www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 5 Jan 2019 03:59:21 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/01/05 03:59:20

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.3&r2=1.4

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- de.po       1 Jan 2019 20:00:35 -0000       1.3
+++ de.po       5 Jan 2019 08:59:17 -0000       1.4
@@ -8422,6 +8422,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -9811,9 +9818,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 # | [-<a href=\"/proprietary/proprietary-drm.html\">Digital-]{+<em>Digital+}

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- es.po       3 Jan 2019 10:58:31 -0000       1.4
+++ es.po       5 Jan 2019 08:59:17 -0000       1.5
@@ -5983,6 +5983,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -6982,13 +6989,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
-"ordenador, que esté a la espera de comandos procedentes de un extraño que "
-"puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -7959,6 +7963,15 @@
 "procesadores Intel incorporarán software tirano</a>."
 
 #~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
+#~ "ordenador, que esté a la espera de comandos procedentes de un extraño 
que "
+#~ "puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+
+#~ msgid ""
 #~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #~ "Foundation, Inc."
 #~ msgstr ""

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- fr.po       1 Jan 2019 22:29:04 -0000       1.4
+++ fr.po       5 Jan 2019 08:59:17 -0000       1.5
@@ -6649,6 +6649,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -7799,13 +7806,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Porte dérobée :</em>  Tout programme en fonctionnement sur votre "
-"ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce dernier 
"
-"pouvant lui dire de faire des choses sans vous demander la permission."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -8931,6 +8935,16 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>Les "
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
 
+#~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Porte dérobée :</em>  Tout programme en fonctionnement sur votre "
+#~ "ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce "
+#~ "dernier pouvant lui dire de faire des choses sans vous demander la "
+#~ "permission."
+
 #~ msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
 

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- it.po       1 Jan 2019 20:00:35 -0000       1.3
+++ it.po       5 Jan 2019 08:59:17 -0000       1.4
@@ -7824,6 +7824,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -9125,9 +9132,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 # | [-<a href=\"/proprietary/proprietary-drm.html\">Digital-]{+<em>Digital+}

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- ja.po       1 Jan 2019 20:00:35 -0000       1.3
+++ ja.po       5 Jan 2019 08:59:17 -0000       1.4
@@ -6593,6 +6593,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -7713,9 +7720,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- nl.po       1 Jan 2019 20:00:35 -0000       1.3
+++ nl.po       5 Jan 2019 08:59:18 -0000       1.4
@@ -5151,6 +5151,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -6142,9 +6149,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 # | [-<a href=\"/proprietary/proprietary-drm.html\">Digital-]{+<em>Digital+}

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- pl.po       1 Jan 2019 20:00:35 -0000       1.3
+++ pl.po       5 Jan 2019 08:59:19 -0000       1.4
@@ -4629,6 +4629,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -5683,9 +5690,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 # | [-<a href=\"/philosophy/proprietary-drm.html\">Digital-]{+<em>Digital+}

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- pot 1 Jan 2019 20:00:35 -0000       1.3
+++ pot 5 Jan 2019 08:59:19 -0000       1.4
@@ -4432,6 +4432,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -5245,9 +5252,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-back-doors.de-diff.html 1 Jan 2019 20:00:36 -0000       1.17
+++ proprietary-back-doors.de-diff.html 5 Jan 2019 08:59:19 -0000       1.18
@@ -32,6 +32,10 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;We say a program has a &ldquo;back 
door&ldquo; when someone who is
+not supposed to be in control of the computer where it is installed
+can send it commands via some other channel.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary software.
 They are sorted out according to what they are known to allow. Back doors
 that allow full control over the operating system are said to be
@@ -750,7 +754,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-back-doors.de.po        1 Jan 2019 20:00:36 -0000       1.118
+++ proprietary-back-doors.de.po        5 Jan 2019 08:59:19 -0000       1.119
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -53,6 +53,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-back-doors.fr.po        1 Jan 2019 22:19:49 -0000       1.115
+++ proprietary-back-doors.fr.po        5 Jan 2019 08:59:19 -0000       1.116
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2019-01-01 23:19+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -52,6 +53,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-back-doors.it-diff.html 1 Jan 2019 20:00:36 -0000       1.43
+++ proprietary-back-doors.it-diff.html 5 Jan 2019 08:59:19 -0000       1.44
@@ -32,6 +32,10 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;We say a program has a &ldquo;back 
door&ldquo; when someone who is
+not supposed to be in control of the computer where it is installed
+can send it commands via some other channel.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
 &lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software.
@@ -122,94 +126,98 @@
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
     iOS 8 security improvements&lt;/a&gt;; but &lt;a
     
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;</em></ins></span>
-    not <span class="removed"><del><strong>come</strong></del></span> as <span 
class="inserted"><ins><em>much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    not <span class="removed"><del><strong>come</strong></del></span> as <span 
class="removed"><del><strong>a surprise. Nonfree software for
+          encryption is never trustworthy.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>much as Apple 
claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
+    <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A pregnancy test 
controller application not only
+        can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+        on many sorts of</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-&lt;h3 id='alter-data'&gt;Altering user's data or settings&lt;/h3&gt;
+
+&lt;h3 id='alter-data'&gt;Altering user's</em></ins></span> data <span 
class="removed"><del><strong>in the phone, and in server accounts, it can
+        alter them too&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
+
+    &lt;li&gt;
+        &lt;p&gt;Xiaomi phones come with</strong></del></span> <span 
class="inserted"><ins><em>or settings&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809140"&gt;
-    &lt;p&gt;Android has</em></ins></span> a <span 
class="removed"><del><strong>surprise. Nonfree software</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
-    back door</em></ins></span> for
-          <span class="removed"><del><strong>encryption is never 
trustworthy.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Android has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
+           universal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;</em></ins></span>
+    back door <span class="removed"><del><strong>in the application 
processor,</strong></del></span> for
+           <span class="removed"><del><strong>Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article suggests it might be a universal back door, but this
-    isn't clear.&lt;/p&gt;
+        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+           universal back door in the modem processor that the local
+           phone company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201607284"&gt;
-    &lt;p&gt;The Dropbox app for Macintosh &lt;a
-    
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
-    takes control of user interface items after luring the user into
-    entering an admin password&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;li&gt;&lt;p&gt;Capcom's Street Fighter V update &lt;a 
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed
+        a driver that can</strong></del></span> <span 
class="inserted"><ins><em>remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article suggests it might</em></ins></span> be <span 
class="removed"><del><strong>used as a backdoor by any application
+        installed on</strong></del></span> a <span 
class="removed"><del><strong>Windows 
computer&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>universal back door, but this
+    isn't clear.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-    <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A</strong></del></span>
+    <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
-    &lt;p&gt;A</em></ins></span> pregnancy test controller application not 
only can &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy</em></ins></span> on many sorts of data in the phone, and in server 
accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201607284"&gt;
+    &lt;p&gt;The</em></ins></span> Dropbox app for Macintosh &lt;a <span 
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
+        total</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
+    takes</em></ins></span> control of <span class="removed"><del><strong>the 
machine by repeatedly nagging</strong></del></span> <span 
class="inserted"><ins><em>user interface items after luring</em></ins></span> 
the user
+        <span class="removed"><del><strong>for</strong></del></span> <span 
class="inserted"><ins><em>into
+    entering</em></ins></span> an <span 
class="removed"><del><strong>admini</strong></del></span> <span 
class="inserted"><ins><em>admin</em></ins></span> password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-    <span class="removed"><del><strong>&lt;li&gt;
-        &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
-           universal</strong></del></span>
+  &lt;li <span 
class="removed"><del><strong>id="universal-back-door-phone-modem"&gt;&lt;p&gt;The
 universal</strong></del></span> <span 
class="inserted"><ins><em>id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201512074"&gt;
+  &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-    Some D-Link routers&lt;/a&gt; have a</em></ins></span> back door <span 
class="removed"><del><strong>in the application 
processor,</strong></del></span> for
-           <span class="removed"><del><strong>Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-           universal back door</strong></del></span> <span 
class="inserted"><ins><em>changing settings</em></ins></span> in <span 
class="removed"><del><strong>the modem processor that the local
-           phone company can use&lt;/a&gt;.&lt;/p&gt;
-    &lt;/li&gt;
-
-    &lt;li&gt;&lt;p&gt;Capcom's Street Fighter V update &lt;a 
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed
-        a driver that can be used as</strong></del></span> a <span 
class="removed"><del><strong>backdoor by any application
-        installed on</strong></del></span>
-    <span class="inserted"><ins><em>dlink of an eye.&lt;/p&gt;
+    Some D-Link routers&lt;/a&gt; have a</em></ins></span> back door <span 
class="inserted"><ins><em>for changing settings</em></ins></span> in <span 
class="removed"><del><strong>portable phones &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
+    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span> <span class="inserted"><ins><em>a
+    dlink</em></ins></span> of <span class="removed"><del><strong>this 
problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an eye.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
-    router has</em></ins></span> a <span class="removed"><del><strong>Windows 
computer&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>back door&lt;/a&gt;.&lt;/p&gt;
+    router has a back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
     routers have back doors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-    <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Dropbox app for 
Macintosh</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+      Microsoft</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511244"&gt;
-    &lt;p&gt;Google has long had</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
-        total control of the machine by repeatedly nagging the user
-        for</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
-    back door to remotely unlock</em></ins></span> an <span 
class="removed"><del><strong>admini 
password&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Android device&lt;/a&gt;, unless its disk
-    is encrypted (possible since Android 5.0 Lollipop, but still not
-    quite the default).&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Google</em></ins></span> has <span 
class="removed"><del><strong>already backdoored</strong></del></span> <span 
class="inserted"><ins><em>long had &lt;a
+    
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
+    back door to remotely unlock an Android device&lt;/a&gt;, 
unless</em></ins></span> its disk <span 
class="removed"><del><strong>encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern</strong></del></span>
+    <span class="inserted"><ins><em>is encrypted (possible since Android 5.0 
Lollipop, but still not
+    quite the default).&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="universal-back-door-phone-modem"&gt;&lt;p&gt;The
 universal</strong></del></span> <span 
class="inserted"><ins><em>id="M201511194"&gt;
+  &lt;li id="M201511194"&gt;
     &lt;p&gt;Caterpillar vehicles come with &lt;a
     
