www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/po/malware-mobiles.de-diff.html...


From: GNUN
Subject: www proprietary/po/malware-mobiles.de-diff.html...
Date: Tue, 30 Oct 2018 11:28:32 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/30 11:28:30

Modified files:
        proprietary/po : malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de.po proprietary.es.po 
                         proprietary.fr.po proprietary.it-diff.html 
                         proprietary.it.po proprietary.ja-diff.html 
                         proprietary.ja.po proprietary.nl-diff.html 
                         proprietary.nl.po proprietary.pl-diff.html 
                         proprietary.pl.po proprietary.pot 
                         proprietary.pt-br.po proprietary.ru.po 
                         proprietary.zh-tw.po 
        server         : body-include-2.sq.html outdated.sq.html 
                         sitemap.sq.html top-addendum.sq.html 
        server/po      : outdated.sq.po sitemap.sq.po top-addendum.sq.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.422&r2=1.423
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-2.sq.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/server/outdated.sq.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.sq.html?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/server/top-addendum.sq.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/outdated.sq.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.sq.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/top-addendum.sq.po?cvsroot=www&r1=1.7&r2=1.8

Patches:
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-mobiles.de-diff.html 27 Oct 2018 08:28:53 -0000      
1.14
+++ proprietary/po/malware-mobiles.de-diff.html 30 Oct 2018 15:28:29 -0000      
1.15
@@ -329,40 +329,49 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;The Sarahah app 
       &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone</strong></del></span>
+      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607290"&gt;
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-    WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be recovered
-    in various ways.&lt;/p&gt;
+    WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be 
recovered</em></ins></span>
+    in <span class="inserted"><ins><em>various ways.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201607280"&gt;
     &lt;p&gt;A half-blind security critique of a tracking app: it found that 
&lt;a
     
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/"&gt;
-    blatant flaws allowed anyone to snoop on a user's personal data&lt;/a&gt;.
-    The critique fails entirely to express concern that the app sends the
-    personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
+    blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span 
class="removed"><del><strong>address
+      book</strong></del></span> <span class="inserted"><ins><em>personal 
data&lt;/a&gt;.
+    The critique fails entirely</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>express concern</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> the 
<span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>app 
sends the
+    personal data</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
server, where the &lt;em&gt;developer&lt;/em&gt; gets it all.
     This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
     &lt;p&gt;The server surely has a &ldquo;privacy policy,&rdquo; and surely
-    it is worthless since nearly all of them are.&lt;/p&gt;
+    it is worthless since nearly all of them are.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201607190"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some 
portable</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;
     &lt;p&gt;A bug in a proprietary ASN.1 library, used
-    in cell phone towers as well as cell phones and routers, &lt;a
-    
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
-    taking control of those systems&lt;/a&gt;.&lt;/p&gt;
+    in cell phone towers as well as cell</em></ins></span> phones <span 
class="inserted"><ins><em>and routers,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
+    taking control</em></ins></span> of <span class="inserted"><ins><em>those 
systems&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603100"&gt;
     &lt;p&gt;Many proprietary payment apps &lt;a
     
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;transmit
-    personal data in an insecure way&lt;/a&gt;. However,
-    the worse aspect of these apps is that &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt;payment is not
+    personal</em></ins></span> data <span class="removed"><del><strong>to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's app listens all</strong></del></span> <span 
class="inserted"><ins><em>in an insecure way&lt;/a&gt;. 
However,</em></ins></span>
+    the <span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not
     anonymous&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -370,9 +379,9 @@
     &lt;p&gt;&lt;a
     
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
     Many smartphone apps use insecure authentication methods when storing
-    your personal data on remote servers&lt;/a&gt;. This leaves personal
+    your personal data</em></ins></span> on <span 
class="removed"><del><strong>what people</strong></del></span> <span 
class="inserted"><ins><em>remote servers&lt;/a&gt;. This leaves personal
     information like email addresses, passwords, and health information
-    vulnerable. Because many of these apps are proprietary it makes it
+    vulnerable. Because many of these apps</em></ins></span> are <span 
class="removed"><del><strong>listening to or watching&lt;/a&gt;. In 
addition,</strong></del></span> <span 
class="inserted"><ins><em>proprietary</em></ins></span> it <span 
class="removed"><del><strong>may</strong></del></span> <span 
class="inserted"><ins><em>makes it
     hard to impossible to know which apps are at risk.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -383,10 +392,11 @@
     deactivated by its developer&lt;/a&gt; which had discovered a security
     flaw.&lt;/p&gt;
 
-    &lt;p&gt;That developer seems to be conscientious about protecting personal
+    &lt;p&gt;That developer seems to</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's 
conversations</strong></del></span> <span 
class="inserted"><ins><em>conscientious about protecting personal
     data from third parties in general, but it can't protect that data
-    from the state.  Quite the contrary: confiding your data to someone
-    else's server, if not first encrypted by you with free software,
+    from the state.  Quite the contrary: confiding your data</em></ins></span> 
to <span class="removed"><del><strong>serve them</strong></del></span> <span 
class="inserted"><ins><em>someone
+    else's server, if not first encrypted by you</em></ins></span> with <span 
class="removed"><del><strong>targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>free software,
     undermines your rights.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -413,6 +423,12 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
@@ -484,8 +500,7 @@
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone</em></ins></span> numbers and email addresses&lt;/a&gt; 
in <span class="removed"><del><strong>user's address
-      book</strong></del></span> <span class="inserted"><ins><em>user's address
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
     book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
@@ -541,7 +556,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note</strong></del></span> 
<span class="inserted"><ins><em>do lots of surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -553,24 +568,16 @@
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that this <span 
class="removed"><del><strong>article misuses</strong></del></span> <span 
class="inserted"><ins><em>was done without</em></ins></span> the <span 
class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>users' 
consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="inserted"><ins><em>Android apps can collude
-    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
+  &lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -578,15 +585,14 @@
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>same information
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -595,24 +601,23 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
-  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611280"&gt;
+  &lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611160"&gt;</em></ins></span>
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -645,8 +650,7 @@
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores <span 
class="removed"><del><strong>detailed logs
-      and may turn them over to the UK government if
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and 
<span class="removed"><del><strong>may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -699,8 +703,8 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>detailed logs and
-      may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+      <span class="inserted"><ins><em>may turn them over to</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
@@ -744,8 +748,7 @@
     scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
     and <span class="removed"><del><strong>location 
tracking,</strong></del></span> <span 
class="inserted"><ins><em>suggests</em></ins></span> you <span 
class="removed"><del><strong>must
   disable Google Play itself</strong></del></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
-  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>who is
-    in</em></ins></span> the <span class="removed"><del><strong>user,
+  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey the user,
   when it's actually doing something else.  Such a thing would be almost
   unthinkable with free software.&lt;/p&gt;
 
@@ -753,23 +756,24 @@
 &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
         announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems to require online access 
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The 
app will give Verizon the same
-   information about</strong></del></span>
-    <span class="inserted"><ins><em>known-faces database, which 
means</em></ins></span> the <span class="removed"><del><strong>users' searches 
that Google normally gets when
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
-    sent across</em></ins></span> the <span class="removed"><del><strong>app 
is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> 
and <span class="inserted"><ins><em>face-recognition
+   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>who</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span class="inserted"><ins><em>in</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>pictures are likely to be
+    sent across</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However,</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo; them 
to</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu 
photo-editing</strong></del></span>
 
@@ -933,10 +937,10 @@
   send personal data to Motorola.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some manufacturers add a &lt;a
-  
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-  hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
+  &lt;li&gt;&lt;p&gt;Some manufacturers add a</strong></del></span> <span 
class="inserted"><ins><em>apps (but not</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100 &lt;a
     
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
     and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1128,7 +1132,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/malware-mobiles.de.po        27 Oct 2018 08:28:53 -0000      
1.83
+++ proprietary/po/malware-mobiles.de.po        30 Oct 2018 15:28:29 -0000      
1.84
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -616,6 +616,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Spanish football streaming app <a href=\"https://boingboing.";
 "net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
 "movements and listens through the microphone</a>."

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary/po/malware-mobiles.es.po        27 Oct 2018 08:28:53 -0000      
1.78
+++ proprietary/po/malware-mobiles.es.po        30 Oct 2018 15:28:29 -0000      
1.79
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-07-27 11:25+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -588,6 +588,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Spanish football streaming app <a href=\"https://boingboing.";
 "net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
 "movements and listens through the microphone</a>."

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/malware-mobiles.fr.po        27 Oct 2018 11:57:17 -0000      
1.95
+++ proprietary/po/malware-mobiles.fr.po        30 Oct 2018 15:28:29 -0000      
1.96
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-10-27 13:55+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -583,6 +584,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Spanish football streaming app <a href=\"https://boingboing.";
 "net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
 "movements and listens through the microphone</a>."

