong></del></span> the 
&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  
Here</em></ins></span> is <span class="removed"><del><strong>an article 
about</strong></del></span> the &lt;a
   <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-  code signing&lt;/a&gt; that</strong></del></span>
+  code signing&lt;/a&gt; that the iThings use</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405080"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>iThings use</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201401101"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
@@ -979,7 +969,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:06 $
+$Date: 2018/10/27 08:28:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- po/malware-apple.nl-diff.html       25 Oct 2018 10:31:08 -0000      1.38
+++ po/malware-apple.nl-diff.html       27 Oct 2018 08:28:52 -0000      1.39
@@ -198,67 +198,71 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API 
allowed</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201704071"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which</strong></del></span>
+    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software to prevent people from charging</em></ins></span> 
an <span class="removed"><del><strong>attacker</strong></del></span> <span 
class="inserted"><ins><em>iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200811210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on the fact that a new model of Macbook introduced a
-    requirement for monitors to have malicious hardware, but DRM software
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that a new model of Macbook 
introduced</em></ins></span> a
+    <span class="inserted"><ins><em>requirement for monitors to 
have</em></ins></span> malicious <span class="removed"><del><strong>web 
site</strong></del></span> <span class="inserted"><ins><em>hardware, but DRM 
software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-    and said that MacOS would do the same thing subsequently.)&lt;/p&gt;
+    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
-    &lt;p&gt;iTunes videos have DRM, which allows Apple</em></ins></span> to 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate
 where its
-    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
+    href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
+    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple programs that block 
or
-hinder users</em></ins></span> from <span class="inserted"><ins><em>switching 
to</em></ins></span> any <span 
class="removed"><del><strong>application</strong></del></span> <span 
class="inserted"><ins><em>alternative program&mdash;and, in
-particular, from switching to free software</em></ins></span> which <span 
class="removed"><del><strong>uses this API</strong></del></span> <span 
class="inserted"><ins><em>can liberate the device
+&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up</strong></del></span> 
<span class="inserted"><ins><em>that block or
+hinder users from switching to any alternative program&mdash;and, in
+particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>user's 
system. They are like sabotage, but</strong></del></span> <span 
class="inserted"><ins><em>device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201803300"&gt;
     &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
     
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
-    converting images from the Photos format&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>render</strong></del></span> a <span 
class="removed"><del><strong>certain kind</strong></del></span> <span 
class="inserted"><ins><em>free format is so
-    tedious and time-consuming that users just give up if they have a
-    lot</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+    converting images from the Photos format&lt;/a&gt; to a free format is so
+    tedious and time-consuming that users just give up if</em></ins></span> 
they <span class="removed"><del><strong>are not grave 
enough</strong></del></span> <span class="inserted"><ins><em>have a
+    lot of them.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users</em></ins></span> in <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in &lt;a
     
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
     solely to Apple services&lt;/a&gt; by being designed to be incompatible
     with all other options, ethical or unethical.&lt;/p&gt;
@@ -433,34 +437,26 @@
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the iThings <span 
class="removed"><del><strong>Messages
-      app</strong></del></span> <span class="inserted"><ins><em>for a time.  
It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
+    ban all bitcoin apps&lt;/a&gt;</em></ins></span> for the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples of Apple committing
+interference.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions of</strong></del></span> iThings 
<span class="removed"><del><strong>to download</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned</em></ins></span> a <span class="removed"><del><strong>malicious 
web site to extract all the user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>game 
about growing marijuana&lt;/a&gt;, while permitting games
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
-    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
+    killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
-for</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span>
-    of <span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings to download a system 
upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without 
asking</strong></del></span>
-    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>fifth rejection,</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201402070"&gt;
+    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>did not forcibly 
install</strong></del></span>
+    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span class="removed"><del><strong>upgrade 
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection, 
Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>upgrade but</strong></del></span> <span 
class="inserted"><ins><em>app based on</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -683,7 +679,7 @@
     &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
     nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them <span 
class="removed"><del><strong>through
+    security to <span class="removed"><del><strong>get at them, but NSA can 
access any of them through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
@@ -692,7 +688,7 @@
   edited&lt;/a&gt;. The &lt;a
   
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
   things you have not decided to save are even more sensitive than the
-  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>through &lt;a
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>get at them, but NSA can access any of them 
through &lt;a
     
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -798,35 +794,29 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
   iOS, the operating system of the Apple iThings, is a jail for
-  users.&lt;/a&gt;  That means it imposes censorship</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>application programs.&lt;/p&gt;
+  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
 
-  &lt;p&gt;Apple has used this power</strong></del></span> <span 
class="inserted"><ins><em>iOS seem</em></ins></span> to
-  <span class="removed"><del><strong>&lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-  censor all bitcoin apps&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
-    for <span class="removed"><del><strong>the iThings.&lt;/p&gt;
+  &lt;p&gt;Apple has used this power to
+  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
 
   &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
   computers that are jails, and the term comes from iThing users, who
-  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+  referred</strong></del></span>
 
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>no 
possible purpose other than surveillance&lt;/a&gt;.  Here</em></ins></span> is 
<span class="removed"><del><strong>an article about</strong></del></span> the 
&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo; of iOS seem</em></ins></span> to <span 
class="removed"><del><strong>escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  
Here</em></ins></span> is <span class="removed"><del><strong>an article 
about</strong></del></span> the &lt;a
   <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-  code signing&lt;/a&gt; that</strong></del></span>
+  code signing&lt;/a&gt; that the iThings use</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405080"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for</em></ins></span> the <span 
class="removed"><del><strong>iThings use</strong></del></span> <span 
class="inserted"><ins><em>state&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201401101"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
@@ -979,7 +969,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/malware-apple.ru-en.html 25 Oct 2018 17:00:14 -0000      1.61
+++ po/malware-apple.ru-en.html 27 Oct 2018 08:28:52 -0000      1.62
@@ -614,12 +614,6 @@
     Technical presentation</a>.</p>
   </li>
 
-  <li id="M201405080">
-    <p>Apple can, and regularly does, <a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
-    remotely extract some data from iPhones for the state</a>.</p>
-  </li>
-
   <li id="M201401101">
     <p><a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
@@ -740,7 +734,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/25 17:00:14 $
+$Date: 2018/10/27 08:28:52 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- po/malware-cars.de-diff.html        26 Oct 2018 06:58:57 -0000      1.9
+++ po/malware-cars.de-diff.html        27 Oct 2018 08:28:52 -0000      1.10
@@ -79,7 +79,8 @@
 
     &lt;p&gt;But if you really want</em></ins></span> to
 <span class="removed"><del><strong>using just</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
-    hardware cannot collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
@@ -358,7 +359,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-cars.de.po       26 Oct 2018 06:58:57 -0000      1.12
+++ po/malware-cars.de.po       27 Oct 2018 08:28:52 -0000      1.13
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -106,7 +106,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: po/malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/malware-cars.fr.po       26 Oct 2018 11:45:30 -0000      1.18
+++ po/malware-cars.fr.po       27 Oct 2018 08:28:52 -0000      1.19
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-26 13:44+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -110,9 +111,17 @@
 "de ce type doit être interdit."
 
 #. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 "Mais si vous voulez être vraiment en sécurité, vous devez vous assurer que 
"
 "le matériel de la voiture ne peut collecter aucune de ces données."

Index: po/malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/malware-cars.pot 26 Oct 2018 06:58:57 -0000      1.8
+++ po/malware-cars.pot 27 Oct 2018 08:28:52 -0000      1.9
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -86,7 +86,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: po/malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-cars.ru.po       26 Oct 2018 08:58:11 -0000      1.23
+++ po/malware-cars.ru.po       27 Oct 2018 08:28:52 -0000      1.24
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-09-20 04:21-0500\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -112,9 +113,17 @@
 "<em>Любой</em> сбор таких данных должен быть 
запрещен."
 
 #. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 "Но если вы хотите настоящей безопасности, 
нужно гарантировать, что "
 "аппаратура автомобиля не может собирать 
ничего из этих данных."

Index: po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/malware-microsoft.de-diff.html   25 Oct 2018 10:31:08 -0000      1.17
+++ po/malware-microsoft.de-diff.html   27 Oct 2018 08:28:52 -0000      1.18
@@ -577,7 +577,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
-    &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a
+    &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and privacy&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -864,7 +864,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:52 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- po/malware-microsoft.de.po  25 Oct 2018 10:31:08 -0000      1.125
+++ po/malware-microsoft.de.po  27 Oct 2018 08:28:53 -0000      1.126
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -903,11 +903,21 @@
 "andere Unternehmen."
 
 #. type: Content of: <ul><li><p>
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
 msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "Um Installationsbasis von Windows 10 zu steigern: Microsoft <a href="
 "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";

Index: po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- po/malware-microsoft.es.po  25 Oct 2018 10:31:08 -0000      1.123
+++ po/malware-microsoft.es.po  27 Oct 2018 08:28:53 -0000      1.124
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -740,11 +740,21 @@
 "se los proporciona a otra compañía."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "A fin de incrementar las cifras de instalación de Windows 10, Microsoft <a "
 "href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";

Index: po/malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- po/malware-microsoft.fr.po  25 Oct 2018 10:58:25 -0000      1.140
+++ po/malware-microsoft.fr.po  27 Oct 2018 08:28:53 -0000      1.141
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-25 12:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -729,11 +730,21 @@
 "autre société."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "Afin d'élargir la base installée de Windows 10, Microsoft <a 
href=\"https://";
 "www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"

Index: po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/malware-microsoft.it-diff.html   25 Oct 2018 10:31:08 -0000      1.16
+++ po/malware-microsoft.it-diff.html   27 Oct 2018 08:28:53 -0000      1.17
@@ -569,7 +569,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
-    &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a
+    &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and privacy&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -857,7 +857,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/malware-microsoft.it.po  25 Oct 2018 10:31:08 -0000      1.130
+++ po/malware-microsoft.it.po  27 Oct 2018 08:28:53 -0000      1.131
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -855,11 +855,21 @@
 "sua volta le invia ad altre aziende."
 