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
-    a</em></ins></span> back door <span class="removed"><del><strong>in 
portable phones &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed</strong></del></span> to <span 
class="removed"><del><strong>listen through their 
microphones&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>shutoff the engine&lt;/a&gt; 
remotely.&lt;/p&gt;</em></ins></span>
+    a back door to shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
   &lt;/li&gt;
  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
-      Microsoft has already backdoored its disk 
encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Modern</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
+  &lt;li id="M201509160"&gt;
     &lt;p&gt;Modern</em></ins></span> gratis game cr&hellip;apps &lt;a
     
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
     collect a wide range of data about their users and their users'
@@ -252,16 +260,12 @@
   &lt;/li&gt;
   
 &lt;li&gt;&lt;p&gt;ARRIS cable modem</strong></del></span> has <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>been used to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
-    remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>books erased 
was
-    &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
-
-    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>criticism by saying it
-    would delete books only following orders from</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+    remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
      remotely.&lt;/p&gt;
   &lt;/li&gt;
 &lt;li&gt;&lt;p&gt;
@@ -269,16 +273,19 @@
 intentional local back door for 4 years&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span>
-    <span class="inserted"><ins><em>state.  However,</em></ins></span> that 
<span class="removed"><del><strong>&lt;a 
+&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
     
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Microsoft</strong></del></span> <span class="inserted"><ins><em>books 
erased</em></ins></span> was <span class="removed"><del><strong>forcing 
them</strong></del></span>
+    <span class="inserted"><ins><em>&lt;cite&gt;1984&lt;/cite&gt;, by George 
Orwell.&lt;/p&gt;
+
+    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Microsoft was in fact &lt;a 
     
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
-    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span class="inserted"><ins><em>criticism by saying 
it
+    would delete books only following orders from the
+    state.  However,</em></ins></span> that <span 
class="removed"><del><strong>said whether to &ldquo;upgrade&rdquo; to Windows 
10 when users 
     had turned</strong></del></span> <span class="inserted"><ins><em>policy 
didn't last.  In 2012</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
 
     &lt;p&gt;Later on, Microsoft published instructions 
on</strong></del></span> &lt;a 
@@ -287,135 +294,136 @@
 
     &lt;p&gt;This seems to involve use of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
-    wiped</em></ins></span> a <span class="removed"><del><strong>back door in 
Windows 7</strong></del></span> <span class="inserted"><ins><em>user's 
Kindle-Swindle</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
+    wiped</em></ins></span> a <span class="inserted"><ins><em>user's 
Kindle-Swindle and deleted her account&lt;/a&gt;, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Do other ebook readers have</em></ins></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
+    don't know,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been used to
-&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+&lt;p&gt;Most mobile phones</strong></del></span> <span 
class="inserted"><ins><em>we</em></ins></span> have <span 
class="inserted"><ins><em>no way to find out.  There is no reason to
+    assume that they don't.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201011220"&gt;
+    &lt;p&gt;The iPhone has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, which has been used to</strong></del></span> 
<span class="inserted"><ins><em>door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
 turn them malicious&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+    enabling it without understanding.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
-models of mobile phones</strong></del></span> <span 
class="inserted"><ins><em>deleted her account&lt;/a&gt;, then
-    offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+A Chinese version of Android</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
 
-    &lt;p&gt;Do other ebook readers</em></ins></span> have <span 
class="removed"><del><strong>a universal</strong></del></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
-    don't know, and we have no way</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
+&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
+    back <span class="removed"><del><strong>door&lt;/a&gt;. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door that can 
make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full</em></ins></span> of <span 
class="removed"><del><strong>mobile phones</strong></del></span> <span 
class="inserted"><ins><em>confusions, errors and biases that 
we</em></ins></span> have
+    <span class="inserted"><ins><em>an obligation to expose, given that we are 
making</em></ins></span> a <span class="removed"><del><strong>universal back 
door</strong></del></span> <span class="inserted"><ins><em>link to 
them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing</em></ins></span> in <span 
class="inserted"><ins><em>its products. What it does enable</em></ins></span> 
the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
+    to <span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span> 
is <span class="removed"><del><strong>controlled
 by Coolpad.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Microsoft Windows has a universal back door through which
+&lt;p&gt;Microsoft Windows has</strong></del></span> <span 
class="inserted"><ins><em>sue other companies if they do some particular thing 
in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users 
through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back
+    door <span class="removed"><del><strong>through which
 &lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on the users&lt;/a&gt;.
+any change whatsoever can be imposed on</strong></del></span> <span 
class="inserted"><ins><em>are beside</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.
 &lt;/p&gt;
 &lt;p&gt;More information on when
 &lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
 this was used&lt;/a&gt;.
 &lt;/p&gt;
-&lt;p&gt;In Windows 10, the universal back door</strong></del></span> <span 
class="inserted"><ins><em>find out.  There</em></ins></span> is no <span 
class="removed"><del><strong>longer hidden; all
+&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span 
class="removed"><del><strong>universal</strong></del></span> back door is <span 
class="removed"><del><strong>no longer hidden; all
 &ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>wrong in the
+    first place,</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span 
class="inserted"><ins><em>reason</em></ins></span> to <span 
class="removed"><del><strong>potential back
-door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> the <span 
class="removed"><del><strong>TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The iPhone has a back door
-&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
-    <span class="inserted"><ins><em>assume</em></ins></span> that <span 
class="removed"><del><strong>allows Apple to remotely delete apps&lt;/a&gt; 
which Apple considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they 
don't.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;</em></ins></span>
-    &lt;p&gt;The iPhone has a back door for &lt;a
-    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
-    enabling it without <span class="removed"><del><strong>understanding.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for the state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
-    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article is full of confusions, errors and biases that we have
-    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
-
-    &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
-    any particular thing in its products. What it does enable the company
-    to do is sue other companies if they do some particular thing in
-    their products.&lt;/li&gt;
-
-    &lt;li&gt;A company's policies about when to attack users through a back
-    door are beside the point. Inserting the back door is wrong in the
-    first place, and using the back door is always wrong too. No software
-    developer should have that power over users.&lt;/li&gt;
+&lt;p&gt;The iPhone has a</strong></del></span> back door
+<span class="removed"><del><strong>&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is always wrong too. No software
+    developer should have</em></ins></span> that <span 
class="removed"><del><strong>allows Apple</strong></del></span> <span 
class="inserted"><ins><em>power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word to refer to sharing copies is a smear;
+    attacking ships. Using that word</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span 
class="inserted"><ins><em>refer</em></ins></span> to <span 
class="removed"><del><strong>have this power
+because</strong></del></span> <span class="inserted"><ins><em>sharing copies 
is a smear;
     please don't smear sharing.&lt;/li&gt;
 