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/malware-mobiles.it-diff.html 27 Oct 2018 08:28:53 -0000      
1.19
+++ proprietary/po/malware-mobiles.it-diff.html 30 Oct 2018 15:28:29 -0000      
1.20
@@ -239,8 +239,8 @@
     that <span class="removed"><del><strong>this
   does</strong></del></span> <span class="inserted"><ins><em>impose censorship 
on application programs.&lt;/li&gt;
   &lt;li&gt;&lt;a href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system</em></ins></span> not <span 
class="removed"><del><strong>operate via</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;authorized&rdquo; by the
-    manufacturer.&lt;/li&gt;
+    that reject any operating system</em></ins></span> not <span 
class="removed"><del><strong>operate via</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;authorized&rdquo; by</em></ins></span> the
+    <span class="inserted"><ins><em>manufacturer.&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
 
@@ -248,27 +248,42 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;See above for the &lt;a href="#universal-back-door"&gt;general 
universal back
-      door&lt;/a&gt; in essentially all mobile phones, which permits converting
+    &lt;p&gt;See above for the &lt;a 
href="#universal-back-door"&gt;general</em></ins></span> universal back <span 
class="removed"><del><strong>door that we know nearly</strong></del></span>
+      <span class="inserted"><ins><em>door&lt;/a&gt; in 
essentially</em></ins></span> all
+  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>mobile phones, which permits converting
       them into full-time listening devices.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201609130"&gt;
-    &lt;p&gt;Xiaomi phones come with &lt;a
-    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
-    a universal back door in</em></ins></span> the <span 
class="inserted"><ins><em>application processor, for Xiaomi's
+    &lt;p&gt;Xiaomi</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>come 
with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
+  lots of bugs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
+    a universal back door</em></ins></span> in the <span 
class="removed"><del><strong>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span> <span 
class="inserted"><ins><em>application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
-    universal back door <span class="inserted"><ins><em>in the modem 
processor</em></ins></span> that <span class="removed"><del><strong>we know 
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
-    company can use&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email 
addresses&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the
+    universal back door</em></ins></span> in <span 
class="removed"><del><strong>user's address
+      book to developer's server.  Note</strong></del></span> <span 
class="inserted"><ins><em>the modem processor</em></ins></span> that <span 
class="removed"><del><strong>this article misuses</strong></del></span> the 
<span class="removed"><del><strong>words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
-    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable 
phones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -278,10 +293,11 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
-    all
-  <span class="removed"><del><strong>portable</strong></del></span> <span 
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span 
class="removed"><del><strong>have. It may involve exploiting various bugs. 
There are</strong></del></span> <span class="inserted"><ins><em>have 
a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-  lots of bugs</strong></del></span> <span 
class="inserted"><ins><em>href="#universal-back-door"&gt;
+    A Chinese version</em></ins></span> of <span 
class="removed"><del><strong>data to China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Facebook's app listens</strong></del></span> <span 
class="inserted"><ins><em>Android has a universal back door&lt;/a&gt;. 
Nearly</em></ins></span>
+    all <span class="removed"><del><strong>the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to</strong></del></span>
 <span class="inserted"><ins><em>models of mobile phones have a &lt;a 
href="#universal-back-door"&gt;
     universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
     to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
@@ -449,6 +465,12 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
@@ -466,8 +488,8 @@
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to snoop
-    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    of the 5,855 Android apps studied by researchers were found 
to</em></ins></span> snoop
+    <span class="inserted"><ins><em>and collect information about its 
users&lt;/a&gt;.  40% of the apps were
     found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
@@ -531,16 +553,16 @@
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="inserted"><ins><em>the contrary, it
     worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
+    discovering</em></ins></span> what <span 
class="removed"><del><strong>people</strong></del></span> <span 
class="inserted"><ins><em>they did. So we cannot blame Google specifically
     for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</em></ins></span>
+    are <span class="removed"><del><strong>listening</strong></del></span> 
<span class="inserted"><ins><em>malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
@@ -570,49 +592,39 @@
 
   &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
+    to <span class="inserted"><ins><em>ultrasound from beacons placed in 
stores</em></ins></span> or <span 
class="removed"><del><strong>watching&lt;/a&gt;. In 
addition,</strong></del></span> <span class="inserted"><ins><em>played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
     &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data</em></ins></span> in the <span 
class="removed"><del><strong>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    how much access</em></ins></span> it <span class="removed"><del><strong>may
+  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>demands</em></ins></span> to <span 
class="removed"><del><strong>serve them</strong></del></span> <span 
class="inserted"><ins><em>personal data in the device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The Sarahah app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+  &lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users 
listen</em></ins></span> to <span class="removed"><del><strong>developer's 
server.  Note</strong></del></span>
-    <span class="inserted"><ins><em>along with the headphone's unique serial 
number.&lt;/p&gt;
+    the app would record the names of the audio files users listen to
+    along</em></ins></span> with <span class="removed"><del><strong>targeted
+  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that this <span 
class="removed"><del><strong>article misuses</strong></del></span> <span 
class="inserted"><ins><em>was done without</em></ins></span> the <span 
class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>users' 
consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>design
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some portable phones 
&lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span 
class="inserted"><ins><em>Android apps can collude
-    to transmit users' personal</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-&lt;li&gt;
-  &lt;p&gt;Facebook's</strong></del></span> <span 
class="inserted"><ins><em>servers. &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -620,15 +632,14 @@
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search</em></ins></span> app <span 
class="removed"><del><strong>listens all</strong></del></span> <span 
class="inserted"><ins><em>that it will&lt;/a&gt; pre-install
-    on some of its phones. The app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>same information
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>what people are listening to or 
watching&lt;/a&gt;. In addition, it may
-  be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>only one phone&lt;/a&gt;, and the user must
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
     still spyware.&lt;/p&gt;
@@ -637,14 +648,10 @@
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
-  advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611280"&gt;
+  &lt;li id="M201611280"&gt;
     &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
@@ -686,8 +693,8 @@
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
-    <span class="removed"><del><strong>&lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
+      &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it <span 
class="removed"><del><strong>stores detailed logs
       and may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
@@ -741,10 +748,7 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-
-      <span class="inserted"><ins><em>&lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>stores detailed logs and
       may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -789,8 +793,7 @@
     scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
     and <span class="removed"><del><strong>location 
tracking,</strong></del></span> <span 
class="inserted"><ins><em>suggests</em></ins></span> you <span 
class="removed"><del><strong>must
   disable Google Play itself</strong></del></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
-  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey</strong></del></span> <span 
class="inserted"><ins><em>who is
-    in</em></ins></span> the <span class="removed"><del><strong>user,
+  yet another example of nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>picture you take according</em></ins></span> to 
<span class="removed"><del><strong>obey the user,
   when it's actually doing something else.  Such a thing would be almost
   unthinkable with free software.&lt;/p&gt;
 
@@ -798,22 +801,24 @@
 &lt;li&gt;
    &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
         announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
-
-    &lt;p&gt;This spyware feature seems to require online access 
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The 
app will give Verizon the same
-   information about</strong></del></span>
-    <span class="inserted"><ins><em>known-faces database, which 
means</em></ins></span> the <span class="removed"><del><strong>users' searches 
that Google normally gets when
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets when
    they use its search engine.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
-    sent across</em></ins></span> the <span class="removed"><del><strong>app 
is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span> 
and <span class="inserted"><ins><em>face-recognition
+   &lt;p&gt;Currently, the app</strong></del></span> <span 
class="inserted"><ins><em>who</em></ins></span> is <span 
class="removed"><del><strong>&lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span class="inserted"><ins><em>in</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>pictures are likely to be
+    sent across</em></ins></span> the
+    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if</em></ins></span> the user <span class="removed"><del><strong>must 
explicitly opt-in before the app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>didn't &ldquo;upload&rdquo; them 
to</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu 
photo-editing</strong></del></span>
 
@@ -1172,7 +1177,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/malware-mobiles.it.po        27 Oct 2018 08:28:53 -0000      
1.83
+++ proprietary/po/malware-mobiles.it.po        30 Oct 2018 15:28:29 -0000      
1.84
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -567,6 +567,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Spanish football streaming app <a href=\"https://boingboing.";
 "net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
 "movements and listens through the microphone</a>."

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/malware-mobiles.ja-diff.html 27 Oct 2018 08:28:53 -0000      
1.34
+++ proprietary/po/malware-mobiles.ja-diff.html 30 Oct 2018 15:28:29 -0000      
1.35
@@ -415,6 +415,12 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
@@ -1017,7 +1023,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/malware-mobiles.ja.po        27 Oct 2018 08:28:53 -0000      
1.71
+++ proprietary/po/malware-mobiles.ja.po        30 Oct 2018 15:28:29 -0000      
1.72
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -488,6 +488,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Spanish football streaming app <a href=\"https://boingboing.";
 "net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
 "movements and listens through the microphone</a>."

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/malware-mobiles.pot  27 Oct 2018 08:28:53 -0000      1.50
+++ proprietary/po/malware-mobiles.pot  30 Oct 2018 15:28:29 -0000      1.51
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -396,6 +396,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a "
+"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\";>
 "
+"track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Spanish football streaming app <a "
 
"href=\"https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html\";>tracks
 "
 "the user's movements and listens through the microphone</a>."

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary/po/malware-mobiles.ru.po        27 Oct 2018 15:27:40 -0000      
1.124
+++ proprietary/po/malware-mobiles.ru.po        30 Oct 2018 15:28:29 -0000      
1.125
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-10-27 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -572,6 +573,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Spanish football streaming app <a href=\"https://boingboing.";
 "net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
 "movements and listens through the microphone</a>."