 #. type: Content of: <ul><li><p>
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
 msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "Per aumentare il numero di installazioni di Windows 10, Microsoft <a href="
 "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";

Index: po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- po/malware-microsoft.ja-diff.html   25 Oct 2018 10:31:08 -0000      1.27
+++ po/malware-microsoft.ja-diff.html   27 Oct 2018 08:28:53 -0000      1.28
@@ -545,7 +545,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
-    &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a
+    &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and privacy&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -822,7 +822,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- po/malware-microsoft.ja.po  25 Oct 2018 10:31:08 -0000      1.105
+++ po/malware-microsoft.ja.po  27 Oct 2018 08:28:53 -0000      1.106
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -704,11 +704,17 @@
 "今、それを別の会社にも配ります。"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
 msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "ウィンドウズ10のインストールベースを増加
させるために、マイクロソフトは<a "
 "href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";

Index: po/malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/malware-microsoft.pot    25 Oct 2018 10:31:08 -0000      1.70
+++ po/malware-microsoft.pot    27 Oct 2018 08:28:53 -0000      1.71
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -497,6 +497,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "In order to increase Windows 10's install base, Microsoft <a "
+"class=\"not-a-duplicate\" "
 
"href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
 "
 "blatantly disregards user choice and privacy</a>."
 msgstr ""

Index: po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- po/malware-microsoft.ru.po  25 Oct 2018 17:00:14 -0000      1.183
+++ po/malware-microsoft.ru.po  27 Oct 2018 08:28:53 -0000      1.184
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-10 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -718,11 +719,21 @@
 "Microsoft передает их другой компании."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "В целях наращивания пользовательской 
базы Windows 10 Microsoft <a href="
 "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";

Index: po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-mobiles.de-diff.html     25 Oct 2018 10:31:08 -0000      1.13
+++ po/malware-mobiles.de-diff.html     27 Oct 2018 08:28:53 -0000      1.14
@@ -95,7 +95,7 @@
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
     often used to make a phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The back door &lt;a
+    &lt;p&gt;The back door &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
     The choice to leave the security holes in place is morally
@@ -1128,7 +1128,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:08 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-mobiles.de.po    25 Oct 2018 10:31:08 -0000      1.82
+++ po/malware-mobiles.de.po    27 Oct 2018 08:28:53 -0000      1.83
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -158,11 +158,23 @@
 "a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>.  The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/";
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
 msgstr ""
 "Die Hintertür <a href=\"https://www.osnews.com/story/27416/";
 "The_second_operating_system_hiding_in_every_mobile_phone\" title=\"The "

Index: po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- po/malware-mobiles.es.po    25 Oct 2018 10:31:08 -0000      1.77
+++ po/malware-mobiles.es.po    27 Oct 2018 08:28:53 -0000      1.78
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-07-27 11:25+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -144,11 +144,23 @@
 "el teléfono transmita todas las conversaciones que escucha</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>.  The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/";
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
 msgstr ""
 "La puerta trasera <a href=\"http://www.osnews.com/story/27416/";
 "The_second_operating_system_hiding_in_every_mobile_phone\"> puede producirse "

Index: po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- po/malware-mobiles.fr.po    25 Oct 2018 10:58:25 -0000      1.92
+++ po/malware-mobiles.fr.po    27 Oct 2018 08:28:53 -0000      1.93
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-25 12:57+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -139,11 +140,23 @@
 "transmettre toutes les conversations qu'il entend</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>.  The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/";
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
 msgstr ""
 "Cette porte dérobée <a href=\"http://www.osnews.com/story/27416/";
 "The_second_operating_system_hiding_in_every_mobile_phone\">peut prendre la "

Index: po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/malware-mobiles.it-diff.html     25 Oct 2018 10:31:09 -0000      1.18
+++ po/malware-mobiles.it-diff.html     27 Oct 2018 08:28:53 -0000      1.19
@@ -155,7 +155,7 @@
   considers malicious.  But there is no excuse for 
allowing</strong></del></span> <span class="inserted"><ins><em>phone transmit 
all conversations</em></ins></span> it
   <span class="removed"><del><strong>to 
&lt;em&gt;delete&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>hears&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The back door &lt;a
+    &lt;p&gt;The back door &lt;a class="not-a-duplicate"
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     may take</em></ins></span> the <span 
class="removed"><del><strong>programs, and you should</strong></del></span> 
<span class="inserted"><ins><em>form of bugs that</em></ins></span> have <span 
class="removed"><del><strong>the right</strong></del></span> <span 
class="inserted"><ins><em>gone 20 years unfixed&lt;/a&gt;.
     The choice</em></ins></span> to
@@ -1172,7 +1172,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- po/malware-mobiles.it.po    25 Oct 2018 10:31:09 -0000      1.82
+++ po/malware-mobiles.it.po    27 Oct 2018 08:28:53 -0000      1.83
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -127,8 +127,8 @@
 #. type: Content of: <ul><li><p>
 # | [-More about-]{+The back door+} <a
 # | 
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>the
-# | nature-]
-# | 
{+href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | nature-] {+class=\"not-a-duplicate\"
+# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
 # | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
 # | years unfixed</a>.  The choice to leave the security holes in place is
 # | morally equivalent to writing a back door.+}
@@ -138,10 +138,11 @@
 #| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
 #| "this problem</a>."
 msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>.  The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
 msgstr ""
 "Altre informazioni sulla <a href=\"http://www.osnews.com/story/27416/";
 "The_second_operating_system_hiding_in_every_mobile_phone\">natura di questo "

Index: po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/malware-mobiles.ja-diff.html     25 Oct 2018 10:31:09 -0000      1.33
+++ po/malware-mobiles.ja-diff.html     27 Oct 2018 08:28:53 -0000      1.34
@@ -134,7 +134,7 @@
   &lt;li&gt;&lt;p&gt;&lt;a 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
   Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> a <span 
class="inserted"><ins><em>phone transmit all conversations it 
hears&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> back <span 
class="removed"><del><strong>door&lt;/a&gt; that provides remote access 
to</strong></del></span> <span class="inserted"><ins><em>door &lt;a
+    &lt;p&gt;The</em></ins></span> back <span 
class="removed"><del><strong>door&lt;/a&gt; that provides remote access 
to</strong></del></span> <span class="inserted"><ins><em>door &lt;a 
class="not-a-duplicate"
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
     may take</em></ins></span> the <span class="removed"><del><strong>data 
stored on the
   device.&lt;/p&gt;
@@ -1017,7 +1017,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/malware-mobiles.ja.po    25 Oct 2018 10:31:09 -0000      1.70
+++ po/malware-mobiles.ja.po    27 Oct 2018 08:28:53 -0000      1.71
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -120,10 +120,11 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>.  The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/malware-mobiles.pot      25 Oct 2018 10:31:09 -0000      1.49
+++ po/malware-mobiles.pot      27 Oct 2018 08:28:53 -0000      1.50
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -101,7 +101,7 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The back door <a "
+"The back door <a class=\"not-a-duplicate\" "
 
"href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
 "
 "may take the form of bugs that have gone 20 years unfixed</a>.  The choice "
 "to leave the security holes in place is morally equivalent to writing a back "

Index: po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- po/malware-mobiles.ru.po    25 Oct 2018 17:00:14 -0000      1.121
+++ po/malware-mobiles.ru.po    27 Oct 2018 08:28:53 -0000      1.122
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-08 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -136,11 +137,23 @@
 "передавать все разговоры, которые он 
слышит</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"The back door <a href=\"http://www.osnews.com/story/27416/";
-"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
-"form of bugs that have gone 20 years unfixed</a>.  The choice to leave the "
-"security holes in place is morally equivalent to writing a back door."
+# | The back door <a {+class=\"not-a-duplicate\"+}
+# | 
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\";>
+# | may take the form of bugs that have gone 20 years unfixed</a>.  The choice
+# | to leave the security holes in place is morally equivalent to writing a
+# | back door.
+#, fuzzy
+#| msgid ""
+#| "The back door <a href=\"http://www.osnews.com/story/27416/";
+#| "The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
+#| "form of bugs that have gone 20 years unfixed</a>.  The choice to leave "
+#| "the security holes in place is morally equivalent to writing a back door."
+msgid ""
+"The back door <a class=\"not-a-duplicate\" href=\"http://www.osnews.com/";
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> may "
+"take the form of bugs that have gone 20 years unfixed</a>.  The choice to "
+"leave the security holes in place is morally equivalent to writing a back "
+"door."
 msgstr ""
 "Лазейка <a href=\"http://www.osnews.com/story/27416/";
 "The_second_operating_system_hiding_in_every_mobile_phone\">может 
принимать "

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/proprietary-surveillance.de-diff.html    27 Oct 2018 01:58:21 -0000      
1.12
+++ po/proprietary-surveillance.de-diff.html    27 Oct 2018 08:28:53 -0000      
1.13
@@ -274,7 +274,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
-    &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a
+    &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span> 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -324,7 +324,8 @@
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20150905163414/http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-    Intel devices will be able to listen</em></ins></span> for <span 
class="inserted"><ins><em>speech all the time, even
+    Intel devices will be able to listen</em></ins></span> for <span 
class="inserted"><ins><em>speech all</em></ins></span> the
+  <span class="removed"><del><strong>privacy of its users&lt;/a&gt;, giving 
Microsoft</strong></del></span> <span class="inserted"><ins><em>time, even
     when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
@@ -340,8 +341,7 @@
     &lt;p&gt;Windows 10 &lt;a
     