-    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
-    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    &lt;li&gt;&lt;p&gt;The idea</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is</em></ins></span> a 
<span class="removed"><del><strong>back door for</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
     that have nothing in common&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
-    generalization is a separate absurdity. It's like calling the cops
-    because neighbors' kids are playing on your front yard, and saying
+    generalization is a separate absurdity.</em></ins></span> It's <span 
class="removed"><del><strong>not always enabled, but 
users</strong></del></span> <span class="inserted"><ins><em>like calling the 
cops
+    because neighbors' kids</em></ins></span> are <span 
class="removed"><del><strong>led into enabling</strong></del></span> <span 
class="inserted"><ins><em>playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
-    to the boundary line, not even</em></ins></span> with <span 
class="inserted"><ins><em>a jackhammer, because it is an
-    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    to the boundary line, not even with a jackhammer, 
because</em></ins></span> it <span class="removed"><del><strong>without 
understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can,</strong></del></span> <span class="inserted"><ins><em>is 
an
+    abstraction</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>can't be affected by physical 
action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link to the article</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
-    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -464,34 +472,23 @@
     &lt;p&gt;Google</em></ins></span> can also &lt;a
     
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
     forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google 
Play).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.</em></ins></span>  This is
-    not equivalent to a universal back door, but permits various dirty <span 
class="removed"><del><strong>tricks.
-&lt;/p&gt;
-
-&lt;p&gt;
-Although</strong></del></span>
-    <span class="inserted"><ins><em>tricks.&lt;/p&gt;
-
-    &lt;p&gt;Although</em></ins></span> Google's &lt;em&gt;exercise&lt;/em&gt; 
of this power has not been
-    malicious so far, the point is that nobody should have such power,
-    which could also be used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+seems, since</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
+    tricks.&lt;/p&gt;
+
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point is</em></ins></span> that <span 
class="removed"><del><strong>article,</strong></del></span> <span 
class="inserted"><ins><em>nobody should have such power,
+    which could also be used maliciously.  You might well 
decide</em></ins></span> to
+    <span class="inserted"><ins><em>let a security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that
     it considers malicious.  But there is no excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this <span class="removed"><del><strong>way.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should</em></ins></span> 
have <span class="removed"><del><strong>been merged</strong></del></span> <span 
class="inserted"><ins><em>the right to decide
+    who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
-    &lt;p&gt;The iPhone has</em></ins></span> a back
-<span class="removed"><del><strong>door&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>door &lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>provides remote 
access</strong></del></span> <span class="inserted"><ins><em>allows 
Apple</em></ins></span> to <span class="inserted"><ins><em>remotely delete 
apps&lt;/a&gt; which Apple considers
+  &lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone has a back door &lt;a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
     this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
@@ -504,79 +501,61 @@
   &lt;li id="M201812300"&gt;
     &lt;p&gt;New GM cars &lt;a
     href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer</em></ins></span> the <span class="removed"><del><strong>files 
stored on</strong></del></span> <span class="inserted"><ins><em>feature of a 
universal back door&lt;/a&gt;.&lt;/p&gt;
+    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Every nonfree program offers</em></ins></span> the <span 
class="removed"><del><strong>device.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user zero 
security against its
+    &lt;p&gt;Every nonfree program offers the user zero security against its
     developer. With this malfeature, GM has explicitly made things even
-    worse.&lt;/p&gt;</em></ins></span>
+    worse.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711244"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Amazon 
Kindle-Swindle</strong></del></span> <span class="inserted"><ins><em>Furby 
Connect</em></ins></span> has a <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal</em></ins></span> back <span class="removed"><del><strong>door 
that</strong></del></span> <span class="inserted"><ins><em>door&lt;/a&gt;. If 
the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote changes to the code could surely convert 
it</em></ins></span>
+    into <span class="removed"><del><strong>Google Play).
+This is</strong></del></span> <span class="inserted"><ins><em>one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711010"&gt;
-    &lt;p&gt;Sony</em></ins></span> has <span 
class="removed"><del><strong>been</strong></del></span> <span 
class="inserted"><ins><em>brought back its robotic pet Aibo, this time &lt;a
+    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
     with a universal back door, and tethered to a server that requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709091"&gt;
-    &lt;p&gt;Tesla</em></ins></span> used <span 
class="inserted"><ins><em>software</em></ins></span> to
-<span class="removed"><del><strong>&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
-remotely erase books&lt;/a&gt;.  One</strong></del></span> <span 
class="inserted"><ins><em>limit the part</em></ins></span> of the <span 
class="removed"><del><strong>books erased</strong></del></span> <span 
class="inserted"><ins><em>battery
-    that</em></ins></span> was <span class="removed"><del><strong>1984, by 
George Orwell.
-&lt;/p&gt;
-
-&lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it</strong></del></span> <span 
class="inserted"><ins><em>customers in some cars, and &lt;a
+    &lt;p&gt;Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
     a universal back door in the software&lt;/a&gt; to temporarily increase
     this limit.&lt;/p&gt;
 
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
-    whole battery capacity did not do them any harm, the same back
-    door</em></ins></span> would <span class="removed"><del><strong>delete 
books only
-following orders from</strong></del></span> <span 
class="inserted"><ins><em>permit Tesla (perhaps under</em></ins></span> the 
<span class="removed"><del><strong>state.  However, that policy didn't last.
-In 2012
-it</strong></del></span> <span class="inserted"><ins><em>command of some
-    government) to remotely order the car to use none of its battery. Or
+    whole battery capacity did</em></ins></span> not <span 
class="removed"><del><strong>equivalent</strong></del></span> <span 
class="inserted"><ins><em>do them any harm, the same back
+    door would permit Tesla (perhaps under the command of some
+    government) to remotely order the car</em></ins></span> to <span 
class="inserted"><ins><em>use none of its battery. Or
     perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702061"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
-    have</em></ins></span> a <span class="removed"><del><strong>user's 
Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
-kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
-
-
-&lt;p&gt;The Kindle-Swindle also has</strong></del></span> <span 
class="inserted"><ins><em>universal back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
+    have a universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
-    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;</em></ins></span>
-    a <span class="inserted"><ins><em>universal back door in the application 
processor, for Xiaomi's
+    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
+    a universal back door in the application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
-    universal back <span class="removed"><del><strong>door&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>door in the 
modem processor that the local phone
-    company can use&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor that the local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201608172"&gt;
+  &lt;li id="M201608172"&gt;
     &lt;p id="windows-update"&gt;Microsoft
     Windows has a universal back door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
@@ -584,9 +563,8 @@
 
     &lt;p&gt;This was &lt;a
     href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP and Vista, and it seems</em></ins></span>
-    that <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>Microsoft used</em></ins></span> the <span 
class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system</strong></del></span> <span 
class="inserted"><ins><em>same method to push the &lt;a
+    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
+    that Microsoft used the same method to push the &lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
     Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
 
@@ -597,52 +575,90 @@
   &lt;/li&gt;
 