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-surveillance.de-diff.html        27 Oct 2018 
08:28:53 -0000      1.13
+++ proprietary/po/proprietary-surveillance.de-diff.html        30 Oct 2018 
15:28:29 -0000      1.14
@@ -522,24 +522,12 @@
     Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Google did not intend to make these apps spy;</strong></del></span> 
<span class="inserted"><ins><em>spyware via
-    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>Windows installs.  Note that</em></ins></span> the 
<span class="removed"><del><strong>contrary, it
-    worked in various ways to prevent that, and deleted these apps
-    after discovering what they did. So we cannot blame Google
-    specifically for the snooping of these apps.&lt;/p&gt;
-
-  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</strong></del></span> <span 
class="inserted"><ins><em>specific
-    sabotage method Lenovo used did not affect GNU/Linux; also, a
+  &lt;p&gt;Google</strong></del></span> <span 
class="inserted"><ins><em>spyware via
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
+    sabotage method Lenovo used</em></ins></span> did not <span 
class="removed"><del><strong>intend</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility 
for the injustice of their
-    being nonfree. It also distributes</strong></del></span> its
-    own <span class="removed"><del><strong>nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -558,59 +546,63 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
-    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>no systematic way for Google, or Android
-    users, to inspect executable</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
-    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span> to <span 
class="removed"><del><strong>see what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> they
-    <span class="removed"><del><strong>do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>can't &ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>source code for these 
apps,</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to make <span 
class="removed"><del><strong>these apps spy; on</strong></del></span> <span 
class="inserted"><ins><em>sure they can't &ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>contrary, it
+    worked in various ways</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
-    &lt;p&gt;According to Edward Snowden, &lt;a
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>prevent that,</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>study</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the
-    <span class="removed"><del><strong>source code 
somehow</strong></del></span> <span class="inserted"><ins><em>microphone,
-    retrieve geo-location data from the GPS, take photographs, read
-    text messages, read call, location and web browsing history, and
-    read the contact list. This malware is designed</em></ins></span> to <span 
class="removed"><del><strong>determine whether they mistreat 
users</strong></del></span> <span class="inserted"><ins><em>disguise itself
+    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the <span 
class="removed"><del><strong>snooping of these apps.&lt;/p&gt;
+
+  &lt;p&gt;On</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
+    text messages, read call, location</em></ins></span> and
+    <span class="removed"><del><strong>therefore shares 
in</strong></del></span> <span class="inserted"><ins><em>web browsing history, 
and
+    read</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is designed to disguise 
itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311120"&gt;
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
-    The NSA can tap data</em></ins></span> in
-    <span class="removed"><del><strong>various ways. If it did a good job of 
this,</strong></del></span> <span class="inserted"><ins><em>smart phones, 
including iPhones,
+    The NSA can tap data in smart phones, including iPhones,
     Android, and BlackBerry&lt;/a&gt;.  While there is not much
-    detail here,</em></ins></span> it <span class="removed"><del><strong>could 
more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart</strong></del></span> <span 
class="inserted"><ins><em>seems that this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>checking.&lt;/p&gt;
-
-  &lt;p&gt;But since Google itself develops malicious 
apps,</strong></del></span> <span class="inserted"><ins><em>universal back door 
that</em></ins></span> we <span class="removed"><del><strong>cannot trust
-    Google to protect us. We must demand release</strong></del></span> <span 
class="inserted"><ins><em>know nearly all portable
-    phones have. It may involve exploiting various bugs.  There are &lt;a
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>injustice of their
+    being nonfree.</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    phones have.</em></ins></span> It <span class="removed"><del><strong>also 
distributes its own nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of <span class="removed"><del><strong>source code 
to</strong></del></span> <span class="inserted"><ins><em>bugs 
in</em></ins></span> the
-    <span class="removed"><del><strong>public, so we can 
depend</strong></del></span> <span class="inserted"><ins><em>phones' radio 
software&lt;/a&gt;.&lt;/p&gt;
+    lots</em></ins></span> of <span class="removed"><del><strong>preventing 
apps from
+    cheating?  There is no systematic way for Google, or Android
+    users, to inspect executable proprietary apps to see what they
+    do.&lt;/p&gt;
+
+  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>source code for these apps,</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location</em></ins></span> on <span 
class="removed"><del><strong>each other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>remote command, and users cannot stop
-    them&lt;/a&gt;. (The US says it will eventually require all new portable 
phones
-    to have GPS.)&lt;/p&gt;</em></ins></span>
+    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>study the
+    source code somehow to determine whether they 
mistreat</strong></del></span> users <span class="removed"><del><strong>in
+    various ways. If it did a good job of this,</strong></del></span> <span 
class="inserted"><ins><em>cannot stop
+    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>could more or less
+    prevent such snooping, except when</strong></del></span> <span 
class="inserted"><ins><em>will eventually require all new portable phones
+    to have GPS.)&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -620,40 +612,48 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing the iOS DRM.&lt;/p&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
+    href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+    illegal</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
+    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
-    &lt;p&gt;In</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>latest iThings system,
-    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>security
-    of 283 Android VPN apps concluded that &ldquo;in spite 
of</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the
-    <span class="removed"><del><strong>promises</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
+    &lt;p&gt;In the latest iThings system,
+    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>privacy, security, and anonymity given by the
-    majority of VPN apps&mdash;millions of users may</strong></del></span> 
<span class="inserted"><ins><em>you&mdash;&ldquo;We
-    know you want to</em></ins></span> be <span 
class="removed"><del><strong>unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>spied on&rdquo;.&lt;/p&gt;
+    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
+    know you want to be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
-    to <span class="removed"><del><strong>poor security guarantees and abusive 
practices inflicted by
+    to <span class="removed"><del><strong>protect us. We must demand release 
of source code</strong></del></span> <span class="inserted"><ins><em>use it 
without having your fingerprints taken. Users would have
+    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the
+    <span class="removed"><del><strong>public, so we can 
depend</strong></del></span> <span class="inserted"><ins><em>phone is 
snooping</em></ins></span> on <span class="removed"><del><strong>each 
other.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611170"&gt;
+    &lt;p&gt;iPhones</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated the privacy and security
+    of 283 Android VPN apps concluded that &ldquo;in spite of the
+    promises for privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of users may be unawarely subject
+    to poor security guarantees and abusive practices inflicted by
     VPN apps.&rdquo;&lt;/p&gt;
 
   &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
-    the research paper that tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>use it without having your fingerprints taken. Users 
would have
-    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201611170"&gt;
-    &lt;p&gt;iPhones &lt;a
-    
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
+    the research paper that tracks and infringes the 
privacy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
     lots</em></ins></span> of
     <span class="removed"><del><strong>users:&lt;/p&gt;
 
@@ -686,14 +686,14 @@
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> to <span 
class="removed"><del><strong>the
-      users.</strong></del></span> <span class="inserted"><ins><em>date on all 
your devices. Any edits you
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> to <span 
class="inserted"><ins><em>date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.)</em></ins></span> The 
<span class="removed"><del><strong>stated purpose of</strong></del></span> 
<span class="inserted"><ins><em>iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>JS 
injection</strong></del></span>
-    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span>
+    <span class="inserted"><ins><em>startup</em></ins></span> of <span 
class="removed"><del><strong>the JS injection</strong></del></span> <span 
class="inserted"><ins><em>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means 
&ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There</em></ins></span> is <span class="inserted"><ins><em>a 
way</em></ins></span> to <span class="removed"><del><strong>display
@@ -709,102 +709,109 @@
     surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
this <span class="removed"><del><strong>app have
-      confirmed that the non-premium version</strong></del></span> <span 
class="inserted"><ins><em>to &lt;a
+      confirmed that the non-premium version of the app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos</em></ins></span> of <span class="removed"><del><strong>the 
app does
-      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>many celebrities&lt;/a&gt;. They needed to break 
Apple's
-    security to get at them, but NSA can access any of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+    nude photos</em></ins></span> of <span class="removed"><del><strong>the 
top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+
+  &lt;p&gt;The article confusingly describes gratis apps as 
&ldquo;free&rdquo;,</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span 
class="removed"><del><strong>are not in fact</strong></del></span> <span 
class="inserted"><ins><em>through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>regularly 
does, &lt;a
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
+    &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>the state&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
-    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-    iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
     not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found that 90%</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="inserted"><ins><em>iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here 
is</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude to transmit users' 
personal
+       data</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401100"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>article confusingly 
describes gratis apps as &ldquo;free&rdquo;,
-  but most of them are not in fact</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
-  It also uses</strong></del></span> <span 
class="inserted"><ins><em>class="not-a-duplicate"
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>ugly word &ldquo;monetize&rdquo;. A good 
replacement
-  for that word</strong></del></span> <span class="inserted"><ins><em>NSA 
snoop on all the data in an iThing, or it</em></ins></span>
-    is <span class="removed"><del><strong>&ldquo;exploit&rdquo;; nearly always 
that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>totally 
incompetent&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span>
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201308080"&gt;
-    &lt;p&gt;The iThing also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one</strong></del></span> can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>be
-    turned off.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing, 
or it</em></ins></span>
+    is <span class="removed"><del><strong>not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that</strong></del></span>
+  &lt;li id="M201308080"&gt;
+    &lt;p&gt;The iThing also &lt;a
+    
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on</strong></del></span> 
<span class="inserted"><ins><em>can be
+    turned off.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to</em></ins></span> track 
<span class="removed"><del><strong>users by</strong></del></span> <span 
class="inserted"><ins><em>users, which is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or 
played</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled</em></ins></span> by <span class="removed"><del><strong>TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default&lt;/a&gt;.  (That article talks about iOS 6, 
but it is
-    still true in iOS 7.)&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201210170"&gt;
+    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
+    
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
+    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit users' personal
-       data</strong></del></span>
+  &lt;li id="M201204280"&gt;
+    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
-    to <span class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that</strong></del></span> install <span 
class="inserted"><ins><em>even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</strong></del></span> <span class="inserted"><ins><em>verification code 
Apple sends</em></ins></span>
-    to <span class="removed"><del><strong>legitimize actions like this.  At 
this point, most users have
-stopped reading the &ldquo;Terms and Conditions&rdquo; that spell out
-what they are &ldquo;consenting&rdquo; to.</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
+    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>receiving 
the verification code Apple sends
+    to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -816,21 +823,17 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for</em></ins></span> Google <span 
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Android tracks location for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
     even when &ldquo;location services&rdquo; are turned off, even 
when</em></ins></span>
-    the <span class="removed"><del><strong>information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>phone 
has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots</em></ins></span> of <span 
class="removed"><del><strong>hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -879,79 +882,93 @@
     Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
     
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
     the <span class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
-  just as wrong as any other snooping.&lt;/p&gt;
+  legitimate, but</strong></del></span> <span class="inserted"><ins><em>FBI 
can remotely activate the GPS and microphone in Android phones
+    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here is 
&lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
-    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt;.  (I suspect this means Windows 
laptops.)  Here is &lt;a
-    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
-    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
-    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
+
+  &lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is <span 
class="inserted"><ins><em>present in some Android devices when they are
+    sold.  Some Motorola phones, made when this company was owned
+    by Google, use a modified version of Android</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      <span class="removed"><del><strong>send</strong></del></span>
-    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone &lt;a
+    
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app</em></ins></span> developers 
<span class="removed"><del><strong>have no right</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to
+  <span class="removed"><del><strong>analyze what</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most</em></ins></span> users <span class="removed"><del><strong>are 
doing or how.  &ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>have stopped
+    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>spell out what
+    they</em></ins></span> are
+  <span class="removed"><del><strong>just as wrong as any other 
snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>&ldquo;consenting&rdquo; to.  Google should 
clearly</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span>
+    <span class="inserted"><ins><em>honestly identify</em></ins></span> the 
<span class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, instead of
+    hiding it</em></ins></span> in <span class="removed"><del><strong>some 
Android devices when they are sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
+
+    &lt;p&gt;However,</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send</strong></del></span> <span class="inserted"><ins><em>truly protect 
people's privacy, we must prevent Google
+    and other companies from getting this</em></ins></span> personal <span 
class="removed"><del><strong>data to 
Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>information in the
+    first place!&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201111170"&gt;
+    &lt;p&gt;Some</em></ins></span> manufacturers add a &lt;a
+    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+    hidden general surveillance package such as Carrier <span 
class="removed"><del><strong>IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
-&lt;!-- #SpywareOnMobiles --&gt;
+<span class="removed"><del><strong>&lt;!-- #SpywareOnMobiles --&gt;
 &lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span <span 
class="removed"><del><strong>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  
At</em></ins></span> this
-      <span class="removed"><del><strong>would require circumventing the iOS 
DRM.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>point, most users have stopped
-    reading</em></ins></span> the <span class="removed"><del><strong>latest 
iThings system, &ldquo;turning off&rdquo; WiFi</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;Terms</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the
-      <span class="removed"><del><strong>obvious way &lt;a
+  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
+      obvious way &lt;a
  