href="https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
     ships with default settings that show no regard for the privacy of
-    its users&lt;/a&gt;, giving Microsoft</em></ins></span> the
-  <span class="removed"><del><strong>privacy of its users&lt;/a&gt;, giving 
Microsoft the</strong></del></span> &ldquo;right&rdquo; to snoop on
+    its users&lt;/a&gt;, giving Microsoft</em></ins></span> the 
&ldquo;right&rdquo; to snoop on
     the users' files, text input, voice input, location info, contacts,
     calendar records and web browsing history, as well as automatically
     connecting the machines to open hotspots and showing targeted <span 
class="removed"><del><strong>ads.&lt;/p&gt;&lt;/li&gt;
@@ -522,12 +522,24 @@
     Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Google</strong></del></span> <span 
class="inserted"><ins><em>spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
-    sabotage method Lenovo used</em></ins></span> did not <span 
class="removed"><del><strong>intend</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
+  &lt;p&gt;Google did not intend to make these apps spy;</strong></del></span> 
<span class="inserted"><ins><em>spyware via
+    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>Windows installs.  Note that</em></ins></span> the 
<span class="removed"><del><strong>contrary, it
+    worked in various ways to prevent that, and deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for the snooping of these apps.&lt;/p&gt;
+
+  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares</strong></del></span> <span 
class="inserted"><ins><em>specific
+    sabotage method Lenovo used did not affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
-    own malware&lt;/a&gt;.&lt;/p&gt;
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility 
for the injustice of their
+    being nonfree. It also distributes</strong></del></span> its
+    own <span class="removed"><del><strong>nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+      are malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -546,63 +558,59 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is &lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software</em></ins></span> to make <span 
class="removed"><del><strong>these apps spy; on</strong></del></span> <span 
class="inserted"><ins><em>sure they can't &ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>contrary, it
-    worked in various ways</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
+    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>no systematic way for Google, or Android
+    users, to inspect executable</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
+    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span> to <span 
class="removed"><del><strong>see what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> they
+    <span class="removed"><del><strong>do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>can't &ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>source code for these 
apps,</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>prevent that,</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
+    &lt;p&gt;According to Edward Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
-    after discovering what they did. So we cannot blame Google
-    specifically for</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the <span 
class="removed"><del><strong>snooping of these apps.&lt;/p&gt;
-
-  &lt;p&gt;On</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
-    text messages, read call, location</em></ins></span> and
-    <span class="removed"><del><strong>therefore shares 
in</strong></del></span> <span class="inserted"><ins><em>web browsing history, 
and
-    read</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is designed to disguise 
itself
+    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>study</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the
+    <span class="removed"><del><strong>source code 
somehow</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from the GPS, take photographs, read
+    text messages, read call, location and web browsing history, and
+    read the contact list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>determine whether they mistreat 
users</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap data in smart phones, including iPhones,
+    The NSA can tap data</em></ins></span> in
+    <span class="removed"><del><strong>various ways. If it did a good job of 
this,</strong></del></span> <span class="inserted"><ins><em>smart phones, 
including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here, it seems that this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>injustice of their
-    being nonfree.</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
-    phones have.</em></ins></span> It <span class="removed"><del><strong>also 
distributes its own nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    detail here,</em></ins></span> it <span class="removed"><del><strong>could 
more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart</strong></del></span> <span 
class="inserted"><ins><em>seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious 
apps,</strong></del></span> <span class="inserted"><ins><em>universal back door 
that</em></ins></span> we <span class="removed"><del><strong>cannot trust
+    Google to protect us. We must demand release</strong></del></span> <span 
class="inserted"><ins><em>know nearly all portable
+    phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>preventing 
apps from
-    cheating?  There is no systematic way for Google, or Android
-    users, to inspect executable proprietary apps to see what they
-    do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>source code for these apps,</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of <span class="removed"><del><strong>source code 
to</strong></del></span> <span class="inserted"><ins><em>bugs 
in</em></ins></span> the
+    <span class="removed"><del><strong>public, so we can 
depend</strong></del></span> <span class="inserted"><ins><em>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>study the
-    source code somehow to determine whether they 
mistreat</strong></del></span> users <span class="removed"><del><strong>in
-    various ways. If it did a good job of this,</strong></del></span> <span 
class="inserted"><ins><em>cannot stop
-    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>could more or less
-    prevent such snooping, except when</strong></del></span> <span 
class="inserted"><ins><em>will eventually require all new portable phones
-    to have GPS.)&lt;/p&gt;
+    will send their GPS location</em></ins></span> on <span 
class="removed"><del><strong>each other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>remote command, and users cannot stop
+    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
+    to have GPS.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -612,48 +620,40 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>app developers are clever
-    enough</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
-    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
-
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;
+    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    &lt;p&gt;In</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>security
+    of 283 Android VPN apps concluded that &ldquo;in spite 
of</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the
+    <span class="removed"><del><strong>promises</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of users may</strong></del></span> 
<span class="inserted"><ins><em>you&mdash;&ldquo;We
+    know you want to</em></ins></span> be <span 
class="removed"><del><strong>unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>protect us. We must demand release 
of source code</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
-    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the
-    <span class="removed"><del><strong>public, so we can 
depend</strong></del></span> <span class="inserted"><ins><em>phone is 
snooping</em></ins></span> on <span class="removed"><del><strong>each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated the privacy and security
-    of 283 Android VPN apps concluded that &ldquo;in spite of the
-    promises for privacy, security, and anonymity given by the
-    majority of VPN apps&mdash;millions of users may be unawarely subject
-    to poor security guarantees and abusive practices inflicted by
+    to <span class="removed"><del><strong>poor security guarantees and abusive 
practices inflicted by
     VPN apps.&rdquo;&lt;/p&gt;
 
   &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
-    the research paper that tracks and infringes the 
privacy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    the research paper that tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>use it without having your fingerprints taken. Users 
would have
+    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones &lt;a
+    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
     lots</em></ins></span> of
     <span class="removed"><del><strong>users:&lt;/p&gt;
 
@@ -686,14 +686,14 @@
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> to <span 
class="inserted"><ins><em>date on all your devices. Any edits you
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> to <span 
class="removed"><del><strong>the
+      users.</strong></del></span> <span class="inserted"><ins><em>date on all 
your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span>
-    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>the JS injection</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.)</em></ins></span> The 
<span class="removed"><del><strong>stated purpose of</strong></del></span> 
<span class="inserted"><ins><em>iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>JS 
injection</strong></del></span>
+    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There</em></ins></span> is <span class="inserted"><ins><em>a 
way</em></ins></span> to <span class="removed"><del><strong>display
@@ -709,109 +709,102 @@
     surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
this <span class="removed"><del><strong>app have
-      confirmed that the non-premium version of the app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>to &lt;a
+      confirmed that the non-premium version</strong></del></span> <span 
class="inserted"><ins><em>to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span class="removed"><del><strong>the 
top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as 
&ldquo;free&rdquo;,</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span 
class="removed"><del><strong>are not in fact</strong></del></span> <span 
class="inserted"><ins><em>through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    nude photos</em></ins></span> of <span class="removed"><del><strong>the 
app does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
+    security to get at them, but NSA can access any of them through &lt;a
+    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
+  &lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>regularly 
does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>the state&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
+    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-    iOS 8 security improvements&lt;/a&gt;; but</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    &lt;p&gt;This may have improved with &lt;a
+    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but &lt;a
+    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
     not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude to transmit users' 
personal
-       data</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found that 90%</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="inserted"><ins><em>iOS seem to exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
-    &lt;p&gt;The</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
+  &lt;li id="M201401100"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing, 
or it</em></ins></span>
-    is <span class="removed"><del><strong>not enough
-to legitimize actions like this.  At this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
+  for that word</strong></del></span> <span class="inserted"><ins><em>NSA 
snoop on all the data in an iThing, or it</em></ins></span>
+    is <span class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that will fit
+  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>totally 
incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also &lt;a
-    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on</strong></del></span> 
<span class="inserted"><ins><em>can be
-    turned off.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps for BART</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
+    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one</strong></del></span> can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
+    turned off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
-of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
-    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
-    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites to</em></ins></span> track 
<span class="removed"><del><strong>users by</strong></del></span> <span 
class="inserted"><ins><em>users, which is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or 
played</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled</em></ins></span> by <span class="removed"><del><strong>TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default&lt;/a&gt;.  (That article talks about iOS 6, 
but it is
+    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
+       data</strong></del></span>
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make an Apple ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>receiving 
the verification code Apple sends
-    to it.&lt;/p&gt;
+    to <span class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that</strong></del></span> install <span 
class="inserted"><ins><em>even gratis apps&lt;/a&gt;) without giving a valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>verification code 
Apple sends</em></ins></span>
+    to <span class="removed"><del><strong>legitimize actions like this.  At 
this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
+what they are &ldquo;consenting&rdquo; to.</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -823,17 +816,21 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
+    &lt;p&gt;Android tracks location for</em></ins></span> Google <span 
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
     even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phone 
has no SIM card&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sold with spyware sending lots</em></ins></span> of <span 
class="removed"><del><strong>hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -882,93 +879,79 @@
     Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
     the <span class="removed"><del><strong>usual analytics tools are
-  legitimate, but</strong></del></span> <span class="inserted"><ins><em>FBI 
can remotely activate the GPS and microphone in Android phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is <span 
class="inserted"><ins><em>present in some Android devices when they are
-    sold.  Some Motorola phones, made when this company was owned
-    by Google, use a modified version of Android</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone &lt;a
-    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app</em></ins></span> developers 
<span class="removed"><del><strong>have no right</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to
-  <span class="removed"><del><strong>analyze what</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most</em></ins></span> users <span class="removed"><del><strong>are 
doing or how.  &ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>have stopped
-    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>spell out what
-    they</em></ins></span> are
-  <span class="removed"><del><strong>just as wrong as any other 
snooping.&lt;/p&gt;
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
       connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span>
-    <span class="inserted"><ins><em>honestly identify</em></ins></span> the 
<span class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
-    hiding it</em></ins></span> in <span class="removed"><del><strong>some 
Android devices when they are sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However,</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send</strong></del></span> <span class="inserted"><ins><em>truly protect 
people's privacy, we must prevent Google
-    and other companies from getting this</em></ins></span> personal <span 
class="removed"><del><strong>data to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>information in the
-    first place!&lt;/p&gt;</em></ins></span>
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
+    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt;.  (I suspect this means Windows 
laptops.)  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
+    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
+    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      <span class="removed"><del><strong>send</strong></del></span>
+    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
-    &lt;p&gt;Some</em></ins></span> manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier <span 
class="removed"><del><strong>IQ.&lt;/a&gt;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- #SpywareOnMobiles --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
-  &lt;span <span 
class="removed"><del><strong>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  
At</em></ins></span> this
+      <span class="removed"><del><strong>would require circumventing the iOS 
DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
-      obvious way &lt;a
+  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>point, most users have stopped
+    reading</em></ins></span> the <span class="removed"><del><strong>latest 
iThings system, &ldquo;turning off&rdquo; WiFi</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo; that spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify</em></ins></span> the
+      <span class="removed"><del><strong>obvious way &lt;a
  
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
@@ -977,8 +960,26 @@
   
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span> <span 
class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+      &mdash; which would mean no way to use</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information 
in</em></ins></span> the <span class="removed"><del><strong>phone is 
snooping</strong></del></span>
+    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201111170"&gt;
+    &lt;p&gt;Some manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -1002,25 +1003,15 @@
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201212031"&gt;
-    &lt;p&gt;The Electronic Frontier Foundation has examined and 
found</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that the user types into 
it&lt;/a&gt;;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
-    kinds of surveillance in</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Swindle and other 
e-readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
-
   <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install</strong></del></span>
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report</em></ins></span> even <span class="removed"><del><strong>gratis 
apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>which page</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even which page</em></ins></span> the user <span 
class="removed"><del><strong>types into it&lt;/a&gt;; the server records these 
numbers for</strong></del></span> <span 
class="inserted"><ins><em>reads</em></ins></span> at <span 
class="removed"><del><strong>least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 47% of the most 
popular iOS</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1038,14 +1029,20 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="inserted"><ins><em>on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and</strong></del></span>
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's</em></ins></span> location <span 
class="removed"><del><strong>information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>even when users disable &ldquo;location
+    record</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>user's 
location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>other kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
     tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>will 
be tricked by the misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1996,8 +1993,8 @@
     &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
       <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are</em></ins></span> watching&lt;/a&gt;, <span 
class="removed"><del><strong>even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
+    what people are</em></ins></span> watching&lt;/a&gt;, even <span 
class="removed"><del><strong>when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is 
using</strong></del></span> <span 
class="inserted"><ins><em>if</em></ins></span> it <span 
class="removed"><del><strong>to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2009,7 +2006,7 @@
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and</strong></del></span> <span class="inserted"><ins><em>even if it isn't 
a TV channel.&lt;/p&gt;
+    and</strong></del></span> <span class="inserted"><ins><em>isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
@@ -2073,12 +2070,12 @@
     other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
-    the time;</strong></del></span> <span class="inserted"><ins><em>be trusted 
unless</em></ins></span> it is <span class="removed"><del><strong>possible to 
physically remove</strong></del></span> <span class="inserted"><ins><em>done by 
free
+    the time;</strong></del></span> <span class="inserted"><ins><em>be trusted 
unless</em></ins></span> it is <span 
class="removed"><del><strong>possible</strong></del></span> <span 
class="inserted"><ins><em>done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span> <span class="inserted"><ins><em>third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2130,7 +2127,7 @@
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state orders</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
@@ -2141,7 +2138,7 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
     and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the 
<span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people who 
are watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2215,11 +2212,11 @@
     &ldquo;smart&rdquo;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts
     and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable</strong></del></span>
+    computer,</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not 
hidden</strong></del></span> <span class="inserted"><ins><em>product as shipped 
doesn't act</em></ins></span> as <span class="inserted"><ins><em>a
-    listening device, remote changes to the code could surely 
convert</em></ins></span> it
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The existence 
of</strong></del></span> <span class="inserted"><ins><em>product as shipped 
doesn't act as</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to
+    <span class="removed"><del><strong>disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>code could surely 
convert</em></ins></span> it
     <span class="inserted"><ins><em>into one.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2263,36 +2260,37 @@
     &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
       across devices.&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+      &lt;p&gt;It is possible to turn this off,</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker, the data broker would have been able</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>figure out who the
-    user was.&lt;/p&gt;
-
-    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>off, but having it enabled by default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>microphones 
&lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
+    true,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> it <span 
class="removed"><del><strong>enabled by default
+      is an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>doesn't really 
matter. If it had sold the data to a data
+    broker, the data broker would have been able</em></ins></span> to <span 
class="inserted"><ins><em>figure out who</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the company <span class="removed"><del><strong>already
       monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>has been ordered to pay a total of 
C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>microphones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
       advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way</em></ins></span> to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>access the 
data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
     manufacturer's snooping.&lt;/p&gt;
 