   &lt;li id="M201606060"&gt;
-    &lt;p&gt;The Amazon Echo appears to</em></ins></span> have <span 
class="inserted"><ins><em>a universal</em></ins></span> back <span 
class="removed"><del><strong>doors that give
-HP</strong></del></span> <span class="inserted"><ins><em>door, 
since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+    &lt;p&gt;The Amazon Echo appears to have a universal back door, since &lt;a
+    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
     it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We have found nothing explicitly documenting the lack of any way
-    to disable</em></ins></span> remote <span 
class="removed"><del><strong>login access&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>changes</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims that this 
does</strong></del></span> <span class="inserted"><ins><em>the software, so we 
are</em></ins></span> not <span class="removed"><del><strong>give HP
-access</strong></del></span> <span class="inserted"><ins><em>completely
+    to disable remote changes to the software, so we are not completely
     sure there isn't one, but this seems pretty clear.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
-    all models of mobile phones have a &lt;a href="#universal-back-door"&gt;
-    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad 
bother</em></ins></span>
-    to <span class="inserted"><ins><em>introduce another? Because this one is 
controlled by Coolpad.&lt;/p&gt;
+    A Chinese version of Android has</em></ins></span> a universal back <span 
class="removed"><del><strong>door, but permits various
+dirty tricks.
+&lt;/p&gt;
+
+&lt;p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;. Nearly
+    all models</em></ins></span> of <span class="removed"><del><strong>this 
power has not been
+malicious so far, the point is that nobody should</strong></del></span> <span 
class="inserted"><ins><em>mobile phones</em></ins></span> have <span 
class="removed"><del><strong>such power,
+which could also be used maliciously.  You might well decide to 
let</strong></del></span> a
+<span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
+considers malicious.  But there is no excuse for allowing it
+to &lt;em&gt;delete&lt;/em&gt; the programs, and you should 
have</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="#universal-back-door"&gt;
+    universal back door in</em></ins></span> the <span 
class="removed"><del><strong>right to
+decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad 
bother</em></ins></span>
+    to <span class="removed"><del><strong>trust in</strong></del></span> <span 
class="inserted"><ins><em>introduce another? Because</em></ins></span> this 
<span class="removed"><del><strong>way.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>one is 
controlled by Coolpad.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201311300"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
-    Some applications come with MyFreeProxy, which is a universal back
-    door&lt;/a&gt; that can download programs and run them.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311300"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary Android 
versions</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
+    Some applications</em></ins></span> come with <span 
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back
+    door&lt;/a&gt; that <span class="removed"><del><strong>provides remote 
access to the files stored on the device.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can download 
programs and run them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201202280"&gt;
-    &lt;p&gt;ChromeOS has a universal back
-    door. At least, Google says it does&mdash;in &lt;a
-    href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
-    section 4 of</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The Amazon Kindle-Swindle</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201202280"&gt;
+    &lt;p&gt;ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door that has been used to</strong></del></span>
+    <span class="inserted"><ins><em>door. At least, Google says it 
does&mdash;in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  One</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
+    section 4</em></ins></span> of the <span 
class="removed"><del><strong>books erased was 1984, by George Orwell.
+&lt;/p&gt;
+
+&lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200700001"&gt;
-    &lt;p&gt;In addition to its &lt;a href="#swindle-eraser"&gt;book
-    eraser&lt;/a&gt;,</em></ins></span> the <span 
class="inserted"><ins><em>Kindle-Swindle has a &lt;a
+    &lt;p&gt;In addition</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from the state.  However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>its</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
+a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+
+&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>href="#swindle-eraser"&gt;book
+    eraser&lt;/a&gt;, the</em></ins></span> Kindle-Swindle <span 
class="removed"><del><strong>also</strong></del></span> has a &lt;a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
-    universal back door&lt;/a&gt;.&lt;/p&gt;
+    universal back <span class="removed"><del><strong>door&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200612050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200612050"&gt;
     &lt;p&gt;Almost every phone's communication
-    processor has a universal back door which is &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-    often used to make a phone transmit all conversations it hears&lt;/a&gt;. 
See
+    processor has a universal</em></ins></span> back <span 
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often used</em></ins></span> to <span class="removed"><del><strong>the 
customer's data, but if the</strong></del></span> <span 
class="inserted"><ins><em>make a phone transmit all conversations it 
hears&lt;/a&gt;. See
     &lt;a 
href="/proprietary/malware-mobiles.html#universal-back-door"&gt;Malware
     in Mobile Devices&lt;/a&gt; for more info.&lt;/p&gt;
   &lt;/li&gt;
@@ -815,7 +831,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-back-doors.it.po        1 Jan 2019 20:00:36 -0000       1.110
+++ proprietary-back-doors.it.po        5 Jan 2019 08:59:19 -0000       1.111
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -52,6 +52,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-back-doors.ja-diff.html 1 Jan 2019 20:00:36 -0000       1.40
+++ proprietary-back-doors.ja-diff.html 5 Jan 2019 08:59:19 -0000       1.41
@@ -32,6 +32,10 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
+<span class="inserted"><ins><em>&lt;p&gt;We say a program has a &ldquo;back 
door&ldquo; when someone who is
+not supposed to be in control of the computer where it is installed
+can send it commands via some other channel.&lt;/p&gt;</em></ins></span>
+
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
 &lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>software.
@@ -39,18 +43,23 @@
 &lt;ul&gt;
     &lt;li&gt;
         &lt;p&gt;Xiaomi phones come with &lt;a 
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;a
-           universal back door</strong></del></span> <span 
class="inserted"><ins><em>what they are known to allow. Back doors
-that allow full control over the operating system are said to be
+           universal back door in the application processor, for
+           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+           universal back door in</strong></del></span> <span 
class="inserted"><ins><em>what they are known to allow. Back doors
+that allow full control over</em></ins></span> the <span 
class="removed"><del><strong>modem processor</strong></del></span> <span 
class="inserted"><ins><em>operating system are said to be
 &ldquo;universal&rdquo;.&lt;/p&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought to be</em></ins></span> in <span 
class="inserted"><ins><em>this page but isn't
+&lt;p&gt;If you know of an example</em></ins></span> that <span 
class="inserted"><ins><em>ought to be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>application processor, for
-           Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
+to inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>local
+           phone company can use&lt;/a&gt;.&lt;/p&gt;
+    &lt;/li&gt;
 
-        &lt;p&gt;This is separate from</strong></del></span> <span 
class="inserted"><ins><em>URL of a trustworthy reference or two
+    &lt;li&gt;&lt;p&gt;Capcom's Street Fighter V update</strong></del></span> 
<span class="inserted"><ins><em>URL of a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
@@ -70,43 +79,53 @@
   &lt;li id="M201706202"&gt;
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
-    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="#universal-back-door-phone-modem"&gt;the
-           universal</strong></del></span>
+    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;
     there is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Since these accounts with hard-coded passwords are impossible
-    to delete, this problem is not merely an insecurity; it amounts to
-    a</em></ins></span> back door <span class="removed"><del><strong>in the 
modem processor</strong></del></span> that <span 
class="removed"><del><strong>the local
-           phone company</strong></del></span> can <span 
class="removed"><del><strong>use&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>be used by the manufacturer (and
-    government) to spy on users.&lt;/p&gt;</em></ins></span>
+    to delete, this problem is not merely an insecurity; it amounts 
to</em></ins></span>
+    a <span class="removed"><del><strong>driver</strong></del></span> <span 
class="inserted"><ins><em>back door</em></ins></span> that can be used <span 
class="removed"><del><strong>as a backdoor</strong></del></span> by <span 
class="removed"><del><strong>any application
+        installed</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer (and
+    government) to spy</em></ins></span> on <span 
class="removed"><del><strong>a Windows 
computer&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-    <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Capcom's Street 
Fighter V update</strong></del></span>
+    <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Dropbox app for 
Macintosh</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201701130"&gt;
-    &lt;p&gt;WhatsApp has a feature that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed</strong></del></span>
+    &lt;p&gt;WhatsApp has a feature that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
+        total control</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
-    has been described as</em></ins></span> a <span 
class="removed"><del><strong>driver</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;back door&rdquo;&lt;/a&gt; because it would
+    has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
     enable governments to nullify its encryption.&lt;/p&gt;
 