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
@@ -960,26 +977,8 @@
   
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However,</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information 
in</em></ins></span> the <span class="removed"><del><strong>phone is 
snooping</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201111170"&gt;
-    &lt;p&gt;Some manufacturers add a &lt;a
-    
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general surveillance package such as Carrier IQ&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+      &mdash; which would mean no way to use it without having your 
fingerprints
+      taken. Users would have no way to tell whether the phone is 
snooping</strong></del></span> <span 
class="inserted"><ins><em>class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
@@ -1028,21 +1027,26 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
       without giving a valid email address and receiving</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>user's 
location even when users disable &ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> of <span 
class="removed"><del><strong>the most popular iOS</strong></del></span> <span 
class="inserted"><ins><em>users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="inserted"><ins><em>on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
         href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>other kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
+       behavioral and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's</em></ins></span> location <span 
class="removed"><del><strong>information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>even when users disable &ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> <span 
class="inserted"><ins><em>location
     tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>will 
be tricked by the misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -2986,7 +2990,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary/po/proprietary-surveillance.de.po       27 Oct 2018 08:28:53 
-0000      1.239
+++ proprietary/po/proprietary-surveillance.de.po       30 Oct 2018 15:28:29 
-0000      1.240
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1778,6 +1778,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Google apps on Android <a href=\"https://www.theguardian.com/";
 "technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
 "record the user's location even when users disable &ldquo;location "

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- proprietary/po/proprietary-surveillance.fr.po       27 Oct 2018 08:48:58 
-0000      1.333
+++ proprietary/po/proprietary-surveillance.fr.po       30 Oct 2018 15:28:29 
-0000      1.334
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-10-27 10:48+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1347,6 +1348,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Google apps on Android <a href=\"https://www.theguardian.com/";
 "technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
 "record the user's location even when users disable &ldquo;location "

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary-surveillance.it-diff.html        27 Oct 2018 
08:28:53 -0000      1.80
+++ proprietary/po/proprietary-surveillance.it-diff.html        30 Oct 2018 
15:28:29 -0000      1.81
@@ -1048,16 +1048,10 @@
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
     report even which page</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
         for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1074,6 +1068,18 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>what radio and TV programs</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
@@ -1171,27 +1177,26 @@
     <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of whether the app 
developers get</strong></del></span> <span class="inserted"><ins><em>designed 
so that</em></ins></span> users <span class="inserted"><ins><em>communicate 
such info</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That is no excuse for malware.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>each
-    other but not to the server's database.&lt;/p&gt;</em></ins></span>
+    It could</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question of 
whether</strong></del></span> <span class="inserted"><ins><em>designed so that 
users communicate such info to each
+    other but not to</em></ins></span> the <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass</em></ins></span> app
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
-    spy on users even more than users expected. It &lt;a
+  &lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass</em></ins></span> app <span 
class="removed"><del><strong>developers get</strong></del></span> <span 
class="inserted"><ins><em>and dis-service
+    spy on</em></ins></span> users <span class="removed"><del><strong>to say 
&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>even 
more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store</em></ins></span> by 
<span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1253,12 +1258,18 @@
     the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>source code 
somehow</em></ins></span> to <span class="removed"><del><strong>spy 
through</strong></del></span> <span class="inserted"><ins><em>determine whether 
they mistreat users in
     various ways. If</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
       Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>did a good job of this, it 
could</em></ins></span> more <span class="removed"><del><strong>spyware 
apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA</strong></del></span> <span class="inserted"><ins><em>or 
less
-    prevent such snooping, except when the</em></ins></span> app <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+      More about NSA</strong></del></span> <span class="inserted"><ins><em>did 
a good job of this, it could more or less
+    prevent such snooping, except when the</em></ins></span> app <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1268,79 +1279,73 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>developers 
are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
+    on users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    don't snoop.&lt;/p&gt;
+
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</em></ins></span>
+    to <span class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
+      a speech recognition company based</strong></del></span> <span 
class="inserted"><ins><em>ultrasound from beacons placed</em></ins></span> in 
<span class="removed"><del><strong>the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+      can remotely control the toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech, and even speak
-      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>do lots of surveillance, judging by &lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access it demands to personal data</em></ins></span> in <span 
class="removed"><del><strong>on a child's speech, and even speak
+      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;A computerized vibrator</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</em></ins></span>
-    on <span class="removed"><del><strong>its users through the proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>users through</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The</strong></del></span> app <span 
class="removed"><del><strong>was reporting</strong></del></span> <span 
class="inserted"><ins><em>would record</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it</strong></del></span> <span 
class="inserted"><ins><em>audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
     
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;The suit accuses that this</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>done without</em></ins></span> the <span 
class="removed"><del><strong>vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>users' 
consent.
+    If</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With</em></ins></span> free software <span 
class="removed"><del><strong>which</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> users could <span 
class="removed"><del><strong>have
+      their products, rather than free software which users could have
       checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;make sure&lt;/em&gt;</em></ins></span> that 
<span class="removed"><del><strong>made the vibrator</strong></del></span> 
<span class="inserted"><ins><em>they
-    don't snoop.&lt;/p&gt;
-
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>fine print of</em></ins></span> the <span 
class="removed"><del><strong>vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued</strong></del></span> <span class="inserted"><ins><em>app said 
that users gave consent</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>this,
+    would</em></ins></span> that <span 
class="inserted"><ins><em>make</em></ins></span> it <span 
class="removed"><del><strong>was anonymizing the data may</strong></del></span> 
<span class="inserted"><ins><em>acceptable? No way! It should</em></ins></span> 
be
+      <span class="removed"><del><strong>true, but it doesn't really matter. 
If it had sold the data to a
+      data broker, the data broker would have been able to 
figure</strong></del></span> <span 
class="inserted"><ins><em>flat</em></ins></span> out
+      <span class="removed"><del><strong>who the user was.&lt;/p&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do</em></ins></span> lots of <span 
class="removed"><del><strong>personal information about</strong></del></span> 
<span class="inserted"><ins><em>surveillance, judging by &lt;a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;</em></ins></span>
-    how
-       <span class="removed"><del><strong>people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that</strong></del></span> <span 
class="inserted"><ins><em>much access</em></ins></span> it <span 
class="removed"><del><strong>was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>demands to personal</em></ins></span> data <span 
class="removed"><del><strong>may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>data to</strong></del></span> <span 
class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a
-      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>data broker</strong></del></span> 
<span class="inserted"><ins><em>app</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>record the names of the audio files users 
listen</em></ins></span> to <span class="removed"><del><strong>figure out
-      who</strong></del></span>
-    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses that</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    &lt;p&gt;Following this lawsuit,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
     the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> to <span 
class="removed"><del><strong>pay a total</strong></del></span> <span 
class="inserted"><ins><em>snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1382,12 +1387,12 @@
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;!-- WEBMASTERS: make sure to place</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data</em></ins></span> to <span class="removed"><del><strong>place 
new items on top under each subsection --&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
@@ -1699,17 +1704,17 @@
     good deal of personal data&lt;/a&gt;, including lots of activities which
     have nothing to do with cheating.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareAtLowLevel"&gt;Spyware 
at Low Level&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
     
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
@@ -1720,11 +1725,11 @@
     &lt;p&gt;It is unfortunate that the article uses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
+  &lt;h4 id="SpywareInTVSets"&gt;TV Sets&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
@@ -1786,7 +1791,7 @@
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance by default.&lt;/p&gt;
+    users to</em></ins></span> new <span 
class="removed"><del><strong>items</strong></del></span> <span 
class="inserted"><ins><em>combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
@@ -1798,7 +1803,17 @@
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
+    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>what programs people watch, and even what they wanted 
to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2790,7 +2805,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary/po/proprietary-surveillance.it.po       27 Oct 2018 08:28:53 
-0000      1.252
+++ proprietary/po/proprietary-surveillance.it.po       30 Oct 2018 15:28:29 
-0000      1.253
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1702,6 +1702,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Google apps on Android <a href=\"https://www.theguardian.com/";
 "technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
 "record the user's location even when users disable &ldquo;location "

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary-surveillance.ja-diff.html        27 Oct 2018 
08:28:53 -0000      1.91
+++ proprietary/po/proprietary-surveillance.ja-diff.html        30 Oct 2018 
15:28:29 -0000      1.92
@@ -921,26 +921,23 @@
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;</em></ins></span>
     the <span class="removed"><del><strong>user's consent&rdquo;
         for surveillance is inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>e-reader used by most US 
libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>e-reader used by most US libraries, &lt;a
+    
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
     send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
     needed to check DRM!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on</strong></del></span>
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the 
Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
 they
-    report even which page the user reads at</em></ins></span> what <span 
class="removed"><del><strong>radio and TV programs 
-      are playing nearby&lt;/a&gt;.  Also</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -956,15 +953,22 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>what radio and TV programs</strong></del></span> 
<span class="inserted"><ins><em>Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on 
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn 
off the other kinds of location
+    tracking, but most</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo</strong></del></span>
@@ -997,12 +1001,12 @@
       algorithms.&lt;/p&gt;
 