@@ -2397,10 +2395,9 @@
       snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
     on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, but any product
-      could spy this way.&lt;/p&gt;
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped,</em></ins></span> it 
<span class="removed"><del><strong>had installed a patch to stop this, but any 
product</strong></del></span> could <span class="removed"><del><strong>spy this 
way.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>is air-gapped, it could be saving up records
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2439,7 +2436,7 @@
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="inserted"><ins><em>find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2451,7 +2448,7 @@
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects</em></ins></span> to <span class="inserted"><ins><em>an 
unidentified site in</em></ins></span> China&lt;/a&gt;.&lt;/p&gt;
+    that connects to an unidentified site in</em></ins></span> 
China&lt;/a&gt;.&lt;/p&gt;
 
     <span class="inserted"><ins><em>&lt;p&gt;The article says this is a back 
door, but that could be a
     misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
@@ -2482,20 +2479,21 @@
     &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
       spies for companies, and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage to spy through</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    tracked</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>choices of 
radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>could have got that easily by
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
     sneaking it into the contract that users sign for some digital service
     or other. A requirement for consent is effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>spy 
through</strong></del></span> <span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the software
+    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711230"&gt;
@@ -2988,7 +2986,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/27 01:58:21 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.238
retrieving revision 1.239
diff -u -b -r1.238 -r1.239
--- po/proprietary-surveillance.de.po   26 Oct 2018 06:58:57 -0000      1.238
+++ po/proprietary-surveillance.de.po   27 Oct 2018 08:28:53 -0000      1.239
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -549,11 +549,21 @@
 "vermarktet diese nun an andere Unternehmen."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "Um Windows 10’ Installationsbasis zu steigern: Microsoft <a href=\"https://";
 "www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
@@ -1726,13 +1736,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://";
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Spyware in many e-readers&mdash;not only the Kindle: <a href=\"https://www.";
 "eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
 "user reads at what time</a>."
@@ -3763,7 +3766,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.331
retrieving revision 1.332
diff -u -b -r1.331 -r1.332
--- po/proprietary-surveillance.fr.po   26 Oct 2018 11:45:30 -0000      1.331
+++ po/proprietary-surveillance.fr.po   27 Oct 2018 08:28:53 -0000      1.332
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-26 13:44+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -418,11 +419,21 @@
 "société."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "Afin d'élargir la base installée de Windows 10, Microsoft <a 
href=\"https://";
 "www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
@@ -1312,16 +1323,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://";
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-"L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a href="
-"\"https://www.eff.org/pages/reader-privacy-chart-2012\";>différents "
-"mécanismes de surveillance dans le Swindle et autres liseuses</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Spyware in many e-readers&mdash;not only the Kindle: <a href=\"https://www.";
 "eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
 "user reads at what time</a>."
@@ -3085,9 +3086,17 @@
 "de ce type doit être interdit."
 
 #. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 "Mais si vous voulez être vraiment en sécurité, vous devez vous assurer que 
"
 "le matériel de la voiture ne peut collecter aucune de ces données."
@@ -3635,3 +3644,12 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Electronic Frontier Foundation has examined and found <a href="
+#~ "\"https://www.eff.org/pages/reader-privacy-chart-2012\";>various kinds of "
+#~ "surveillance in the Swindle and other e-readers</a>."
+#~ msgstr ""
+#~ "L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a href="
+#~ "\"https://www.eff.org/pages/reader-privacy-chart-2012\";>différents "
+#~ "mécanismes de surveillance dans le Swindle et autres liseuses</a>."

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- po/proprietary-surveillance.it-diff.html    26 Oct 2018 06:58:57 -0000      
1.79
+++ po/proprietary-surveillance.it-diff.html    27 Oct 2018 08:28:53 -0000      
1.80
@@ -273,7 +273,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
-    &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a
+    &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span> 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -476,7 +476,12 @@
     that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+      Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;There's a lot more</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410200"&gt;
     &lt;p&gt;Various operations in &lt;a
@@ -485,14 +490,14 @@
   &lt;/li&gt;
 
   &lt;li id="M201401101"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+    &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;p&gt;There's a lot more &lt;a href="#SpywareIniThings"&gt;iThing 
spyware&lt;/a&gt;, and
+&lt;p&gt;There's a lot more</em></ins></span> &lt;a 
href="#SpywareIniThings"&gt;iThing spyware&lt;/a&gt;, and
 &lt;a href="/proprietary/malware-apple.html"&gt;Apple 
malware&lt;/a&gt;.&lt;/p&gt;
 
 
@@ -566,21 +571,21 @@
 
 &lt;li&gt;
   &lt;p&gt;Pairs of Android apps</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>collude</strong></del></span> <span 
class="inserted"><ins><em>take over
+    href="http://www.bbc.com/news/uk-34444233"&gt;agencies</em></ins></span> 
can <span class="removed"><del><strong>collude to transmit users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>turn the 
phones on and off, listen</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+    them</em></ins></span> to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
        tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>phones on and 
off, listen to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
     text messages, read call, location and web browsing history, and
-    read</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>contact list. This 
malware</em></ins></span> is <span class="removed"><del><strong>not 
enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
+    read the contact list. This malware</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  
At</strong></del></span> <span class="inserted"><ins><em>disguise itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -594,38 +599,22 @@
     the <span class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>universal back door</em></ins></span> that <span 
class="removed"><del><strong>spell out
 what they</strong></del></span> <span class="inserted"><ins><em>we know nearly 
all portable
     phones have. It may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&lt;a
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>hiding it in 
an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal 
information</strong></del></span> <span 
class="inserted"><ins><em>bugs</em></ins></span> in the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phones' 
radio software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    lots of bugs in</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+  &lt;li id="M201307000"&gt;
+    &lt;p&gt;Portable phones with GPS &lt;a
+    
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    will send their GPS location</em></ins></span> on <span 
class="removed"><del><strong>users, instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>remote 
command, and users cannot stop
+    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>in an obscurely worded EULA.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201307000"&gt;
-    &lt;p&gt;Portable phones with GPS</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send</em></ins></span> their <span 
class="removed"><del><strong>permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and</strong></del></span> <span 
class="inserted"><ins><em>GPS</em></ins></span> location <span 
class="removed"><del><strong>tracking, you must
-    disable Google Play itself to completely</strong></del></span> <span 
class="inserted"><ins><em>on remote command, and users cannot</em></ins></span> 
stop <span class="removed"><del><strong>the tracking.  This is
-    yet another example of nonfree software pretending</strong></del></span>
-    <span class="inserted"><ins><em>them&lt;/a&gt;. (The US says it will 
eventually require all new portable phones</em></ins></span>
-    to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;</em></ins></span>
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>will 
eventually require all new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span class="inserted"><ins><em>have 
GPS.)&lt;/p&gt;
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps
-  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -635,33 +624,55 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting</strong></del></span> 
<span class="inserted"><ins><em>the EU Copyright Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because</em></ins></span>
+    this <span class="removed"><del><strong>personal information 
in</strong></del></span> <span class="inserted"><ins><em>would require 
circumventing</em></ins></span> the <span class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In</em></ins></span> the <span 
class="removed"><del><strong>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
+    yet another example of nonfree software pretending to obey the user,
+    when it's actually doing something else.  Such a thing would be almost
+    unthinkable with free software.&lt;/p&gt;
+
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> the <span class="removed"><del><strong>app's 
functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  &lt;li&gt;&lt;p&gt;More than 73% of the most popular Android apps
+  &lt;a href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
+  was</strong></del></span> <span class="inserted"><ins><em>obvious 
way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
   found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
   &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="removed"><del><strong>say
+  &ldquo;free&rdquo;&mdash;they are not free software.  The 
clear</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+    doesn't really turn them off&lt;/a&gt;.  A more advanced</em></ins></span> 
way <span class="removed"><del><strong>to say
   &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes for granted that</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>really does turn
+    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>granted that the usual analytics tools are
   legitimate, but is that valid?  Software developers have no right to
   analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iOS DRM.&lt;/p&gt;</em></ins></span>
+  just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
       connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
       Some Motorola phones modify Android to
@@ -669,15 +680,13 @@
       send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span> <span 
class="inserted"><ins><em>obvious way</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a
+      &lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-    doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span> 
<span class="inserted"><ins><em>you&mdash;&ldquo;We
     know you want</em></ins></span> to <span class="removed"><del><strong>any 
file on the system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
@@ -726,10 +735,7 @@
         days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
       without giving a valid email address and receiving the code Apple
       sends to it.&lt;/p&gt;
   &lt;/li&gt;
@@ -740,7 +746,10 @@
        behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> <span class="inserted"><ins><em>Apple's servers 
all</em></ins></span> the photos
+  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
+    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -1027,23 +1036,17 @@
     needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201212031"&gt;
-    &lt;p&gt;The Electronic Frontier Foundation has examined and found &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
-    kinds of surveillance</em></ins></span> in the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>Swindle</em></ins></span> and <span 
class="inserted"><ins><em>other e-readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, it can
   alter them too&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
         for surveillance is inadequate as a protection against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
@@ -1118,31 +1121,30 @@
 