-    &lt;p&gt;The developers say</em></ins></span> that <span 
class="removed"><del><strong>can be used</strong></del></span> <span 
class="inserted"><ins><em>it wasn't intended</em></ins></span> as a <span 
class="removed"><del><strong>backdoor</strong></del></span> <span 
class="inserted"><ins><em>back door, and that
-    may well be true. But that leaves the crucial question of whether it
-    functions as one. Because the program is nonfree, we cannot 
check</em></ins></span> by <span class="removed"><del><strong>any application
-        installed on</strong></del></span>
-    <span class="inserted"><ins><em>studying it.&lt;/p&gt;
+    &lt;p&gt;The developers say that it wasn't intended as a back door, and 
that
+    may well be true. But that leaves the crucial question</em></ins></span> 
of <span class="inserted"><ins><em>whether it
+    functions as one. Because</em></ins></span> the <span 
class="removed"><del><strong>machine</strong></del></span> <span 
class="inserted"><ins><em>program is nonfree, we cannot check</em></ins></span> 
by <span class="removed"><del><strong>repeatedly nagging the user
+        for an admini password&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>studying it.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span 
class="removed"><del><strong>id="universal-back-door-phone-modem"&gt;&lt;p&gt;The
 universal back door in portable phones &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
+    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about</strong></del></span> <span 
class="inserted"><ins><em>id="M201512280"&gt;
+    &lt;p&gt;Microsoft has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature of this problem&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201512280"&gt;
-    &lt;p&gt;Microsoft has &lt;a
+  &lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
     
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
-    backdoored its disk encryption&lt;/a&gt;.&lt;/p&gt;
+      <span class="removed"><del><strong>Microsoft has 
already</strong></del></span>
+    backdoored its disk <span 
class="removed"><del><strong>encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps</strong></del></span> 
<span class="inserted"><ins><em>encryption&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409220"&gt;
-    &lt;p&gt;Apple can, and regularly does, &lt;a
-    
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apple can, and regularly does,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+    remotely extract some</em></ins></span> data <span 
class="removed"><del><strong>about their users and their</strong></del></span> 
<span class="inserted"><ins><em>from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
@@ -121,26 +140,22 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809140"&gt;
-    &lt;p&gt;Android has</em></ins></span> a <span 
class="removed"><del><strong>Windows 
computer&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Android has a &lt;a
     
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"&gt;
     back door for remotely changing &ldquo;user&rdquo; 
settings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article suggests it might be a universal back door, but this
-    isn't clear.&lt;/p&gt;</em></ins></span>
+    isn't clear.&lt;/p&gt;
   &lt;/li&gt;
 
-    <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201607284"&gt;
-    &lt;p&gt;The</em></ins></span> Dropbox app for Macintosh &lt;a <span 
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;takes
-        total</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
-    takes</em></ins></span> control of <span class="removed"><del><strong>the 
machine by repeatedly nagging</strong></del></span> <span 
class="inserted"><ins><em>user interface items after luring</em></ins></span> 
the user
-        <span class="removed"><del><strong>for</strong></del></span> <span 
class="inserted"><ins><em>into
-    entering</em></ins></span> an <span 
class="removed"><del><strong>admini</strong></del></span> <span 
class="inserted"><ins><em>admin</em></ins></span> password&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201607284"&gt;
+    &lt;p&gt;The Dropbox app for Macintosh &lt;a
+    
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
+    takes control of user interface items after luring the user into
+    entering an admin password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="universal-back-door-phone-modem"&gt;&lt;p&gt;The
 universal</strong></del></span> <span 
class="inserted"><ins><em>id="M201604250"&gt;
+  &lt;li id="M201604250"&gt;
     &lt;p&gt;A pregnancy test controller application not only can &lt;a
     
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
     spy on many sorts of data in the phone, and in server accounts,
@@ -150,29 +165,21 @@
   &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-    Some D-Link routers&lt;/a&gt; have a</em></ins></span> back door <span 
class="inserted"><ins><em>for changing settings</em></ins></span> in <span 
class="removed"><del><strong>portable phones &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span> <span class="inserted"><ins><em>a
-    dlink</em></ins></span> of <span class="removed"><del><strong>this 
problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an eye.&lt;/p&gt;
+    Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
+    dlink of an eye.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
     router has a back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
-    routers have back doors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    routers have back doors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
-      Microsoft</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511244"&gt;
-    &lt;p&gt;Google</em></ins></span> has <span 
class="removed"><del><strong>already backdoored</strong></del></span> <span 
class="inserted"><ins><em>long had &lt;a
+  &lt;li id="M201511244"&gt;
+    &lt;p&gt;Google has long had &lt;a
     
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
-    back door to remotely unlock an Android device&lt;/a&gt;, 
unless</em></ins></span> its disk <span 
class="removed"><del><strong>encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Modern</strong></del></span>
-    <span class="inserted"><ins><em>is encrypted (possible since Android 5.0 
Lollipop, but still not
+    back door to remotely unlock an Android device&lt;/a&gt;, unless its disk
+    is encrypted (possible since Android 5.0 Lollipop, but still not
     quite the default).&lt;/p&gt;
   &lt;/li&gt;
 
@@ -183,9 +190,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern</em></ins></span> gratis game cr&hellip;apps &lt;a
+    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
     
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    collect a wide range of data about their users and their</em></ins></span> 
users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Even nastier, they do it through ad networks that merge the data
@@ -224,162 +231,95 @@
     &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
   
-&lt;li&gt;&lt;p&gt;ARRIS cable modem</strong></del></span> has <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>been used to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-  backdoor in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
-    remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;ARRIS cable modem</strong></del></span> has <span 
class="removed"><del><strong>a
+  &lt;a 
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+  backdoor in the backdoor&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>books erased 
was
-    &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
-
-    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>criticism by saying it
-    would delete books only following orders from</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>been 
used</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+    remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
      remotely.&lt;/p&gt;
   &lt;/li&gt;
 &lt;li&gt;&lt;p&gt;
-Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local back door for 4 years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
+Mac OS X had an</strong></del></span> <span class="inserted"><ins><em>books 
erased was
+    &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
 
-&lt;li&gt;&lt;p&gt;Users reported</strong></del></span>
-    <span class="inserted"><ins><em>state.  However,</em></ins></span> that 
<span class="inserted"><ins><em>policy didn't last.  In 2012 
it</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them to replace Windows 7</strong></del></span>
+    &lt;p&gt;Amazon responded to criticism by saying it
+    would delete books only following orders from the
+    state.  However, that policy didn't last.  In 2012 it</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
-    wiped a user's Kindle-Swindle</em></ins></span> and <span 
class="removed"><del><strong>8 with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>deleted her account&lt;/a&gt;, then
+    wiped a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Do other ebook readers have back doors</em></ins></span> in <span 
class="removed"><del><strong>fact &lt;a 
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that run Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
-    don't know,</em></ins></span> and <span 
class="removed"><del><strong>8&lt;/a&gt;, switching on a flag 
-    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
-    had turned it off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been used to
-&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
-models of mobile phones</strong></del></span> <span 
class="inserted"><ins><em>we</em></ins></span> have <span 
class="removed"><del><strong>a universal back door in the modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
-by Coolpad.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Microsoft Windows has a universal back door through which
-&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on the users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when
-&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-this was used&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;In Windows 10, the universal back door</strong></del></span> <span 
class="inserted"><ins><em>find out.  There</em></ins></span> is no <span 
class="removed"><del><strong>longer hidden; all
-&ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Windows 8's back doors are so gaping that
-&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
-the German government has decided it can't be trusted&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The iPhone has a back door
-&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-that allows Apple</strong></del></span> <span 
class="inserted"><ins><em>reason</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>assume that they 
don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
+    don't know, and we have no way to find out.  There is no reason to
+    assume that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  &lt;li id="M201011220"&gt;
+    &lt;p&gt;The iPhone has a</em></ins></span> back door for <span 
class="removed"><del><strong>4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;</em></ins></span>
-    &lt;p&gt;The iPhone has a back door for &lt;a
-    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
-    enabling it without <span class="removed"><del><strong>understanding.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;Users reported that</strong></del></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,
-    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for the state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but
-  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Microsoft was in fact</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+    enabling it without understanding.&lt;/p&gt;
   &lt;/li&gt;
-
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-Windows 8 also</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="inserted"><ins><em>&lt;a
-    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
-    back door <span class="removed"><del><strong>for remotely deleting 
apps&lt;/a&gt;.
-&lt;/p&gt;
+    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door</em></ins></span> that <span class="removed"><del><strong>run 
Windows 7</strong></del></span> <span class="inserted"><ins><em>can make it 
cease to function&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;
-You might well decide to let a security service that you trust
-remotely &lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> that 
<span class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article is full of confusions, errors</em></ins></span> and 
<span class="removed"><del><strong>8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span 
class="inserted"><ins><em>biases</em></ins></span> that <span 
class="removed"><del><strong>said whether</strong></del></span> <span 
class="inserted"><ins><em>we have
+    an obligation</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>expose, given that we are making a 
link</em></ins></span> to <span class="removed"><del><strong>Windows 10 when 
users 
+    had turned it off.&lt;/p&gt;
 