       &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users' 
pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>the 
service.&lt;/p&gt;
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+      is based</strong></del></span> <span class="inserted"><ins><em>apps were
+    found to insecurely snitch</em></ins></span> on <span 
class="inserted"><ins><em>its users.  Furthermore, they could
     detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>malware 
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
@@ -1011,9 +1015,9 @@
     their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>snooping). In August
       2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span 
class="removed"><del><strong>submit</strong></del></span>
-    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting to realize that it is nasty.&lt;/p&gt;
+      demanded</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="removed"><del><strong>realize that it is nasty.&lt;/p&gt;
 
       &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
     Android by</em></ins></span> &lt;a
@@ -1057,16 +1061,15 @@
     other but not to the server's database.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>moviepass</em></ins></span> app <span 
class="removed"><del><strong>because it asked the user</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
+  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass</em></ins></span> app
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use</strong></del></span> 
<span class="inserted"><ins><em>and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
@@ -1075,23 +1078,24 @@
     &lt;p&gt;Tracking software in popular Android apps
     is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
+    follow a user's movements around a physical store</em></ins></span> by 
<span 
class="removed"><del><strong>companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
+  &lt;li id="M201708270"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span 
class="inserted"><ins><em>Sarahah</em></ins></span> app <span 
class="removed"><del><strong>because it asked</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book</em></ins></span> to <span class="inserted"><ins><em>developer's 
server.  Note that this article misuses</em></ins></span> the <span 
class="removed"><del><strong>app developer but</strong></del></span> <span 
class="inserted"><ins><em>words
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;
+    referring</em></ins></span> to
+      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>the app developer but</strong></del></span> 
<span class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Google</em></ins></span> did not
       <span class="removed"><del><strong>ask about 
sending</strong></del></span> <span class="inserted"><ins><em>intend to make 
these apps spy; on the contrary,</em></ins></span> it
@@ -1150,8 +1154,7 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled vibrators &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
+   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
@@ -1160,19 +1163,20 @@
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps</em></ins></span> for <span 
class="removed"><del><strong>collecting</strong></del></span> <span 
class="inserted"><ins><em>BART &lt;a
+    &lt;p&gt;Apps for BART &lt;a
     
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
     on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>makes 
internet-controlled vibrators</strong></del></span> <span 
class="inserted"><ins><em>they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1241,7 +1245,7 @@
   &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+Lenovo stealthily installed crapware</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1511,16 +1515,16 @@
     &lt;p&gt;Red Shell is a spyware that
     is found in many proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users' computers 
and sends it to third parties&lt;/a&gt;.&lt;/p&gt;
+    tracks data on users' computers</em></ins></span> and <span 
class="inserted"><ins><em>sends it to third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
-    &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
+    &lt;p&gt;ArenaNet surreptitiously installed a</em></ins></span> spyware 
<span class="removed"><del><strong>via BIOS&lt;/a&gt;</strong></del></span>
+    <span class="inserted"><ins><em>program along with an update to the massive
     multiplayer game Guild War 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>all open processes 
running on its user's computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
@@ -2626,7 +2630,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary/po/proprietary-surveillance.ja.po       27 Oct 2018 08:28:53 
-0000      1.225
+++ proprietary/po/proprietary-surveillance.ja.po       30 Oct 2018 15:28:29 
-0000      1.226
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1406,6 +1406,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Google apps on Android <a href=\"https://www.theguardian.com/";
 "technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
 "record the user's location even when users disable &ldquo;location "

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary/po/proprietary-surveillance.pot 27 Oct 2018 08:28:53 -0000      
1.174
+++ proprietary/po/proprietary-surveillance.pot 30 Oct 2018 15:28:29 -0000      
1.175
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -954,6 +954,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a "
+"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\";>
 "
+"track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Google apps on Android <a "
 
"href=\"https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile\";>
 "
 "record the user's location even when users disable &ldquo;location "

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.422
retrieving revision 1.423
diff -u -b -r1.422 -r1.423
--- proprietary/po/proprietary-surveillance.ru.po       27 Oct 2018 15:27:40 
-0000      1.422
+++ proprietary/po/proprietary-surveillance.ru.po       30 Oct 2018 15:28:29 
-0000      1.423
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-10-26 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1335,6 +1336,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Google apps on Android <a href=\"https://www.theguardian.com/";
 "technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
 "record the user's location even when users disable &ldquo;location "

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary.de.po    30 Oct 2018 02:27:47 -0000      1.60
+++ proprietary/po/proprietary.de.po    30 Oct 2018 15:28:29 -0000      1.61
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -423,6 +423,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -474,44 +480,6 @@
 "hijacks the CPU in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary.es.po    30 Oct 2018 02:27:47 -0000      1.59
+++ proprietary/po/proprietary.es.po    30 Oct 2018 15:28:29 -0000      1.60
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-09-19 10:49+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -436,6 +436,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -487,44 +493,6 @@
 "hijacks the CPU in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/proprietary.fr.po    30 Oct 2018 11:40:11 -0000      1.71
+++ proprietary/po/proprietary.fr.po    30 Oct 2018 15:28:29 -0000      1.72
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-10-30 12:39+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -290,6 +291,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -369,67 +376,6 @@
 "systems-with-\">comprenait un « mineur »</a>, c'est-à-dire un 
exécutable qui "
 "pirate le processeur de l'ordinateur client pour générer une cryptomonnaie."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-"Un cracker a exploité une faille dans un logiciel non mis à jour <a href="
-"\"https://www.pcmag.com/news/360968/400-websites-secretly-served-";
-"cryptocurrency-miners-to-visito\">pour injecter un « mineur » dans les 
pages "
-"web</a> servies aux visiteurs. Ce type de maliciel pirate le processeur de "
-"l'ordinateur pour générer une cryptomonnaie. (Notez que l'article se 
réfère "
-"au logiciel infecté sous le nom de « système de gestion de contenu ». 
Il "
-"aurait été plus correct de l'appeler « <a 
href=\"/philosophy/words-to-avoid."
-"html#Content\">système de révision pour site web</a> ».)"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-"Comme le mineur était un programme JavaScript, les visiteurs n'auraient pas "
-"été affectés s'ils avaient utilisé <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Il existe également plusieurs extensions de navigateurs qui "
-"<a href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-";
-"to-mine-coins/\">bloquent spécifiquement les mineurs JavaScript</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Les thermostats « intelligents » d'Honeywell communiquent par "
-"l'intermédiaire du serveur de la société. Ils ont toutes les "
-"caractéristiques de ce genre d'appareil : <a href=\"https://www.";
-"businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
-"particulier ou de tous les utilisateurs en même temps), sans compter le "
-"risque de panne du serveur (c'est ce qui vient d'arriver)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"De plus, le réglage de la température se fait au moyen d'un logiciel non "
-"libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
-"thermostat."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -507,6 +453,65 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "A cracker used an exploit in outdated software to <a href=\"https://www.";
+#~ "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
+#~ "to-visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to "
+#~ "visitors. This type of malware hijacks the computer's processor to mine a "
+#~ "cryptocurrency. (Note that the article refers to the infected software as "
+#~ "&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
+#~ "href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
+#~ "a>&rdquo;.)"
+#~ msgstr ""
+#~ "Un cracker a exploité une faille dans un logiciel non mis à jour <a 
href="
+#~ "\"https://www.pcmag.com/news/360968/400-websites-secretly-served-";
+#~ "cryptocurrency-miners-to-visito\">pour injecter un « mineur » dans les 
"
+#~ "pages web</a> servies aux visiteurs. Ce type de maliciel pirate le "
+#~ "processeur de l'ordinateur pour générer une cryptomonnaie. (Notez que "
+#~ "l'article se réfère au logiciel infecté sous le nom de « système de "
+#~ "gestion de contenu ». Il aurait été plus correct de l'appeler « <a 
href="
+#~ "\"/philosophy/words-to-avoid.html#Content\">système de révision pour 
site "
+#~ "web</a> ».)"
+
+#~ msgid ""
+#~ "Since the miner was a nonfree JavaScript program, visitors wouldn't have "
+#~ "been affected if they had used <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.";
+#~ "com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "specifically block JavaScript miners</a> are also available."
+#~ msgstr ""
+#~ "Comme le mineur était un programme JavaScript, les visiteurs n'auraient "
+#~ "pas été affectés s'ils avaient utilisé <a 
href=\"/software/librejs/index."
+#~ "html\">LibreJS</a>. Il existe également plusieurs extensions de "
+#~ "navigateurs qui <a href=\"https://www.cnet.com/how-to/how-to-stop-sites-";
+#~ "from-using-your-cpu-to-mine-coins/\">bloquent spécifiquement les mineurs "
+#~ "JavaScript</a>."
+
+#~ msgid ""
+#~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Les thermostats « intelligents » d'Honeywell communiquent par "
+#~ "l'intermédiaire du serveur de la société. Ils ont toutes les "
+#~ "caractéristiques de ce genre d'appareil : <a href=\"https://www.";
+#~ "businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
+#~ "particulier ou de tous les utilisateurs en même temps), sans compter le "
+#~ "risque de panne du serveur (c'est ce qui vient d'arriver)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "De plus, le réglage de la température se fait au moyen d'un logiciel non 
"
+#~ "libre. Avec un thermostat traditionnel, on peut le faire directement sur "
+#~ "le thermostat."
+
+#~ msgid ""
 #~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 #~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
 #~ "hide voice commands in other audio</a>, so that people cannot hear them, "