   &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
       is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware (DRM and snooping). In 
August
+    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
       2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that</strong></del></span> <span 
class="inserted"><ins><em>apps whose
-    source code</em></ins></span> they <span 
class="removed"><del><strong>present</strong></del></span> <span 
class="inserted"><ins><em>cannot look at.  The other apps might 
be</em></ins></span> snooping <span class="removed"><del><strong>as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span>
-    <span class="inserted"><ins><em>in other ways.&lt;/p&gt;
-
-    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>a 
typical example of
-      the attitude</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid</em></ins></span> of the proprietary <span 
class="removed"><del><strong>software industry towards
+      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways that they present snooping as a way</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is a typical example of
+      the attitude of</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    and</em></ins></span> the proprietary <span 
class="removed"><del><strong>software industry towards
       those they have subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the</em></ins></span> proprietary apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>by 
getting</em></ins></span> apps <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>user has
+  &lt;li&gt;&lt;p&gt;Many proprietary</strong></del></span> apps <span 
class="removed"><del><strong>for mobile devices report which 
other</strong></del></span> <span class="inserted"><ins><em>by 
getting</em></ins></span> apps <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>user has
     installed.</strong></del></span> <span class="inserted"><ins><em>free 
software
     only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
     is doing this in a way</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>at 
least is visible and
@@ -1173,17 +1175,60 @@
     other but not to the server's database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>moviepass</em></ins></span> app <span 
class="removed"><del><strong>because it asked the user to
-      approve sending personal data to the app developer but did not
-      ask about sending it to other companies.  This shows the
-      weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass</em></ins></span> app
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store</em></ins></span> by 
<span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708270"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Sarahah</em></ins></span> app <span 
class="removed"><del><strong>because it asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>zero price.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>the app developer but</strong></del></span> 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google</em></ins></span> did not
+      <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary,</em></ins></span> it
+    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>prevent that, and 
deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+
+    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
+    to <span class="removed"><del><strong>anyone?  A free software flashlight
       app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1195,19 +1240,23 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span> <span 
class="inserted"><ins><em>inspect executable</em></ins></span> proprietary 
<span class="removed"><del><strong>GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about 
them</strong></del></span> <span 
class="inserted"><ins><em>apps</em></ins></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span> and <span 
class="removed"><del><strong>the NSA takes advantage to</strong></del></span> 
<span class="inserted"><ins><em>dis-service</em></ins></span>
-    spy <span class="removed"><del><strong>through it too&lt;/a&gt;.
-      Here's information</strong></del></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>users even</em></ins></span> more <span 
class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
+      spies</strong></del></span> <span class="inserted"><ins><em>see what 
they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code</em></ins></span> for <span 
class="removed"><del><strong>companies,</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="inserted"><ins><em>study</em></ins></span>
+    the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>source code 
somehow</em></ins></span> to <span class="removed"><del><strong>spy 
through</strong></del></span> <span class="inserted"><ins><em>determine whether 
they mistreat users in
+    various ways. If</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>did a good job of this, it 
could</em></ins></span> more <span class="removed"><del><strong>spyware 
apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      More about NSA</strong></del></span> <span class="inserted"><ins><em>or 
less
+    prevent such snooping, except when the</em></ins></span> app <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1219,173 +1268,126 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>than users 
expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> a <span 
class="removed"><del><strong>speech recognition company 
based</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>developers 
are clever
+    enough</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>popular Android 
apps
-    is pervasive and sometimes very clever. Some trackers</em></ins></span> 
can <span class="removed"><del><strong>remotely control the toys 
with</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>mobile 
phone. This would
-      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>user's movements around</em></ins></span> a <span 
class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
-  &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>words
-    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;A computerized vibrator</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
        was snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>its users through</strong></del></span> 
the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</em></ins></span>
+    on <span class="removed"><del><strong>its users through the proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>contrary, it
-    worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
-
-    &lt;p&gt;On</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
       minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes nonfree Android 
apps, and
-    therefore shares in</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+      body), as well as the vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>responsibility for</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>injustice 
of</em></ins></span> their <span class="removed"><del><strong>products, rather 
than free software which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-      true, but it doesn't really matter. If it had sold the 
data</strong></del></span> <span class="inserted"><ins><em>preventing apps from
-    cheating? There is no systematic way for Google, or Android 
users,</em></ins></span>
-    to <span class="removed"><del><strong>a
-      data broker, the data broker would have been able</strong></del></span> 
<span class="inserted"><ins><em>inspect executable proprietary 
apps</em></ins></span> to <span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>see what they 
do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>source code for these apps, and 
study</em></ins></span>
-    the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span class="inserted"><ins><em>source code 
somehow</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
-    various ways. If it did</em></ins></span> a <span 
class="removed"><del><strong>total</strong></del></span> <span 
class="inserted"><ins><em>good job</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span> <span 
class="inserted"><ins><em>this, it could more or less
-    prevent such snooping, except when</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span class="inserted"><ins><em>app 
developers are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>access the 
data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
-
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span class="removed"><del><strong>these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>protect us. We 
must demand release of source code</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>the
-    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>children and 
adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>each other.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span>
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
-    on users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;With</em></ins></span> free software <span 
class="removed"><del><strong>which</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> users could <span 
class="removed"><del><strong>have
+      checked and changed.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;make sure&lt;/em&gt;</em></ins></span> that 
<span class="removed"><del><strong>made the vibrator</strong></del></span> 
<span class="inserted"><ins><em>they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Faceapp appears to do</em></ins></span> lots of <span 
class="removed"><del><strong>personal information about</strong></del></span> 
<span class="inserted"><ins><em>surveillance, judging by &lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;</em></ins></span>
+    how
+       <span class="removed"><del><strong>people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that</strong></del></span> <span 
class="inserted"><ins><em>much access</em></ins></span> it <span 
class="removed"><del><strong>was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>demands to personal</em></ins></span> data <span 
class="removed"><del><strong>may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>data to</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
+    distributing</em></ins></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>data broker</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>record the names of the audio files users 
listen</em></ins></span> to <span class="removed"><del><strong>figure out
+      who</strong></del></span>
+    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    &lt;p&gt;The suit accuses that</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
-    would that</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
+    the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
-    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude</em></ins></span>
+    to <span class="removed"><del><strong>its customers.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data</em></ins></span> to 
<span class="removed"><del><strong>the
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study</em></ins></span> found <span class="removed"><del><strong>a way to 
access the data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>tens 
of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
     announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
+    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>same 
information
+    about</em></ins></span> the <span 
class="removed"><del><strong>manufacturer and</strong></del></span> <span 
class="inserted"><ins><em>users' searches that Google normally gets when they 
use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201701210"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1545,12 +1547,9 @@
 
   &lt;li id="M201505060"&gt;
     &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) 
connect</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>100 &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs,</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the average.&lt;/p&gt;
+    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
@@ -1569,7 +1568,7 @@
     &lt;p&gt;Many proprietary apps for mobile devices
     report which other apps the user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that</em></ins></span> at <span 
class="removed"><del><strong>Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>least is visible and optional&lt;/a&gt;. Not
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1609,12 +1608,11 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: 
left;"&gt;&lt;/div&gt;</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
     &lt;p&gt;Skype contains &lt;a
     
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
@@ -1622,33 +1620,28 @@
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInGames"&gt;Games&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInGames"&gt;Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers</em></ins></span> and <span 
class="inserted"><ins><em>sends it to third parties&lt;/a&gt;.&lt;/p&gt;
+    is found in many proprietary games. It &lt;a
+    
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
+    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a</em></ins></span> spyware 
<span class="removed"><del><strong>via BIOS&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>program along with an update to the massive
+    &lt;p&gt;ArenaNet surreptitiously installed a spyware
+    program along with an update to the massive
     multiplayer game Guild War 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>all open processes 
running on its user's computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
@@ -1673,14 +1666,12 @@
     collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks</em></ins></span> 
that <span class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>lot of 
money. They also
+    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
@@ -1702,15 +1693,9 @@
 
   &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's computer and 
sniffs a
+    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies on every process running on a gamer's computer and sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
@@ -1719,87 +1704,42 @@
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span>
-
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
-&lt;/div&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;/ul&gt;</em></ins></span>
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>me and
-said, &ldquo;Didn't I see you</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs.&lt;/p&gt;
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>presents. 
It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
     moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
@@ -1807,117 +1747,77 @@
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>device means</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>coming from the user's own computer,
-    the TV reports what</em></ins></span> it <span 
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span 
class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disable the
+    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
+    the TV reports what it is. The existence of a way to disable the
     surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
+    does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
+  &lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on other devices</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
+    on other devices in range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>contain Javascript code,</strong></del></span> 
<span class="inserted"><ins><em>correlate ads with Web 
activity,</em></ins></span> and <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    your TV, advertisers can correlate ads with Web activity, and other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>spying on their users: their</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    manufacturers in spying on their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is possible to turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>nonfree software</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households
+  &lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
     to the 600 millions social media profiles the company
-    already monitors. Tivo customers</em></ins></span> are <span 
class="inserted"><ins><em>unaware they're
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has</strong></del></span> <span 
class="inserted"><ins><em>id="M201507240"&gt;
+  &lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span class="inserted"><ins><em>TV 
channel.&lt;/p&gt;
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
-    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to the US or some
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
-    access.  The</strong></del></span> <span class="inserted"><ins><em>trusted 
unless it is done by free</em></ins></span>
-    software in <span class="removed"><del><strong>the 
car</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
@@ -1926,264 +1826,327 @@
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is
-    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their</em></ins></span> users&lt;/a&gt;.&lt;/p&gt;
+    on their users&lt;/a&gt;.&lt;/p&gt;
 
-    <span class="removed"><del><strong>&lt;p&gt;Even if no one 
connects</strong></del></span>
-
-    <span class="inserted"><ins><em>&lt;p&gt;The report was as of 2014, but we 
don't expect this has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="inserted"><ins><em>get users' formal
+    &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car remotely, the cell phone
-    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    And what happens if a user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>physically remove</strong></del></span> 
<span class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software</strong></del></span> <span 
class="inserted"><ins><em>id="M201405200"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span> <span 
class="inserted"><ins><em>LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available to car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but the invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span class="inserted"><ins><em>user 
watches,</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store</strong></del></span> <span class="inserted"><ins><em>switch to 
turn</em></ins></span> this <span class="removed"><del><strong>information, but 
if</strong></del></span> <span class="inserted"><ins><em>off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data
-      <span class="removed"><del><strong>and hand</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>over,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>the switch to turn 
this off has
+    no effect&lt;/a&gt;.  (The fact</em></ins></span> that the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span class="inserted"><ins><em>404 
error</em></ins></span>
+    really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>means nothing; the server could save that data 
anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtHome --&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
 &lt;!-- WEBMASTERS: make sure</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>a 
&ldquo;smart&rdquo; TV&lt;/a&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
     and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands</em></ins></span> of <span 
class="removed"><del><strong>data about the 
user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>network-connected surveillance cameras have &lt;a
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;
+  &lt;li id="M201511250"&gt;</em></ins></span>
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
it</em></ins></span>
-    to <span class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act 
as</em></ins></span> a <span class="removed"><del><strong>woman came 
up</strong></del></span>
-    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>code could surely 
convert it
-    into one.&lt;/p&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was
-<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>found to make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through</em></ins></span> the <span 
class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span 
class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span 
class="inserted"><ins><em>temperature</em></ins></span> of <span 
class="removed"><del><strong>a way to
-    disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span> <span class="inserted"><ins><em>vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it was <span 
class="removed"><del><strong>in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>surrounded by a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements 
about</em></ins></span> their <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>products, rather than free software which 
users could have checked
-    and changed.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span class="removed"><del><strong>report was as of 2014, but 
we don't expect this has got better.&lt;/p&gt;
+    standard with which manufacturers would make statements about their
+    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
+    and changed.&lt;/p&gt;
 
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="inserted"><ins><em>information about how people
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing 
the</em></ins></span> data <span class="removed"><del><strong>are totally 
inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>may be
-    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
-    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing</em></ins></span> 
the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span class="inserted"><ins><em>data may be
+    true, but</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that advertisers can track you 
-      across devices.&lt;/p&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
  