-    &lt;p&gt;The article is full of confusions, errors and biases that we have
-    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
 
     &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
-    any particular thing in its products. What it does enable the company
-    to do is sue other companies if they do some particular thing in
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a 
company</em></ins></span> to <span class="removed"><del><strong>permanently 
reject</strong></del></span> <span class="inserted"><ins><em>do
+    any particular thing in its products. What it does 
enable</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
+    to <span class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>do is sue other companies if they do some particular 
thing in
     their products.&lt;/li&gt;
 
-    &lt;li&gt;A company's policies about when to attack users through a back
-    door are beside the point. Inserting the back door is wrong in the
-    first place, and using the back door is always wrong too. No software
+    &lt;li&gt;A company's policies about when</em></ins></span> to <span 
class="removed"><del><strong>involve use of</strong></del></span> <span 
class="inserted"><ins><em>attack users through</em></ins></span> a back
+    door <span class="inserted"><ins><em>are beside the point. Inserting the 
back door is wrong</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>the
+    first place,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Most mobile phones have a universal</strong></del></span> <span 
class="inserted"><ins><em>using the</em></ins></span> back <span 
class="removed"><del><strong>door, which has been used</strong></del></span> 
<span class="inserted"><ins><em>door is always wrong too. No software
     developer should have that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word to refer to sharing copies is a smear;
+    attacking ships. Using that word</em></ins></span> to <span 
class="inserted"><ins><em>refer to sharing copies is a smear;
     please don't smear sharing.&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
-    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    total confusion. The term &ldquo;IP&rdquo; itself is a</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
     that have nothing in common&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
@@ -388,23 +328,28 @@
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
     to the boundary line, not even with a jackhammer, because it is an
     abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
-    &lt;/ul&gt;
+    &lt;/ul&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    moral weakness</em></ins></span> of <span 
class="inserted"><ins><em>surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    &lt;p&gt;Baidu's proprietary</em></ins></span> Android <span 
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door&lt;/a&gt;. Nearly all
+models of mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>door that &lt;a
     
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
@@ -414,63 +359,76 @@
 
   &lt;li id="M201112080"&gt;
     &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;, Windows 8 has a back door for &lt;a
+    door&lt;/a&gt;, Windows 8 has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>for &lt;a
     
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You might well decide to let a security service that you trust
-    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that 
it</em></ins></span> considers malicious.
-    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
-    should have the right to decide <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this 
<span class="removed"><del><strong>way.
-&lt;/p&gt;
-
-&lt;p&gt;
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;You might well decide</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>let a security 
service that you trust
+    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+    But there</em></ins></span> is <span 
class="removed"><del><strong>controlled
+by Coolpad.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>no excuse for 
&lt;em&gt;deleting&lt;/em&gt; the programs, and you
+    should have the right to decide whom (if anyone) to trust in this
+    way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Microsoft Windows</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;
     &lt;p&gt;In Android, &lt;a
     
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> in a
-    program called <span class="removed"><del><strong>GTalkService).
-&lt;/p&gt;
+    Google</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>to remotely delete apps&lt;/a&gt;. (It was in a
+    program called GTalkService,</em></ins></span> which
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever</strong></del></span> <span 
class="inserted"><ins><em>seems since then to have been
+    merged into Google Play.)&lt;/p&gt;
 
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems since then to have been
-    merged into</em></ins></span> Google <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
-
-    &lt;p&gt;Google</em></ins></span> can also &lt;a
-    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google 
Play).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.</em></ins></span>  This is
-    not equivalent to a universal back door, but permits various dirty <span 
class="removed"><del><strong>tricks.
+    &lt;p&gt;Google</em></ins></span> can <span 
class="removed"><del><strong>be imposed on the users&lt;/a&gt;.
 &lt;/p&gt;
+&lt;p&gt;More information on when</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10, the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
+    not equivalent to a</em></ins></span> universal back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
+    tricks.&lt;/p&gt;
+
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point</em></ins></span> is <span 
class="removed"><del><strong>no longer hidden; all
+&ldquo;upgrades&rdquo; will</strong></del></span> <span 
class="inserted"><ins><em>that nobody should have such power,
+    which could also</em></ins></span> be <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+and immediately imposed&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
-Although</strong></del></span>
-    <span class="inserted"><ins><em>tricks.&lt;/p&gt;
-
-    &lt;p&gt;Although</em></ins></span> Google's &lt;em&gt;exercise&lt;/em&gt; 
of this power has not been
-    malicious so far, the point is that nobody should have such power,
-    which could also be <span class="removed"><del><strong>used maliciously.  
You might well decide</strong></del></span> <span 
class="inserted"><ins><em>used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing it to
+&lt;li&gt;
+&lt;p&gt;Windows 8's back doors are so gaping</strong></del></span> <span 
class="inserted"><ins><em>used maliciously.  You might well decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; 
programs</em></ins></span> that
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
+the German government has decided</strong></del></span>
+    it <span class="removed"><del><strong>can't be trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>considers 
malicious.  But there is no excuse for allowing it to
     &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this way.&lt;/p&gt;
+    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200808110"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
     &lt;p&gt;The iPhone has a back door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
     that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
-    this power because of course we can trust Apple.&lt;/p&gt;
+    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
+    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The iPhone has</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
@@ -479,74 +437,125 @@
   &lt;li id="M201812300"&gt;
     &lt;p&gt;New GM cars &lt;a
     href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
+    offer the feature of</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Every nonfree program offers the user zero security against its
+    &lt;p&gt;Every nonfree program offers</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8</strong></del></span> <span class="inserted"><ins><em>user 
zero</em></ins></span> security <span 
class="removed"><del><strong>improvements&lt;/a&gt;; but</strong></del></span> 
<span class="inserted"><ins><em>against its
     developer. With this malfeature, GM has explicitly made things even
     worse.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
     listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711010"&gt;
-    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+Windows 8 also</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711010"&gt;
+    &lt;p&gt;Sony</em></ins></span> has <span 
class="inserted"><ins><em>brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered to a server that requires
+    with</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door for remotely deleting apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You might well decide</strong></del></span> <span 
class="inserted"><ins><em>door, and tethered</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> a <span 
class="removed"><del><strong>security service that you trust
+remotely &lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> that <span 
class="removed"><del><strong>it considers malicious.
+But there is no excuse for &lt;em&gt;deleting&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709091"&gt;
-    &lt;p&gt;Tesla used software to limit the part of the battery
-    that was available to customers in some cars, and &lt;a
+    &lt;p&gt;Tesla used software to limit</em></ins></span> the <span 
class="removed"><del><strong>programs, and you
+should have</strong></del></span> <span class="inserted"><ins><em>part 
of</em></ins></span> the <span class="removed"><del><strong>right to decide who 
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
+    that was available</em></ins></span> to <span 
class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
-    a universal back door in the software&lt;/a&gt; to temporarily increase
-    this limit.&lt;/p&gt;
+    a universal back door</em></ins></span> in <span 
class="inserted"><ins><em>the software&lt;/a&gt; to temporarily 
increase</em></ins></span>
+    this <span class="removed"><del><strong>way.
+&lt;/p&gt;
+
+&lt;p&gt;
+As these pages show, if you do want</strong></del></span> <span 
class="inserted"><ins><em>limit.&lt;/p&gt;
 