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary.it-diff.html     30 Oct 2018 02:27:47 -0000      
1.18
+++ proprietary/po/proprietary.it-diff.html     30 Oct 2018 15:28:29 -0000      
1.19
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -38,19 +38,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 40em; }
-&lt;/style&gt;</em></ins></span>
+#TOC { width: 40em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -154,10 +154,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -179,6 +179,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
@@ -219,38 +225,6 @@
     included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
     the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201805080"&gt;
-    &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
-    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
-    inject a &ldquo;miner&rdquo; in web pages&lt;/a&gt; served to visitors. 
This
-    type of malware hijacks the computer's processor to mine a
-    cryptocurrency. (Note that the article refers to the infected software
-    as &ldquo;content management system&rdquo;. A better term would be
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#Content"&gt;website
-    revision system&lt;/a&gt;&rdquo;.)&lt;/p&gt;
-
-    &lt;p&gt;Since the miner was a nonfree JavaScript program,
-    visitors wouldn't have been affected if they had used &lt;a
-    href="/software/librejs/index.html"&gt;LibreJS&lt;/a&gt;. Some
-    browser extensions that &lt;a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"&gt;
-    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices: &lt;a
-    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as the risk of an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +285,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/proprietary.it.po    30 Oct 2018 02:27:47 -0000      1.69
+++ proprietary/po/proprietary.it.po    30 Oct 2018 15:28:29 -0000      1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -427,6 +427,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -478,44 +484,6 @@
 "hijacks the CPU in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary.ja-diff.html     30 Oct 2018 02:27:47 -0000      
1.20
+++ proprietary/po/proprietary.ja-diff.html     30 Oct 2018 15:28:29 -0000      
1.21
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,8 +40,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -93,17 +93,17 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -152,10 +152,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -176,6 +176,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
@@ -216,38 +222,6 @@
     included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
     the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201805080"&gt;
-    &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
-    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
-    inject a &ldquo;miner&rdquo; in web pages&lt;/a&gt; served to visitors. 
This
-    type of malware hijacks the computer's processor to mine a
-    cryptocurrency. (Note that the article refers to the infected software
-    as &ldquo;content management system&rdquo;. A better term would be
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#Content"&gt;website
-    revision system&lt;/a&gt;&rdquo;.)&lt;/p&gt;
-
-    &lt;p&gt;Since the miner was a nonfree JavaScript program,
-    visitors wouldn't have been affected if they had used &lt;a
-    href="/software/librejs/index.html"&gt;LibreJS&lt;/a&gt;. Some
-    browser extensions that &lt;a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"&gt;
-    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices: &lt;a
-    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as the risk of an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -308,7 +282,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary.ja.po    30 Oct 2018 02:27:47 -0000      1.52
+++ proprietary/po/proprietary.ja.po    30 Oct 2018 15:28:29 -0000      1.53
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -349,6 +349,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -400,44 +406,6 @@
 "hijacks the CPU in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary.nl-diff.html     30 Oct 2018 02:27:47 -0000      
1.18
+++ proprietary/po/proprietary.nl-diff.html     30 Oct 2018 15:28:29 -0000      
1.19
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -38,19 +38,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 40em; }
-&lt;/style&gt;</em></ins></span>
+#TOC { width: 40em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -179,6 +179,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
@@ -219,38 +225,6 @@
     included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
     the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201805080"&gt;
-    &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
-    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
-    inject a &ldquo;miner&rdquo; in web pages&lt;/a&gt; served to visitors. 
This
-    type of malware hijacks the computer's processor to mine a
-    cryptocurrency. (Note that the article refers to the infected software
-    as &ldquo;content management system&rdquo;. A better term would be
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#Content"&gt;website
-    revision system&lt;/a&gt;&rdquo;.)&lt;/p&gt;
-
-    &lt;p&gt;Since the miner was a nonfree JavaScript program,
-    visitors wouldn't have been affected if they had used &lt;a
-    href="/software/librejs/index.html"&gt;LibreJS&lt;/a&gt;. Some
-    browser extensions that &lt;a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"&gt;
-    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices: &lt;a
-    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as the risk of an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +285,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary.nl.po    30 Oct 2018 02:27:47 -0000      1.42
+++ proprietary/po/proprietary.nl.po    30 Oct 2018 15:28:29 -0000      1.43
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -420,6 +420,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -471,44 +477,6 @@
 "hijacks the CPU in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary.pl-diff.html     30 Oct 2018 02:27:47 -0000      
1.36
+++ proprietary/po/proprietary.pl-diff.html     30 Oct 2018 15:28:29 -0000      
1.37
@@ -40,8 +40,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -85,8 +85,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
-instances of malicious functionalities (with more than 400 references to
+&lt;p&gt;As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -122,17 +122,17 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -177,6 +177,12 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
@@ -217,38 +223,6 @@
     included a &ldquo;miner&rdquo;&lt;/a&gt;, i.e. an executable that hijacks
     the CPU in users' computers to mine a cryptocurrency.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201805080"&gt;
-    &lt;p&gt;A cracker used an exploit in outdated software to &lt;a
-    
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito"&gt;
-    inject a &ldquo;miner&rdquo; in web pages&lt;/a&gt; served to visitors. 
This
-    type of malware hijacks the computer's processor to mine a
-    cryptocurrency. (Note that the article refers to the infected software
-    as &ldquo;content management system&rdquo;. A better term would be
-    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#Content"&gt;website
-    revision system&lt;/a&gt;&rdquo;.)&lt;/p&gt;
-
-    &lt;p&gt;Since the miner was a nonfree JavaScript program,
-    visitors wouldn't have been affected if they had used &lt;a
-    href="/software/librejs/index.html"&gt;LibreJS&lt;/a&gt;. Some
-    browser extensions that &lt;a
-    
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/"&gt;
-    specifically block JavaScript miners&lt;/a&gt; are also 
available.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through the company's server. They have
-    all the nasty characteristics of such devices: &lt;a
-    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger of sabotage&lt;/a&gt; (of a specific user, or of
-    all users at once), as well as the risk of an outage (which is what
-    just happened).&lt;/p&gt;
-
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat, you can do it
-    using controls right on the thermostat.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -309,7 +283,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary.pl.po    30 Oct 2018 02:27:48 -0000      1.37
+++ proprietary/po/proprietary.pl.po    30 Oct 2018 15:28:29 -0000      1.38
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -501,6 +501,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -552,44 +558,6 @@
 "hijacks the CPU in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary.pot      30 Oct 2018 02:27:48 -0000      1.34
+++ proprietary/po/proprietary.pot      30 Oct 2018 15:28:30 -0000      1.35
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -241,6 +241,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a "
+"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\";>
 "
+"track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a "
 