-      &lt;p&gt;It is possible</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it enabled by default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt; to its
-    customers.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's 
alliance</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>microphones 
&lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way</em></ins></span> to
-      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>access the 
data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>the
-    manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>the FBI could 
listen</em></ins></span> to <span class="removed"><del><strong>be
-      picked up</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware running on other devices in
-      range so as to determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span 
class="inserted"><ins><em>i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;,</em></ins></span> a 
<span class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>speech recognition
-    company based in the U.S.&lt;/p&gt;
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
+    company <span class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
     can remotely control the toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;</em></ins></span>
+    crackers</em></ins></span> to <span class="removed"><del><strong>get the 
data</strong></del></span> <span class="inserted"><ins><em>listen in on a 
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>even speak 
into</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching</strong></del></span>
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going to spy on children</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>the internet</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that</strong></del></span> <span 
class="inserted"><ins><em>people, DJI</em></ins></span> is <span 
class="removed"><del><strong>viewed</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence 
of</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2194,69 +2157,82 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>would then have to
-      give</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the US <span class="removed"><del><strong>or some other 
government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not to be trusted unless it is done
-    by free software in your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span>
-    <span class="inserted"><ins><em>told Amazon to do this, or cease to sell 
the product in</em></ins></span> that <span class="inserted"><ins><em>country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-      data containing sensitive information will be 
transmitted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to
-      <span class="removed"><del><strong>third 
parties&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Crackers found</em></ins></span> a way to
+    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon 
device,
+    and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what 
the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its</em></ins></span> 
user <span class="removed"><del><strong>watches, and</strong></del></span> 
<span class="inserted"><ins><em>by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A medical insurance company &lt;a
+    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
+    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact that</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>server
-      could save</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
-    on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped,</em></ins></span> it 
<span class="removed"><del><strong>had installed a patch to stop this, but any 
product</strong></del></span> could <span class="removed"><del><strong>spy this 
way.&lt;/p&gt;
+    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
+      across devices.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
-    about you for later examination.&lt;/p&gt;
+      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
+    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>data about the 
user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
+      the 600 millions social media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>what programs</strong></del></span> <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>be
+      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2270,108 +2246,148 @@
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often</em></ins></span> people <span 
class="removed"><del><strong>watch, and even</strong></del></span> <span 
class="inserted"><ins><em>wear it&lt;/a&gt;.&lt;/p&gt;
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    &lt;p&gt;The article says this is</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
-    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>report its location to someone else and to 
transmit conversations
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else</em></ins></span> and <span 
class="removed"><del><strong>listening all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
-<span class="removed"><del><strong>&lt;!-- #SpywareAtPlay 
--&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at 
Play&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Users are suing Bose for</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-distributing a spyware app for its headphones&lt;/a&gt;.
-Specifically, the app would record</strong></del></span>
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span 
class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>choices</em></ins></span> of <span 
class="removed"><del><strong>the audio files
-users listen to along with the headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses that this was done without the</strong></del></span> 
<span class="inserted"><ins><em>radio programs&lt;/a&gt; in its
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get</em></ins></span> users' <span 
class="removed"><del><strong>consent.
-If the fine print of</strong></del></span> <span 
class="inserted"><ins><em>consent, but it could have got that easily by
-    sneaking it into</em></ins></span> the <span 
class="removed"><del><strong>app said</strong></del></span> <span 
class="inserted"><ins><em>contract</em></ins></span> that users <span 
class="removed"><del><strong>gave consent</strong></del></span> <span 
class="inserted"><ins><em>sign</em></ins></span> for <span 
class="removed"><del><strong>this,
-would that make it acceptable? No way! It</strong></del></span> <span 
class="inserted"><ins><em>some digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
-    watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection</em></ins></span> 
should be <span class="removed"><del><strong>flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
-
-    &lt;p&gt;But if you really want</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure</em></ins></span> the 
<span class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>car's
-    hardware cannot collect any of that data.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
+    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want</em></ins></span> to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
+    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
+      transmission reports a 404 error really means nothing; the server
+      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
+    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, 
but</strong></del></span> <span class="inserted"><ins><em>won't 
collect</em></ins></span> any <span class="removed"><del><strong>product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;AI-powered driving apps can &lt;a
+    
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+&lt;!-- #SpywareAtPlay --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Users</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;p&gt;Computerized cars with nonfree software</em></ins></span> are 
<span class="removed"><del><strong>suing Bose for</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+distributing</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
+    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
+Specifically, the app would record the names of the audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if it asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+&lt;/p&gt;
+
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>do 
because</em></ins></span> the <span class="removed"><del><strong>fine print 
of</strong></del></span> <span class="inserted"><ins><em>system has no 
authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>modem.  
However, even if</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It 
should</strong></del></span> <span class="inserted"><ins><em>asked
+    for authentication, you couldn't</em></ins></span> be <span 
class="removed"><del><strong>flat out</strong></del></span> <span 
class="inserted"><ins><em>confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Many 
+      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>car remotely, the 
cell phone modem
     enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track the car's movements all</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
@@ -2774,7 +2790,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.251
retrieving revision 1.252
diff -u -b -r1.251 -r1.252
--- po/proprietary-surveillance.it.po   26 Oct 2018 06:58:57 -0000      1.251
+++ po/proprietary-surveillance.it.po   27 Oct 2018 08:28:53 -0000      1.252
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -565,11 +565,21 @@
 "sua volta le invia ad altre aziende."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "Per aumentare il numero di installazioni di Windows 10, Microsoft <a href="
 "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
@@ -1648,13 +1658,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://";
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Spyware in many e-readers&mdash;not only the Kindle: <a href=\"https://www.";
 "eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
 "user reads at what time</a>."
@@ -3462,7 +3465,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- po/proprietary-surveillance.ja-diff.html    26 Oct 2018 06:58:57 -0000      
1.90
+++ po/proprietary-surveillance.ja-diff.html    27 Oct 2018 08:28:53 -0000      
1.91
@@ -269,7 +269,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
-    &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a
+    &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span> 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -933,18 +933,12 @@
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201212031"&gt;
-    &lt;p&gt;The Electronic Frontier Foundation has examined and 
found</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
-    kinds of</em></ins></span> surveillance <span 
class="removed"><del><strong>software snoop on what radio</strong></del></span> 
<span class="inserted"><ins><em>in the Swindle</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on</strong></del></span> <span 
class="inserted"><ins><em>other e-readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>users post</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
+    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -963,10 +957,10 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways to turn off the other kinds of location
@@ -984,29 +978,31 @@
     the <span class="removed"><del><strong>picture you take according to who
       is in</strong></del></span> <span class="inserted"><ins><em>user's 
movements and listens through</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access to some
-      known-faces database, which means the pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>makes them act as 
spies for licensing enforcement.&lt;/p&gt;
+    &lt;p&gt;This <span class="removed"><del><strong>spyware feature seems to 
require online access</strong></del></span> <span 
class="inserted"><ins><em>makes them act as spies for licensing 
enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="inserted"><ins><em>save
-    a recording. But I can't</em></ins></span> be
-      <span class="removed"><del><strong>sent across</strong></del></span> 
<span class="inserted"><ins><em>sure from</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;If <span class="removed"><del><strong>so, 
none</strong></del></span> <span class="inserted"><ins><em>you learn to care 
much less about sports, you will benefit in
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>be
+      sent across</strong></del></span> <span class="inserted"><ins><em>care 
much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of <span class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>5,855 Android apps 
studied by researchers were found</em></ins></span> to <span 
class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>service.&lt;/p&gt;
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users' 
pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span class="inserted"><ins><em>apps were
-    found to insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
     detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
@@ -1015,9 +1011,9 @@
     their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
       2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
-    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
+      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span 
class="removed"><del><strong>submit</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting to realize that it is nasty.&lt;/p&gt;
 
       &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
     Android by</em></ins></span> &lt;a
@@ -1061,15 +1057,16 @@
     other but not to the server's database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass</em></ins></span> app
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>moviepass</em></ins></span> app <span 
class="removed"><del><strong>because it asked the user</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
@@ -1078,24 +1075,23 @@
     &lt;p&gt;Tracking software in popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store</em></ins></span> by 
<span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>noticing WiFi
+    follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201708270"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Sarahah</em></ins></span> app <span 
class="removed"><del><strong>because it asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>words
+    book</em></ins></span> to <span class="inserted"><ins><em>developer's 
server.  Note that this article misuses</em></ins></span> the <span 
class="removed"><del><strong>app developer but</strong></del></span> <span 
class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>zero price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>the app developer but</strong></del></span> 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Google</em></ins></span> did not
       <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary,</em></ins></span> it
@@ -1154,7 +1150,8 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
@@ -1163,20 +1160,19 @@
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
+    &lt;p&gt;Apps</em></ins></span> for <span 
class="removed"><del><strong>collecting</strong></del></span> <span 
class="inserted"><ins><em>BART &lt;a
     
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
     on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>makes 
internet-controlled vibrators</strong></del></span> <span 
class="inserted"><ins><em>they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1253,95 +1249,42 @@
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
-    on <span class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>some of its phones. 
The app will give Verizon the same information
-    about the users' searches</em></ins></span> that <span 
class="inserted"><ins><em>Google normally gets when they use
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
+    about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and</em></ins></span> the 
<span class="removed"><del><strong>emails of members</strong></del></span> 
<span class="inserted"><ins><em>user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>spyware is
-    still spyware.&lt;/p&gt;</em></ins></span>
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  &lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app &lt;a
+    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
     user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
-    consent&rdquo;</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>surveillance is inadequate as a protection 
against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    consent&rdquo; for surveillance is inadequate as a protection against
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+  &lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
     283 Android VPN apps concluded that &ldquo;in spite of the promises
     for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>poor security
+    apps&mdash;millions of users may be unawarely subject to poor security
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
@@ -1568,7 +1511,8 @@
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks data</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note</strong></del></span> <span class="inserted"><ins><em>users' computers 
and sends it to third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
@@ -1601,12 +1545,13 @@
     collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
+    &lt;p&gt;Even nastier, they do it through ad networks</em></ins></span> 
that <span class="inserted"><ins><em>merge</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can be led to spend a lot of money. They also
+    &ldquo;whales&rdquo; who can be led to spend</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows 
install</strong></del></span> <span class="inserted"><ins><em>lot of money. 
They also
     use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
@@ -1627,54 +1572,106 @@
   &lt;/li&gt;
 