-    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
+    &lt;p&gt;While remotely allowing car 
&ldquo;owners&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>clean your computer</strong></del></span> <span 
class="inserted"><ins><em>use the
     whole battery capacity did not do them any harm, the same back
-    door would permit Tesla (perhaps under the command of some
-    government) to remotely order the car to use none of its battery. Or
-    perhaps to drive its passenger to a torture prison.&lt;/p&gt;
+    door would permit Tesla (perhaps under the command</em></ins></span> of 
<span class="removed"><del><strong>malware,</strong></del></span> <span 
class="inserted"><ins><em>some
+    government) to remotely order</em></ins></span> the <span 
class="removed"><del><strong>first software</strong></del></span> <span 
class="inserted"><ins><em>car</em></ins></span> to <span 
class="removed"><del><strong>delete is Windows or iOS.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use none of 
its battery. Or
+    perhaps to drive its passenger to a torture 
prison.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702061"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;In Android,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702061"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+Google has</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
     have a universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
-    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
-    a universal back door in the application processor, for Xiaomi's
+    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;</em></ins></span>
+    a <span class="inserted"><ins><em>universal</em></ins></span> back door 
<span class="removed"><del><strong>to remotely delete apps.&lt;/a&gt;  
(It</strong></del></span> <span class="inserted"><ins><em>in the application 
processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
+    &lt;p&gt;This</em></ins></span> is <span 
class="inserted"><ins><em>separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door</em></ins></span> in <span 
class="inserted"><ins><em>the modem processor that the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201608172"&gt;
     &lt;p id="windows-update"&gt;Microsoft
-    Windows has a universal back door through which &lt;a
+    Windows has</em></ins></span> a <span class="removed"><del><strong>program
+called GTalkService).
+&lt;/p&gt;
+
+&lt;p&gt;
+Google</strong></del></span> <span class="inserted"><ins><em>universal back 
door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
-    any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
+    any change whatsoever</em></ins></span> can <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>be imposed on the users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This was &lt;a
-    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
-    that Microsoft used the same method to push the &lt;a
+    &lt;p&gt;This was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+forcibly</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+    reported in 2007&lt;/a&gt; for XP</em></ins></span> and <span 
class="removed"><del><strong>remotely install apps&lt;/a&gt; through 
GTalkService (which
+seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and 
it seems</em></ins></span>
+    that <span class="removed"><del><strong>article,</strong></del></span> 
<span class="inserted"><ins><em>Microsoft used the same 
method</em></ins></span> to <span class="removed"><del><strong>have been merged 
into Google Play).
+This is not equivalent</strong></del></span> <span 
class="inserted"><ins><em>push the &lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
-    Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
+    Windows 10 downgrade&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>computers running Windows 7 and 8.&lt;/p&gt;
+
+    &lt;p&gt;In Windows 10, the</em></ins></span> universal back <span 
class="removed"><del><strong>door, but permits various
+dirty tricks.
+&lt;/p&gt;
 
-    &lt;p&gt;In Windows 10, the universal back door
-    is no longer hidden; all &ldquo;upgrades&rdquo; will be &lt;a
+&lt;p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+malicious so far, the point</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span>
+    is <span class="removed"><del><strong>that nobody should have such power,
+which could also</strong></del></span> <span class="inserted"><ins><em>no 
longer hidden; all &ldquo;upgrades&rdquo; will</em></ins></span> be <span 
class="removed"><del><strong>used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;
     forcibly and immediately imposed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -801,7 +810,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary-back-doors.ja.po        1 Jan 2019 20:00:36 -0000       1.90
+++ proprietary-back-doors.ja.po        5 Jan 2019 08:59:19 -0000       1.91
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -51,6 +51,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-back-doors.pot  1 Jan 2019 20:00:36 -0000       1.60
+++ proprietary-back-doors.pot  5 Jan 2019 08:59:19 -0000       1.61
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -42,6 +42,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be "

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary-back-doors.ru.po        1 Jan 2019 20:58:56 -0000       1.160
+++ proprietary-back-doors.ru.po        5 Jan 2019 08:59:19 -0000       1.161
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -51,6 +52,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary.de-diff.html    1 Jan 2019 20:00:36 -0000       1.26
+++ proprietary.de-diff.html    5 Jan 2019 08:59:19 -0000       1.27
@@ -139,11 +139,11 @@
  &lt;tr&gt;
   &lt;td colspan="2"&gt;
    &lt;ol&gt;
-    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
-     running on your computer, and listens for commands from someone
-     else who can tell it</em></ins></span> to
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any feature of a 
program
+     that enables someone who is not supposed</em></ins></span> to
 <span class="removed"><del><strong>servers&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>do things without asking your approval.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>be in control of the
+     computer where it is installed to send it commands.&lt;/li&gt;
 
     &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
     <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
@@ -321,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.de.po   1 Jan 2019 20:00:36 -0000       1.69
+++ proprietary.de.po   5 Jan 2019 08:59:19 -0000       1.70
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -326,9 +326,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.es.po   3 Jan 2019 10:39:52 -0000       1.72
+++ proprietary.es.po   5 Jan 2019 08:59:19 -0000       1.73
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2019-01-03 11:29+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -232,13 +233,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
-"ordenador, que esté a la espera de comandos procedentes de un extraño que "
-"puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -528,6 +526,15 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
+#~ "ordenador, que esté a la espera de comandos procedentes de un extraño 
que "
+#~ "puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+
+#~ msgid ""
 #~ "Some Android apps <a href=\"https://www.androidauthority.com/apps-";
 #~ "uninstall-trackers-917539/amp/\"> track the phones of users that have "
 #~ "deleted them</a>."

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary.fr.po   1 Jan 2019 22:19:49 -0000       1.87
+++ proprietary.fr.po   5 Jan 2019 08:59:19 -0000       1.88
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2019-01-01 23:19+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -229,13 +230,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Porte dérobée :</em>  Tout programme en fonctionnement sur votre "
-"ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce dernier 
"
-"pouvant lui dire de faire des choses sans vous demander la permission."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -525,3 +523,13 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Porte dérobée :</em>  Tout programme en fonctionnement sur votre "
+#~ "ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce "
+#~ "dernier pouvant lui dire de faire des choses sans vous demander la "
+#~ "permission."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.it-diff.html    1 Jan 2019 20:00:36 -0000       1.38
+++ proprietary.it-diff.html    5 Jan 2019 08:59:19 -0000       1.39
@@ -43,14 +43,14 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 40em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -97,17 +97,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -138,11 +138,11 @@
  &lt;tr&gt;
   &lt;td colspan="2"&gt;
    &lt;ol&gt;
-    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
-     running on your computer, and listens for commands from someone
-     else who can tell it</em></ins></span> to
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any feature of a 
program
+     that enables someone who is not supposed</em></ins></span> to
 <span class="removed"><del><strong>servers&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>do things without asking your approval.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>be in control of the
+     computer where it is installed to send it commands.&lt;/li&gt;
 
     &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
     <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
@@ -320,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.it.po   1 Jan 2019 20:00:36 -0000       1.78
+++ proprietary.it.po   5 Jan 2019 08:59:19 -0000       1.79
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -331,9 +331,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.ja-diff.html    1 Jan 2019 20:00:36 -0000       1.39
+++ proprietary.ja-diff.html    5 Jan 2019 08:59:19 -0000       1.40
@@ -136,11 +136,11 @@
  &lt;tr&gt;
   &lt;td colspan="2"&gt;
    &lt;ol&gt;
-    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
-     running on your computer, and listens for commands from someone
-     else who can tell it</em></ins></span> to
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any feature of a 
program
+     that enables someone who is not supposed</em></ins></span> to
 <span class="removed"><del><strong>servers&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>do things without asking your approval.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>be in control of the
+     computer where it is installed to send it commands.&lt;/li&gt;
 