"href=\"https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\";>degrade
 "
 "the performance of older phones to force users to buy their newer "
@@ -292,46 +299,6 @@
 "in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a "
-"href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\";>
 "
-"inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. This type "
-"of malware hijacks the computer's processor to mine a cryptocurrency. (Note "
-"that the article refers to the infected software as &ldquo;content "
-"management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision "
-"system</a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a "
-"href=\"/software/librejs/index.html\">LibreJS</a>. Some browser extensions "
-"that <a "
-"href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\";>
 "
-"specifically block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a "
-"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\";>
 "
-"surveillance, and danger of sabotage</a> (of a specific user, or of all "
-"users at once), as well as the risk of an outage (which is what just "
-"happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary.pt-br.po 30 Oct 2018 02:27:48 -0000      1.21
+++ proprietary/po/proprietary.pt-br.po 30 Oct 2018 15:28:30 -0000      1.22
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-10-29 13:02-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -294,6 +294,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -369,67 +375,6 @@
 "executável que sequestra a CPU nos computadores dos usuários para minerar "
 "uma criptomoeda."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-"Um cracker usou um exploit em software desatualizado para <a href=\"https://";
-"www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-"to-visito\"> injetar um “minerador” em páginas da web</a> servidas aos "
-"visitantes. Esse tipo de malware sequestra o processador do computador para "
-"minerar uma criptomoeda. (Observe que o artigo se refere ao software "
-"infectado como “sistema de gerenciamento de conteúdo”. Um termo melhor 
seria "
-"“<a href=\"/philosophy/words-to-avoid.html#Content\">sistema de revisão de 
"
-"web sites</a>”.)"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-"Como o minerador era um programa JavaScript não livre, os visitantes não "
-"seriam afetados se tivessem usado o <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Algumas extensões de navegador que <a href=\"https://www.";
-"cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
-"bloqueiam especificamente os mineradores em JavaScript</a> também estão "
-"disponíveis."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Termostatos “inteligentes” da Honeywell se comunicam apenas através do "
-"servidor da empresa. Eles têm todas as características desagradáveis de 
tais "
-"dispositivos: <a href=\"https://www.businessinsider.com/honeywell-iot-";
-"thermostats-server-outage-2018-9\">vigilância e perigo de sabotagem</a> (de "
-"um usuário específico ou de todos os usuários ao mesmo tempo), bem como o "
-"risco de uma indisponibilidade (que foi o que aconteceu)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"Além disso, definir a temperatura desejada requer a execução de software 
não "
-"livre. Com um termostato antiquado, você pode fazê-lo usando controles "
-"diretamente no termostato."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -508,6 +453,63 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "A cracker used an exploit in outdated software to <a href=\"https://www.";
+#~ "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
+#~ "to-visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to "
+#~ "visitors. This type of malware hijacks the computer's processor to mine a "
+#~ "cryptocurrency. (Note that the article refers to the infected software as "
+#~ "&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
+#~ "href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
+#~ "a>&rdquo;.)"
+#~ msgstr ""
+#~ "Um cracker usou um exploit em software desatualizado para <a href="
+#~ "\"https://www.pcmag.com/news/360968/400-websites-secretly-served-";
+#~ "cryptocurrency-miners-to-visito\"> injetar um “minerador” em páginas 
da "
+#~ "web</a> servidas aos visitantes. Esse tipo de malware sequestra o "
+#~ "processador do computador para minerar uma criptomoeda. (Observe que o "
+#~ "artigo se refere ao software infectado como “sistema de gerenciamento de 
"
+#~ "conteúdo”. Um termo melhor seria “<a 
href=\"/philosophy/words-to-avoid."
+#~ "html#Content\">sistema de revisão de web sites</a>”.)"
+
+#~ msgid ""
+#~ "Since the miner was a nonfree JavaScript program, visitors wouldn't have "
+#~ "been affected if they had used <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.";
+#~ "com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "specifically block JavaScript miners</a> are also available."
+#~ msgstr ""
+#~ "Como o minerador era um programa JavaScript não livre, os visitantes não 
"
+#~ "seriam afetados se tivessem usado o <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Algumas extensões de navegador que <a href=\"https://www.";
+#~ "cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "bloqueiam especificamente os mineradores em JavaScript</a> também estão "
+#~ "disponíveis."
+
+#~ msgid ""
+#~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Termostatos “inteligentes” da Honeywell se comunicam apenas através 
do "
+#~ "servidor da empresa. Eles têm todas as características desagradáveis de 
"
+#~ "tais dispositivos: <a href=\"https://www.businessinsider.com/honeywell-";
+#~ "iot-thermostats-server-outage-2018-9\">vigilância e perigo de sabotagem</"
+#~ "a> (de um usuário específico ou de todos os usuários ao mesmo tempo), 
bem "
+#~ "como o risco de uma indisponibilidade (que foi o que aconteceu)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "Além disso, definir a temperatura desejada requer a execução de 
software "
+#~ "não livre. Com um termostato antiquado, você pode fazê-lo usando "
+#~ "controles diretamente no termostato."
+
+#~ msgid ""
 #~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 #~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
 #~ "hide voice commands in other audio</a>, so that people cannot hear them, "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary/po/proprietary.ru.po    30 Oct 2018 05:58:21 -0000      1.94
+++ proprietary/po/proprietary.ru.po    30 Oct 2018 15:28:30 -0000      1.95
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-10-30 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -294,6 +295,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -374,68 +381,6 @@
 "которая захватывала процессор в 
компьютере пользователя, чтобы получать "
 "криптовалюту."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-"Взломщик воспользовался брешью в 
необновленной программе для <a href="
-"\"https://www.pcmag.com/news/360968/400-websites-secretly-served-";
-"cryptocurrency-miners-to-visito\"> вставки 
&ldquo;майнера&rdquo; на "
-"страницах сайта</a>, передаваемых 
посетителям. Такого рода вредоносные "
-"программы захватывают процессор 
компьютера, чтобы вырабатывать 
криптовалюту. "
-"(Обращаем ваше внимание, что в статье 
зараженные программы называются &ldquo;"
-"системой управления контентом&rdquo;. Лучшим 
называнием было бы &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">система 
редактирования "
-"сайтов</a>&rdquo;.)"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-"Поскольку &ldquo;майнер&rdquo; был несвободной 
программой на JavaScript, "
-"посетители не были бы подвержены 
злоупотреблению, если бы они применяли <a "
-"href=\"/software/librejs/index.html\">LibreJS</a>. Есть также 
расширения "
-"браузеров, <a 
href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-";
-"using-your-cpu-to-mine-coins/\"> созданные специально 
для блокировки "
-"майнеров на JavaScript</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"&ldquo;Интеллектуальные&rdquo; термостаты Honeywell 
связываются только с "
-"сервером компании. У них есть все скверные 
черты таких устройств: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> слежка и опасность саботажа</a> 
(конкретного пользователя и "
-"всех пользователей сразу), а также риск 
перерывов в работе (именно это и "
-"произошло)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"Кроме того, установка требуемой 
температуры требует несвободных программ. 
В "
-"старомодных термостатах это делается с 
помощью органов управления прямо на "
-"термостате."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -515,6 +460,64 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "A cracker used an exploit in outdated software to <a href=\"https://www.";
+#~ "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
+#~ "to-visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to "
+#~ "visitors. This type of malware hijacks the computer's processor to mine a "
+#~ "cryptocurrency. (Note that the article refers to the infected software as "
+#~ "&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
+#~ "href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
+#~ "a>&rdquo;.)"
+#~ msgstr ""
+#~ "Взломщик воспользовался брешью в 
необновленной программе для <a href="
+#~ "\"https://www.pcmag.com/news/360968/400-websites-secretly-served-";
+#~ "cryptocurrency-miners-to-visito\"> вставки 
&ldquo;майнера&rdquo; на "
+#~ "страницах сайта</a>, передаваемых 
посетителям. Такого рода вредоносные "
+#~ "программы захватывают процессор 
компьютера, чтобы вырабатывать "
+#~ "криптовалюту. (Обращаем ваше внимание, 
что в статье зараженные программы "
+#~ "называются &ldquo;системой управления 
контентом&rdquo;. Лучшим называнием "
+#~ "было бы &ldquo;<a href=\"/philosophy/words-to-avoid.html#Content"
+#~ "\">система редактирования сайтов</a>&rdquo;.)"
+
+#~ msgid ""
+#~ "Since the miner was a nonfree JavaScript program, visitors wouldn't have "
+#~ "been affected if they had used <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.";
+#~ "com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "specifically block JavaScript miners</a> are also available."
+#~ msgstr ""
+#~ "Поскольку &ldquo;майнер&rdquo; был 
несвободной программой на JavaScript, "
+#~ "посетители не были бы подвержены 
злоупотреблению, если бы они применяли "
+#~ "<a href=\"/software/librejs/index.html\">LibreJS</a>. Есть также "
+#~ "расширения браузеров, <a 
href=\"https://www.cnet.com/how-to/how-to-stop-";
+#~ "sites-from-using-your-cpu-to-mine-coins/\"> созданные 
специально для "
+#~ "блокировки майнеров на JavaScript</a>."
+
+#~ msgid ""
+#~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "&ldquo;Интеллектуальные&rdquo; термостаты 
Honeywell связываются только с "
+#~ "сервером компании. У них есть все 
скверные черты таких устройств: <a href="
+#~ "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
+#~ "outage-2018-9\"> слежка и опасность саботажа</a> 
(конкретного "
+#~ "пользователя и всех пользователей 
сразу), а также риск перерывов в работе "
+#~ "(именно это и произошло)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "Кроме того, установка требуемой 
температуры требует несвободных программ. "
+#~ "В старомодных термостатах это делается 
с помощью органов управления прямо "
+#~ "на термостате."
+
+#~ msgid ""
 #~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/";
 #~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
 #~ "hide voice commands in other audio</a>, so that people cannot hear them, "

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary.zh-tw.po 30 Oct 2018 02:27:48 -0000      1.20
+++ proprietary/po/proprietary.zh-tw.po 30 Oct 2018 15:28:30 -0000      1.21
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -338,6 +338,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."
@@ -389,44 +395,6 @@
 "hijacks the CPU in users' computers to mine a cryptocurrency."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www.";
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a &ldquo;miner&rdquo; in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"&ldquo;content management system&rdquo;. A better term would be &ldquo;<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>&rdquo;.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/";
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-";
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: server/body-include-2.sq.html
===================================================================
RCS file: /web/www/www/server/body-include-2.sq.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- server/body-include-2.sq.html       3 Jan 2018 21:31:06 -0000       1.110
+++ server/body-include-2.sq.html       30 Oct 2018 15:28:30 -0000      1.111
@@ -74,14 +74,14 @@
 <li id="tabLicenses" class="active">
     
     <!--#echo encoding="none" var="MARK_START" -->
-<a href="/licenses/licenses.html">LEJE</a>
+<a href="/licenses/licenses.html">LICENCA</a>
     
     
   <!--#echo encoding="none" var="MARK_END" -->
 </li>
 
   <!--#else -->
-<li id="tabLicenses"><a href="/licenses/licenses.html">LEJE</a></li>
+<li id="tabLicenses"><a href="/licenses/licenses.html">LICENCA</a></li>
 
 <!--#endif -->
 <!--#if expr="$REQUEST_URI = /^\/education\//" -->

Index: server/outdated.sq.html
===================================================================
RCS file: /web/www/www/server/outdated.sq.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- server/outdated.sq.html     29 Nov 2014 10:27:30 -0000      1.13
+++ server/outdated.sq.html     30 Oct 2018 15:28:30 -0000      1.14
@@ -17,19 +17,19 @@
 <!--
 TRANSLATORS: The text of the link; the next string is the last part
              of the sentence (just a period in English). -->
-origjinali në Anglisht</a>.
+origjinali në anglisht</a>.
 
 <!--#else -->
 <!--
 TRANSLATORS: The link to the English page will follow this string. -->
-Ky përkthim mund të mos i pasqyrojë ndryshimet e bëra te
+Ky përkthim mund të mos i pasqyrojë ndryshimet më të reja të bëra te
 
 
 <!--#echo encoding="none" var="ORIGINAL_LINK" -->
 <!--
 TRANSLATORS: The text of the link; the next string is the last part
              of the sentence (just a period in English). -->
-origjinali në Anglisht</a><span>.</span>
+origjinali në anglisht</a><span>.</span>
 
 
 <!--#endif -->

Index: server/sitemap.sq.html
===================================================================
RCS file: /web/www/www/server/sitemap.sq.html,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- server/sitemap.sq.html      27 Oct 2018 17:00:55 -0000      1.257
+++ server/sitemap.sq.html      30 Oct 2018 15:28:30 -0000      1.258
@@ -68,7 +68,7 @@
 <dl><dt><a class="topmost-title"
 href="/accessibility/accessibility.html">përdorshmëri</a></dt>
     <dd><span class="topmost-title">
-Deklaratë e GNU-së Mbi Hyrshmërinë
+Deklaratë e GNU-së Mbi Përdorimin Nën Me Aftësi të Kufizuara
 </span>
 </dd></dl>
 </div>
@@ -659,7 +659,7 @@
   <dt><a href="/graphics/free-your-soul.html">free-your-soul.html</a></dt>
   <dd>Sfond ekrani “Çlironi Shpirtin Tuaj”</dd>
   <dt><a 
href="/graphics/freedom-reflection.html">freedom-reflection.html</a></dt>
-  <dd>Freedom Reflection</dd>
+  <dd>Përsiatje Mbi Lirinë</dd>
   <dt><a href="/graphics/freedom.html">freedom.html</a></dt>
   <dd>Ç'do të Thorë Liri</dd>
   <dt><a href="/graphics/french-motto.html">french-motto.html</a></dt>
@@ -671,7 +671,7 @@
   <dt><a href="/graphics/FSFS-logo.html">FSFS-logo.html</a></dt>
   <dd>Logoja për kapakun e librit "Software i Lirë, Shoqëri e Lirë"</dd>
   <dt><a href="/graphics/gg3po.html">gg3po.html</a></dt>
-  <dd>New GNU</dd>
+  <dd>GNU i ri</dd>
   <dt><a href="/graphics/gleesons.html">gleesons.html</a></dt>
   <dd>Art GNU nga Gleeson</dd>
   <dt><a href="/graphics/gNewSense.html">gNewSense.html</a></dt>
@@ -786,7 +786,7 @@
   <dt><a href="/graphics/Trisquel.html">Trisquel.html</a></dt>
   <dd>Trisquel</dd>
   <dt><a href="/graphics/usegnu.html">usegnu.html</a></dt>
-  <dd>Use 'GNU</dd>
+  <dd>Përdorni 'GNU</dd>
   <dt><a href="/graphics/wallpapers.html">wallpapers.html</a></dt>
   <dd>Sfonde</dd>
   <dt><a href="/graphics/whatsgnu.html">whatsgnu.html</a></dt>
@@ -1252,7 +1252,7 @@
   <dd>Liri apo Pushtet?</dd>
   <dt><a
 