   &lt;li id="M200510200"&gt;
-    &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
-    href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on a gamer's computer and sniffs a
+    &lt;p&gt;Blizzard Warden</em></ins></span> is <span 
class="removed"><del><strong>not really
+clean since</strong></del></span> <span class="inserted"><ins><em>a hidden
+    &ldquo;cheating-prevention&rdquo; program that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
+    spies</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>every process running on a gamer's computer and 
sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareAtWork"&gt;Spyware at 
Work&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that the article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It is unfortunate that the article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV 
Sets&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;Emo Phillips made a joke: The other 
day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>me and
+said, &ldquo;Didn't I see you</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam</strong></del></span> <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+before Amazon</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>article for the facts</em></ins></span> it 
<span class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A</strong></del></span> <span class="inserted"><ins><em>presents. 
It
     is too bad that the article finishes by advocating the
     moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
@@ -1682,77 +1679,119 @@
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>device means</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
     report everything that is viewed on them, and not just broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
-    the TV reports what it is. The existence of a way to disable the
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>image</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>coming from the user's own computer,
+    the TV reports what</em></ins></span> it <span 
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span 
class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>disable the
     surveillance, even if it were not hidden as it was in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
+    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201511130"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
     &lt;p&gt;Some web and TV advertisements play inaudible
     sounds to be picked up by proprietary malware running
-    on other devices in range so as to determine that they
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>range so as to determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers can correlate ads with Web activity, and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>contain Javascript code,</strong></del></span> 
<span class="inserted"><ins><em>correlate ads with Web 
activity,</em></ins></span> and <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511060"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying on their users: their &lt;a
-    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    manufacturers</em></ins></span> in <span class="removed"><del><strong>many 
e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>spying on their users: their</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;
+    &lt;p&gt;It is possible</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn this off, but having it enabled by default
+    is an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>nonfree software</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households
     to the 600 millions social media profiles the company
-    already monitors. Tivo customers are unaware they're
+    already monitors. Tivo customers</em></ins></span> are <span 
class="inserted"><ins><em>unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    users to new combined surveillance by default.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Nissan Leaf 
has</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span class="inserted"><ins><em>TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> <span 
class="inserted"><ins><em>even what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no 
authentication</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> when
+    <span class="removed"><del><strong>accessed through</strong></del></span> 
<span class="inserted"><ins><em>first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
     &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to the US or some
+    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
-    software in your own computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to</em></ins></span> be <span 
class="removed"><del><strong>confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>trusted 
unless it is done by free</em></ins></span>
+    software in <span class="removed"><del><strong>the 
car</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
@@ -1761,42 +1800,65 @@
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is
+    <span class="removed"><del><strong>proprietary,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    on their</em></ins></span> users&lt;/a&gt;.&lt;/p&gt;
+
+    <span class="removed"><del><strong>&lt;p&gt;Even if no one 
connects</strong></del></span>
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got
+    <span class="inserted"><ins><em>&lt;p&gt;The report was as of 2014, but we 
don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products to get users' formal
+    &lt;p&gt;This shows that laws requiring products</em></ins></span> to 
<span class="inserted"><ins><em>get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if a user declines consent? Probably the TV will
-    say, &ldquo;Without your consent to tracking, the TV will not
+    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>car remotely, the cell phone
+    modem enables the phone company</strong></del></span> <span 
class="inserted"><ins><em>TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
-    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to <span class="removed"><del><strong>physically remove</strong></del></span> 
<span class="inserted"><ins><em>report what</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary 
software</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>cars</strong></del></span> <span 
class="inserted"><ins><em>LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available to car manufacturers, insurance 
companies,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and
+      <span class="removed"><del><strong>others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned 
in</strong></del></span> <span class="inserted"><ins><em>the switch to 
turn</em></ins></span> this <span class="removed"><del><strong>article, is not
+      really</strong></del></span> <span class="inserted"><ins><em>off has
+    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span class="removed"><del><strong>matter of 
proprietary surveillance. These systems are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>404 error
+    really means nothing;</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on</em></ins></span> other
+      <span class="removed"><del><strong>cases mentioned are done by 
proprietary malware in the car.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>devices on</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
+      determine the car's location at</strong></del></span> <span 
class="inserted"><ins><em>stop this, but</em></ins></span> any <span 
class="removed"><del><strong>time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
+      store</strong></del></span>
+    <span class="inserted"><ins><em>product could spy</em></ins></span> this 
<span class="removed"><del><strong>information, but if the state orders 
it</strong></del></span> <span class="inserted"><ins><em>way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
@@ -1806,229 +1868,175 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching TV.&lt;/p&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;</em></ins></span>
+    and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch</em></ins></span> the 
<span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>people who 
are watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;</strong></del></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603220"&gt;
     &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;</em></ins></span>
+  &lt;li id="M201511250"&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    to outsmart you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
-    into one.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The Furby Connect has</em></ins></span> a <span 
class="removed"><del><strong>joke: The other day</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act 
as</em></ins></span> a <span class="removed"><del><strong>woman came 
up</strong></del></span>
+    <span class="inserted"><ins><em>listening device, remote 
changes</em></ins></span> to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently 
that</strong></del></span> <span class="inserted"><ins><em>code could surely 
convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US libraries,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy</em></ins></span> was
+<span class="removed"><del><strong>before Amazon &ldquo;smart&rdquo; 
TVs.&lt;/p&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was</em></ins></span> snooping <span 
class="removed"><del><strong>devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>found to 
make</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two</em></ins></span> 
users&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;That's easy to do because the system has no authentication when
-    accessed</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
+    products, rather than free software which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots of personal information about how people
+    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
+      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="inserted"><ins><em>information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing 
the</em></ins></span> data <span class="removed"><del><strong>are totally 
inadequate.
+      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>may be
+    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
+    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
-    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
-    customers.&lt;/p&gt;</em></ins></span>
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+    customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
+  &lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion of privacy, and should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
-      determine</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;
-  &lt;/li&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    &lt;p&gt;That the manufacturer</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
+      across devices.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>a child's speech, and even speak into the
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>toys</em></ins></span> with <span 
class="removed"><del><strong>online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
     toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in 
many cases</em></ins></span> &lt;a <span class="removed"><del><strong>href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;While you're using a DJI drone
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2037,24 +2045,8 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
-      their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but having it enabled by 
default
-      is an injustice already.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media profiles the company 
already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all users to
-      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
-    and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would</em></ins></span> be
@@ -2087,27 +2079,24 @@
       watching and listening</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
     listen to everyone in the house,</em></ins></span> all the 
time&lt;/a&gt;.&lt;/p&gt;
-  <span class="removed"><del><strong>&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users'</strong></del></span>
 
     <span class="inserted"><ins><em>&lt;p&gt;Today's technological practice 
does not include any way of making
-    a device that can obey your</em></ins></span> voice <span 
class="inserted"><ins><em>commands without potentially spying</em></ins></span>
-    on <span class="inserted"><ins><em>you.  Even if it is air-gapped, it 
could be saving up records
-    about you for later examination.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could be saving up records
+    about you for later examination.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>another
-    company, Nuance&lt;/a&gt;.  Nuance can save it and would then 
have</strong></del></span> <span class="inserted"><ins><em>spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2123,8 +2112,8 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>find</em></ins></span> it <span 
class="inserted"><ins><em>normal that companies
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
     monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2136,22 +2125,16 @@
   &lt;li id="M201603020"&gt;
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
     
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-    that connects</em></ins></span> to <span class="removed"><del><strong>the 
US or some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says this</em></ins></span> is <span 
class="removed"><del><strong>not to</strong></del></span> <span 
class="inserted"><ins><em>a back door, but that could</em></ins></span> be 
<span class="removed"><del><strong>trusted unless</strong></del></span> <span 
class="inserted"><ins><em>a
-    misunderstanding.  However,</em></ins></span> it is <span 
class="removed"><del><strong>done
-    by free software in your own computer.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An</em></ins></span> LG &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span> <span class="inserted"><ins><em>watch is 
designed &lt;a
+  &lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else</em></ins></span> and
-      <span class="removed"><del><strong>the switch</strong></del></span> to 
<span class="removed"><del><strong>turn this off has no effect.  (The fact that 
the
-      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>transmit 
conversations
+    to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2166,49 +2149,58 @@
   &lt;li id="M201810230"&gt;
     &lt;p&gt;GM &lt;a
     href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span 
class="removed"><del><strong>server</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+    tracked the choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it</em></ins></span> could 
<span class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>have got</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>easily by
-    sneaking</em></ins></span> it
-      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said it had installed a patch</strong></del></span> 
<span class="inserted"><ins><em>contract that users sign for some digital 
service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>stop this, 
but</strong></del></span> <span class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="inserted"><ins><em>you,
     watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be <span class="removed"><del><strong>trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect</em></ins></span> any <span 
class="removed"><del><strong>product
-      could spy this way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+    hardware cannot collect any of that data, or that the 
software</em></ins></span>
+    is <span class="removed"><del><strong>done
+    by</strong></del></span> free <span class="removed"><del><strong>software 
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't 
collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+  &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  &lt;li id="M201607160"&gt;
-    &lt;p&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;p&gt;Computerized cars with nonfree software are</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, and
+      the switch to turn this off</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
     snooping devices&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone to &lt;a
-    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf</em></ins></span> has <span 
class="removed"><del><strong>no effect.  (The fact that the
+      transmission reports a 404 error really means nothing; the server
+      could save that data anyway.)&lt;/p&gt;
+
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on the user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said it had installed</strong></del></span> a <span 
class="removed"><del><strong>patch</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    cell phone modem which allows effectively anyone</em></ins></span> to 
<span class="removed"><del><strong>stop this, but any product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
     access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>even what they wanted</strong></del></span> <span 
class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
@@ -2634,7 +2626,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.224
retrieving revision 1.225
diff -u -b -r1.224 -r1.225
--- po/proprietary-surveillance.ja.po   26 Oct 2018 06:58:57 -0000      1.224
+++ po/proprietary-surveillance.ja.po   27 Oct 2018 08:28:53 -0000      1.225
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -438,11 +438,17 @@
 "今、それを別の会社にも配ります。"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "ウィンドウズ10のインストールベースを増加
させるために、マイクロソフトは<a "
 "href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
@@ -1360,13 +1366,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://";
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Spyware in many e-readers&mdash;not only the Kindle: <a href=\"https://www.";
 "eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
 "user reads at what time</a>."
@@ -2936,7 +2935,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- po/proprietary-surveillance.pot     26 Oct 2018 06:58:57 -0000      1.173
+++ po/proprietary-surveillance.pot     27 Oct 2018 08:28:53 -0000      1.174
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -337,6 +337,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "In order to increase Windows 10's install base, Microsoft <a "
+"class=\"not-a-duplicate\" "
 