     &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
     <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
@@ -317,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.ja.po   1 Jan 2019 20:00:36 -0000       1.61
+++ proprietary.ja.po   5 Jan 2019 08:59:19 -0000       1.62
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -272,9 +272,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.nl-diff.html    1 Jan 2019 20:00:36 -0000       1.38
+++ proprietary.nl-diff.html    5 Jan 2019 08:59:19 -0000       1.39
@@ -43,14 +43,14 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 40em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -97,18 +97,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -138,11 +138,11 @@
  &lt;tr&gt;
   &lt;td colspan="2"&gt;
    &lt;ol&gt;
-    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
-     running on your computer, and listens for commands from someone
-     else who can tell it</em></ins></span> to
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any feature of a 
program
+     that enables someone who is not supposed</em></ins></span> to
 <span class="removed"><del><strong>servers&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>do things without asking your approval.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>be in control of the
+     computer where it is installed to send it commands.&lt;/li&gt;
 
     &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
     <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
@@ -320,7 +320,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary.nl.po   1 Jan 2019 20:00:36 -0000       1.50
+++ proprietary.nl.po   5 Jan 2019 08:59:19 -0000       1.51
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -324,9 +324,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.pl-diff.html    1 Jan 2019 20:00:36 -0000       1.56
+++ proprietary.pl-diff.html    5 Jan 2019 08:59:19 -0000       1.57
@@ -40,8 +40,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -123,9 +123,9 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -139,9 +139,9 @@
  &lt;tr&gt;
   &lt;td colspan="2"&gt;
    &lt;ol&gt;
-    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
-     running on your computer, and listens for commands from someone
-     else who can tell it to do things without asking your approval.&lt;/li&gt;
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any feature of a 
program
+     that enables someone who is not supposed to be in control of the
+     computer where it is installed to send it commands.&lt;/li&gt;
 
     &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
     <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
@@ -318,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.pl.po   1 Jan 2019 20:00:36 -0000       1.45
+++ proprietary.pl.po   5 Jan 2019 08:59:19 -0000       1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -404,9 +404,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary.pot     1 Jan 2019 20:00:36 -0000       1.42
+++ proprietary.pot     5 Jan 2019 08:59:19 -0000       1.43
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -197,9 +197,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary.pt-br.po        1 Jan 2019 21:59:32 -0000       1.43
+++ proprietary.pt-br.po        5 Jan 2019 08:59:19 -0000       1.44
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2019-01-01 19:44-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -229,13 +230,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Back door:</em>&nbsp; qualquer parte do software que está sendo "
-"executado no seu computador, e ouve comandos de alguém que pode dizer para "
-"fazer as coisas sem pedir sua aprovação."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -519,6 +517,15 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Back door:</em>&nbsp; qualquer parte do software que está sendo "
+#~ "executado no seu computador, e ouve comandos de alguém que pode dizer "
+#~ "para fazer as coisas sem pedir sua aprovação."
+
+#~ msgid ""
 #~ "Some Android apps <a href=\"https://www.androidauthority.com/apps-";
 #~ "uninstall-trackers-917539/amp/\"> track the phones of users that have "
 #~ "deleted them</a>."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary.ru.po   1 Jan 2019 20:58:56 -0000       1.114
+++ proprietary.ru.po   5 Jan 2019 08:59:19 -0000       1.115
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2018-12-11 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -233,13 +234,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Лазейка:</em>&nbsp;&mdash; любой участок 
программы, работающей на вашем "
-"компьютере и слушающийся команд, прих
одящих от кого-то другого, кто может "
-"приказывать ей делать что-то без вашего 
разрешения."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -531,6 +529,15 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Лазейка:</em>&nbsp;&mdash; любой участок 
программы, работающей на "
+#~ "вашем компьютере и слушающийся команд, 
приходящих от кого-то другого, кто "
+#~ "может приказывать ей делать что-то без 
вашего разрешения."
+
+#~ msgid ""
 #~ "Some Android apps <a href=\"https://www.androidauthority.com/apps-";
 #~ "uninstall-trackers-917539/amp/\"> track the phones of users that have "
 #~ "deleted them</a>."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.zh-tw-diff.html 1 Jan 2019 20:00:36 -0000       1.16
+++ proprietary.zh-tw-diff.html 5 Jan 2019 08:59:19 -0000       1.17
@@ -139,11 +139,11 @@
  &lt;tr&gt;
   &lt;td colspan="2"&gt;
    &lt;ol&gt;
-    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
-     running on your computer, and listens for commands from someone
-     else who can tell it</em></ins></span> to
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any feature of a 
program
+     that enables someone who is not supposed</em></ins></span> to
 <span class="removed"><del><strong>servers&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>do things without asking your approval.&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>be in control of the
+     computer where it is installed to send it commands.&lt;/li&gt;
 
     &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
     <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
@@ -321,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary.zh-tw.po        1 Jan 2019 20:00:36 -0000       1.28
+++ proprietary.zh-tw.po        5 Jan 2019 08:59:19 -0000       1.29
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -263,9 +263,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- pt-br.po    1 Jan 2019 21:59:32 -0000       1.4
+++ pt-br.po    5 Jan 2019 08:59:19 -0000       1.5
@@ -4678,6 +4678,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -5583,13 +5590,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Back door:</em>&nbsp; qualquer parte do software que está sendo "
-"executado no seu computador, e ouve comandos de alguém que pode dizer para "
-"fazer as coisas sem pedir sua aprovação."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -6507,6 +6511,15 @@
 msgstr ""
 
 #~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Back door:</em>&nbsp; qualquer parte do software que está sendo "
+#~ "executado no seu computador, e ouve comandos de alguém que pode dizer "
+#~ "para fazer as coisas sem pedir sua aprovação."
+
+#~ msgid ""
 #~ "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
 #~ "Foundation, Inc."
 #~ msgstr ""

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- ru.po       1 Jan 2019 21:29:25 -0000       1.7
+++ ru.po       5 Jan 2019 08:59:19 -0000       1.8
@@ -6600,6 +6600,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -7746,13 +7753,10 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Лазейка:</em>&nbsp;&mdash; любой участок 
программы, работающей на вашем "
-"компьютере и слушающийся команд, прих
одящих от кого-то другого, кто может "
-"приказывать ей делать что-то без вашего 
разрешения."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
@@ -8868,6 +8872,15 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";> В "
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
+#~ msgid ""
+#~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Лазейка:</em>&nbsp;&mdash; любой участок 
программы, работающей на "
+#~ "вашем компьютере и слушающийся команд, 
приходящих от кого-то другого, кто "
+#~ "может приказывать ей делать что-то без 
вашего разрешения."
+
 # type: Content of: <div><p>
 #~ msgid "Copyright &copy; 2014-2018 Free Software Foundation, Inc."
 #~ msgstr "Copyright &copy; 2014-2018 Free Software Foundation, Inc."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- zh-tw.po    1 Jan 2019 20:00:36 -0000       1.3
+++ zh-tw.po    5 Jan 2019 08:59:20 -0000       1.4
@@ -4575,6 +4575,13 @@
 
 #. type: Content of: <div><p>
 msgid ""
+"We say a program has a &ldquo;back door&ldquo; when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
 "Here are examples of demonstrated back doors in proprietary software.  They "
 "are sorted out according to what they are known to allow. Back doors that "
 "allow full control over the operating system are said to be &ldquo;"
@@ -5487,9 +5494,9 @@
 
 #. type: Content of: <table><tr><td><ol><li>
 msgid ""
-"<em>Back door:</em>&nbsp; any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em>&nbsp; any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
 msgstr ""
 
 #. type: Content of: <table><tr><td><ol><li>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]