href="/philosophy/fs-and-sustainable-development.html">fs-and-sustainable-development.html</a></dt>
-  <dd>Free Software and Sustainable Development</dd>
+  <dd>Software-i Lirë dhe Zhvillim i Qëndrueshëm</dd>
   <dt><a href="/philosophy/fs-motives.html">fs-motives.html</a></dt>
   <dd>Arsye Për Shkrim Software-i të Lirë</dd>
   <dt><a href="/philosophy/fs-translations.html">fs-translations.html</a></dt>
@@ -2022,7 +2022,7 @@
 <div id="directory-usenet">
 <dl><dt><a class="topmost-title" href="/usenet/usenet.html">usenet</a></dt>
     <dd><span class="topmost-title">
-gnUSENET gnu.* Hierarchy
+Hierarki në gnUSENET gnu.*
 </span>
 </dd></dl>
 </div>
@@ -2130,7 +2130,7 @@
 <p class="unprintable"><!-- timestamp start -->
 U përditësua më:
 
-$Date: 2018/10/27 17:00:55 $
+$Date: 2018/10/30 15:28:30 $
 
 <!-- timestamp end -->
 </p>

Index: server/top-addendum.sq.html
===================================================================
RCS file: /web/www/www/server/top-addendum.sq.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- server/top-addendum.sq.html 29 Aug 2014 07:04:45 -0000      1.5
+++ server/top-addendum.sq.html 30 Oct 2018 15:28:30 -0000      1.6
@@ -10,7 +10,7 @@
 <!--#endif -->
 <p class="trans-disclaimer">
 <!--#echo encoding="none" var="link_to_english_page" -->
-Ky është përkthim i një faqeje Anglisht në origjinal.
+Ky është përkthim i një faqeje anglisht në origjinal.
 <br />
 
 <!--#if expr="${ENGLISH_PAGE}" -->

Index: server/po/outdated.sq.po
===================================================================
RCS file: /web/www/www/server/po/outdated.sq.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21

Index: server/po/sitemap.sq.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.sq.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- server/po/sitemap.sq.po     30 Oct 2018 14:23:34 -0000      1.295
+++ server/po/sitemap.sq.po     30 Oct 2018 15:28:30 -0000      1.296
@@ -2,7 +2,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: \n"
-"POT-Creation-Date: 2018-09-29 16:56+0000\n"
+"POT-Creation-Date: 2018-10-27 16:57+0000\n"
 "PO-Revision-Date: 2018-10-30 14:59+0200\n"
 "Last-Translator: Besnik Bleta <address@hidden>\n"
 "Language-Team: address@hidden"
@@ -102,7 +102,7 @@
 
 #. type: Content of: <div><dl><dd><span>
 msgid "GNU Accessibility Statement"
-msgstr ""
+msgstr "Deklaratë e GNU-së Mbi Përdorimin Nën Me Aftësi të Kufizuara"
 
 #. type: Content of: <div><dl><dd>
 msgid "</span>"
@@ -893,14 +893,6 @@
 msgstr "C pak a shumë"
 
 #. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
-msgstr "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "If Clinton was a tree!"
-msgstr "Sikur Klintoni të qe pemë!"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
 msgid "<a href=\"/fun/jokes/courtroom.quips.html\">courtroom.quips.html</a>"
 msgstr "<a href=\"/fun/jokes/courtroom.quips.html\">courtroom.quips.html</a>"
 
@@ -917,14 +909,6 @@
 msgstr "Viç i Ngordhur?"
 
 #. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
-msgstr "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Funny C/C++ declarations!"
-msgstr "Deklarime C/C++ zbavitëse!"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
 msgid "<a href=\"/fun/jokes/dna.html\">dna.html</a>"
 msgstr "<a href=\"/fun/jokes/dna.html\">dna.html</a>"
 
@@ -1060,14 +1044,6 @@
 msgstr ""
 
 #. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
-msgstr "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "THE GINGRINCH THAT STOLE CONGRESS"
-msgstr ""
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
 msgid "<a href=\"/fun/jokes/gnu-overflow.html\">gnu-overflow.html</a>"
 msgstr "<a href=\"/fun/jokes/gnu-overflow.html\">gnu-overflow.html</a>"
 
@@ -1201,23 +1177,6 @@
 msgstr "E meta e Fundit"
 
 #. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
-msgstr "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
-
-# type: Content of: <ul><li>
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Lawyers"
-msgstr "Avokatët"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
-msgstr "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Linus Converts to Islam"
-msgstr "Linusi konvertohet në Islam"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
 msgid "<a href=\"/fun/jokes/long-options.html\">long-options.html</a>"
 msgstr "<a href=\"/fun/jokes/long-options.html\">long-options.html</a>"
 
@@ -1364,14 +1323,6 @@
 msgstr "Klauzolë!"
 
 #. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
-msgstr "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Dan Quayle"
-msgstr "Dan Quayle"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
 msgid "<a href=\"/fun/jokes/quotations.html\">quotations.html</a>"
 msgstr "<a href=\"/fun/jokes/quotations.html\">quotations.html</a>"
 
@@ -1432,18 +1383,6 @@
 msgstr ""
 
 #. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid ""
-"<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
-"election-2000-bumper-stickers.html</a>"
-msgstr ""
-"<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
-"election-2000-bumper-stickers.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Top 10 Election 2000 Bumper Stickers"
-msgstr ""
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
 msgid "<a href=\"/fun/jokes/typoglycemia.html\">typoglycemia.html</a>"
 msgstr "<a href=\"/fun/jokes/typoglycemia.html\">typoglycemia.html</a>"
 
@@ -1564,14 +1503,6 @@
 msgstr "<a href=\"/fun/spam/\">zbavitje/spam</a>"
 
 #. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
-msgstr "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "darkprofits.net"
-msgstr "darkprofits.net"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
 msgid "<a href=\"/fun/spam/sheep.html\">sheep.html</a>"
 msgstr "<a href=\"/fun/spam/sheep.html\">sheep.html</a>"
 
@@ -4246,6 +4177,18 @@
 "<a href=\"/philosophy/kevin-cole-response.html\">kevin-cole-response.html</a>"
 
 #. type: Content of: <div><dl><dd><dl><dt>
+msgid ""
+"<a href=\"/philosophy/kind-communication.html\">kind-communication.html</a>"
+msgstr ""
+"<a href=\"/philosophy/kind-communication.html\">kind-communication.html</a>"
+
+#. type: Content of: <div><dl><dd><dl><dd>
+#, fuzzy
+#| msgid "GNU Webmastering Guidelines"
+msgid "GNU Kind Communications Guidelines"
+msgstr "Udhëzime për Përgjegjësa Web të GNU-së"
+
+#. type: Content of: <div><dl><dd><dl><dt>
 msgid "<a href=\"/philosophy/komongistan.html\">komongistan.html</a>"
 msgstr "<a href=\"/philosophy/komongistan.html\">komongistan.html</a>"
 
@@ -6777,6 +6720,53 @@
 msgid "Updated:"
 msgstr "U përditësua më:"
 
+#~ msgid "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
+
+#~ msgid "If Clinton was a tree!"
+#~ msgstr "Sikur Klintoni të qe pemë!"
+
+#~ msgid "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
+
+#~ msgid "Funny C/C++ declarations!"
+#~ msgstr "Deklarime C/C++ zbavitëse!"
+
+#~ msgid "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
+
+#~ msgid "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
+
+# type: Content of: <ul><li>
+#~ msgid "Lawyers"
+#~ msgstr "Avokatët"
+
+#~ msgid "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
+
+#~ msgid "Linus Converts to Islam"
+#~ msgstr "Linusi konvertohet në Islam"
+
+#~ msgid "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
+
+#~ msgid "Dan Quayle"
+#~ msgstr "Dan Quayle"
+
+#~ msgid ""
+#~ "<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
+#~ "election-2000-bumper-stickers.html</a>"
+#~ msgstr ""
+#~ "<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
+#~ "election-2000-bumper-stickers.html</a>"
+
+#~ msgid "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
+#~ msgstr "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
+
+#~ msgid "darkprofits.net"
+#~ msgstr "darkprofits.net"
+
 #~ msgid ""
 #~ "<a href=\"/server/fsf-html-style-sheet.html\">fsf-html-style-sheet.html</"
 #~ "a>"

Index: server/po/top-addendum.sq.po
===================================================================
RCS file: /web/www/www/server/po/top-addendum.sq.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- server/po/top-addendum.sq.po        30 Oct 2018 14:23:34 -0000      1.7
+++ server/po/top-addendum.sq.po        30 Oct 2018 15:28:30 -0000      1.8
@@ -9,11 +9,11 @@
 "POT-Creation-Date: 2012-09-27 05:00-0300\n"
 "PO-Revision-Date: 2018-10-30 14:41+0200\n"
 "Last-Translator: Besnik Bleta <address@hidden>\n"
+"Language-Team: \n"
 "Language: sq\n"
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"Language-Team: \n"
 "X-Generator: Poedit 2.0.5\n"
 
 #. #echo encoding="none" var="link_to_english_page"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]