"href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
 "
 "blatantly disregards user choice and privacy</a>."
 msgstr ""
@@ -926,13 +927,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Electronic Frontier Foundation has examined and found <a "
-"href=\"https://www.eff.org/pages/reader-privacy-chart-2012\";>various kinds "
-"of surveillance in the Swindle and other e-readers</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Spyware in many e-readers&mdash;not only the Kindle: <a "
 "href=\"https://www.eff.org/pages/reader-privacy-chart-2012\";> they report "
 "even which page the user reads at what time</a>."
@@ -2129,7 +2123,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.419
retrieving revision 1.420
diff -u -b -r1.419 -r1.420
--- po/proprietary-surveillance.ru.po   26 Oct 2018 08:58:11 -0000      1.419
+++ po/proprietary-surveillance.ru.po   27 Oct 2018 08:28:53 -0000      1.420
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-26 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -412,11 +413,21 @@
 "Microsoft передает их другой компании."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In order to increase Windows 10's install base, Microsoft <a href=\"https://";
-"www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-"
-"choice-and-privacy-deep-dive\"> blatantly disregards user choice and "
-"privacy</a>."
+# | In order to increase Windows 10's install base, Microsoft <a
+# | {+class=\"not-a-duplicate\"+}
+# | 
href=\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\";>
+# | blatantly disregards user choice and privacy</a>.
+#, fuzzy
+#| msgid ""
+#| "In order to increase Windows 10's install base, Microsoft <a href="
+#| "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
+#| "disregards-user-choice-and-privacy-deep-dive\"> blatantly disregards user "
+#| "choice and privacy</a>."
+msgid ""
+"In order to increase Windows 10's install base, Microsoft <a class=\"not-a-"
+"duplicate\" href=\"https://www.eff.org/deeplinks/2016/08/windows-10-";
+"microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\"> "
+"blatantly disregards user choice and privacy</a>."
 msgstr ""
 "В целях наращивания пользовательской 
базы Windows 10 Microsoft <a href="
 "\"https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-";
@@ -1300,16 +1311,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Electronic Frontier Foundation has examined and found <a href=\"https://";
-"www.eff.org/pages/reader-privacy-chart-2012\">various kinds of surveillance "
-"in the Swindle and other e-readers</a>."
-msgstr ""
-"Фонд электронных рубежей обследовал и 
нашел <a href=\"https://www.eff.org/";
-"pages/reader-privacy-chart-2012\"> разного рода слежку в 
Swindle и других "
-"устройствах чтения электронных книг</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Spyware in many e-readers&mdash;not only the Kindle: <a href=\"https://www.";
 "eff.org/pages/reader-privacy-chart-2012\"> they report even which page the "
 "user reads at what time</a>."
@@ -3048,9 +3049,17 @@
 "<em>Любой</em> сбор таких данных должен быть 
запрещен."
 
 #. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 "Но если вы хотите настоящей безопасности, 
нужно гарантировать, что "
 "аппаратура автомобиля не может собирать 
ничего из этих данных."
@@ -3590,6 +3599,15 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Electronic Frontier Foundation has examined and found <a href="
+#~ "\"https://www.eff.org/pages/reader-privacy-chart-2012\";>various kinds of "
+#~ "surveillance in the Swindle and other e-readers</a>."
+#~ msgstr ""
+#~ "Фонд электронных рубежей обследовал и 
нашел <a href=\"https://www.eff.org/";
+#~ "pages/reader-privacy-chart-2012\"> разного рода слежку в 
Swindle и других "
+#~ "устройствах чтения электронных книг</a>."
+
+#~ msgid ""
 #~ "This document attempts to track <strong>clearly established cases of "
 #~ "proprietary software that spies on or tracks users</strong>."
 #~ msgstr ""

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- po/proprietary.de.po        26 Oct 2018 06:58:57 -0000      1.58
+++ po/proprietary.de.po        27 Oct 2018 08:28:53 -0000      1.59
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -445,7 +445,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -504,14 +505,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- po/proprietary.es.po        26 Oct 2018 06:58:57 -0000      1.57
+++ po/proprietary.es.po        27 Oct 2018 08:28:53 -0000      1.58
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-09-19 10:49+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -458,7 +458,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -517,14 +518,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary.fr.po        26 Oct 2018 11:45:30 -0000      1.67
+++ po/proprietary.fr.po        27 Oct 2018 08:28:53 -0000      1.68
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-26 13:44+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -321,9 +322,17 @@
 "de ce type doit être interdit."
 
 #. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 "Mais si vous voulez être vraiment en sécurité, vous devez vous assurer que 
"
 "le matériel de la voiture ne peut collecter aucune de ces données."
@@ -417,18 +426,6 @@
 "libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
 "thermostat."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-"Des chercheurs ont découvert un moyen de <a href=\"http://news.rub.de/";
-"english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"
-"\">cacher des commandes vocales dans d'autres flux audio</a>. Elles sont "
-"inaudibles pour les humains, mais Alexa et Siri peuvent les entendre."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -506,6 +503,17 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
+#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
+#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
+#~ "but Alexa and Siri can."
+#~ msgstr ""
+#~ "Des chercheurs ont découvert un moyen de <a href=\"http://news.rub.de/";
+#~ "english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"
+#~ "\">cacher des commandes vocales dans d'autres flux audio</a>. Elles sont "
+#~ "inaudibles pour les humains, mais Alexa et Siri peuvent les entendre."
+
+#~ msgid ""
 #~ "Android has a <a href=\"https://www.theverge.com/platform/";
 #~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
 #~ "change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary.it-diff.html 26 Oct 2018 06:58:57 -0000      1.16
+++ po/proprietary.it-diff.html 27 Oct 2018 08:28:54 -0000      1.17
@@ -43,14 +43,14 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 40em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -154,10 +154,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -194,7 +194,8 @@
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810150"&gt;
@@ -243,13 +244,6 @@
     nonfree software. With an old-fashioned thermostat, you can do it
     using controls right on the thermostat.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +304,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- po/proprietary.it.po        26 Oct 2018 06:58:57 -0000      1.67
+++ po/proprietary.it.po        27 Oct 2018 08:28:54 -0000      1.68
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -449,7 +449,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -508,14 +509,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary.ja-diff.html 26 Oct 2018 06:58:57 -0000      1.18
+++ po/proprietary.ja-diff.html 27 Oct 2018 08:28:54 -0000      1.19
@@ -152,10 +152,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -191,7 +191,8 @@
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810150"&gt;
@@ -240,13 +241,6 @@
     nonfree software. With an old-fashioned thermostat, you can do it
     using controls right on the thermostat.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- po/proprietary.ja.po        26 Oct 2018 06:58:57 -0000      1.50
+++ po/proprietary.ja.po        27 Oct 2018 08:28:54 -0000      1.51
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -371,7 +371,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -430,14 +431,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary.nl-diff.html 26 Oct 2018 06:58:57 -0000      1.16
+++ po/proprietary.nl-diff.html 27 Oct 2018 08:28:54 -0000      1.17
@@ -43,14 +43,14 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 40em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -194,7 +194,8 @@
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810150"&gt;
@@ -243,13 +244,6 @@
     nonfree software. With an old-fashioned thermostat, you can do it
     using controls right on the thermostat.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -310,7 +304,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- po/proprietary.nl.po        26 Oct 2018 06:58:57 -0000      1.40
+++ po/proprietary.nl.po        27 Oct 2018 08:28:54 -0000      1.41
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -442,7 +442,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -501,14 +502,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/proprietary.pl-diff.html 26 Oct 2018 06:58:57 -0000      1.34
+++ po/proprietary.pl-diff.html 27 Oct 2018 08:28:54 -0000      1.35
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,8 +40,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -85,8 +85,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of October 26, 2018, the pages in this directory list 340
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with 404 references 
to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October 26, 2018, the pages in this directory 
list 340
+instances of malicious functionalities (with 404 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -121,18 +121,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -192,7 +192,8 @@
     phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data.&lt;/p&gt;
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810150"&gt;
@@ -241,13 +242,6 @@
     nonfree software. With an old-fashioned thermostat, you can do it
     using controls right on the thermostat.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -308,7 +302,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/26 06:58:57 $
+$Date: 2018/10/27 08:28:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/proprietary.pl.po        26 Oct 2018 06:58:57 -0000      1.35
+++ po/proprietary.pl.po        27 Oct 2018 08:28:54 -0000      1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -523,7 +523,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -582,14 +583,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- po/proprietary.pot  26 Oct 2018 06:58:57 -0000      1.32
+++ po/proprietary.pot  27 Oct 2018 08:28:54 -0000      1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -263,7 +263,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -323,14 +324,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a "
-"href=\"http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\";>
 "
-"hide voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- po/proprietary.pt-br.po     26 Oct 2018 06:58:57 -0000      1.17
+++ po/proprietary.pt-br.po     27 Oct 2018 08:28:54 -0000      1.18
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-22 13:22-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -316,7 +316,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -409,18 +410,6 @@
 "livre. Com um termostato antiquado, você pode fazê-lo usando controles "
 "diretamente no termostato."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-"Pesquisadores descobriram como <a href=\"http://news.rub.de/english/press-";
-"releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> ocultar "
-"comandos de voz em outro áudio</a>, para que as pessoas não possam 
ouvi-las, "
-"mas Alexa e Siri podem."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -499,6 +488,17 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
+#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
+#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
+#~ "but Alexa and Siri can."
+#~ msgstr ""
+#~ "Pesquisadores descobriram como <a href=\"http://news.rub.de/english/press-";
+#~ "releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> ocultar "
+#~ "comandos de voz em outro áudio</a>, para que as pessoas não possam ouvi-"
+#~ "las, mas Alexa e Siri podem."
+
+#~ msgid ""
 #~ "Android has a <a href=\"https://www.theverge.com/platform/";
 #~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
 #~ "change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- po/proprietary.ru.po        26 Oct 2018 08:58:11 -0000      1.88
+++ po/proprietary.ru.po        27 Oct 2018 08:28:54 -0000      1.89
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-10-26 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-27 08:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -324,9 +325,17 @@
 "<em>Любой</em> сбор таких данных должен быть 
запрещен."
 
 #. type: Content of: <ul><li><p>
+# | But if you really want to be safe, we must make sure the car's hardware
+# | cannot collect any of that {+data, or that the software is free so we know
+# | it won't collect any of that+} data.
+#, fuzzy
+#| msgid ""
+#| "But if you really want to be safe, we must make sure the car's hardware "
+#| "cannot collect any of that data."
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 "Но если вы хотите настоящей безопасности, 
нужно гарантировать, что "
 "аппаратура автомобиля не может собирать 
ничего из этих данных."
@@ -422,18 +431,6 @@
 "старомодных термостатах это делается с 
помощью органов управления прямо на "
 "термостате."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-"Исследователи открыли способ <a 
href=\"http://news.rub.de/english/press-";
-"releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> 
скрывать "
-"голосовые команды в других звукозаписях
</a>, так что люди эти команды не "
-"слышат, но их слышат Alexa и Siri."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -513,6 +510,17 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
+#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
+#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
+#~ "but Alexa and Siri can."
+#~ msgstr ""
+#~ "Исследователи открыли способ <a 
href=\"http://news.rub.de/english/press-";
+#~ "releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> 
скрывать "
+#~ "голосовые команды в других звукозаписях
</a>, так что люди эти команды не "
+#~ "слышат, но их слышат Alexa и Siri."
+
+#~ msgid ""
 #~ "Android has a <a href=\"https://www.theverge.com/platform/";
 #~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
 #~ "change\"> back door for remotely changing &ldquo;user&rdquo; settings</a>."

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- po/proprietary.zh-tw.po     26 Oct 2018 06:58:57 -0000      1.18
+++ po/proprietary.zh-tw.po     27 Oct 2018 08:28:54 -0000      1.19
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-26 06:55+0000\n"
+"POT-Creation-Date: 2018-10-27 08:26+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -360,7 +360,8 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "But if you really want to be safe, we must make sure the car's hardware "
-"cannot collect any of that data."
+"cannot collect any of that data, or that the software is free so we know it "
+"won't collect any of that data."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -419,14 +420,6 @@
 "right on the thermostat."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/";
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]