www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www manual/allgnupkgs.pt-br.html manual/po/allg...


From: GNUN
Subject: www manual/allgnupkgs.pt-br.html manual/po/allg...
Date: Sat, 2 Feb 2019 08:31:38 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/02 08:31:33

Modified files:
        manual         : allgnupkgs.pt-br.html 
        manual/po      : allgnupkgs.pt-br.po manual.pt-br.po 
                         manual.translist 
        philosophy/po  : phone-anonymous-payment.pt-br.po 
                         phone-anonymous-payment.translist 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-sabotage.de-diff.html 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 
Added files:
        manual         : manual.pt-br.html 
        manual/po      : manual.pt-br-en.html 
        philosophy     : phone-anonymous-payment.pt-br.html 
        philosophy/po  : phone-anonymous-payment.pt-br-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.pt-br.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/manual.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/manual.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/manual.translist?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/manual.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/phone-anonymous-payment.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/phone-anonymous-payment.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/phone-anonymous-payment.translist?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/phone-anonymous-payment.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.364&r2=1.365
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.456&r2=1.457
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.18&r2=1.19

Patches:
Index: manual/allgnupkgs.pt-br.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.pt-br.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- manual/allgnupkgs.pt-br.html        21 Jan 2019 07:59:33 -0000      1.69
+++ manual/allgnupkgs.pt-br.html        2 Feb 2019 13:31:26 -0000       1.70
@@ -1,37 +1,29 @@
+
 <!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
 <p>
-<a href="#Archiving">Archiving</a> -
-<a href="#Audio">Audio</a> -
-<a href="#Business">Business&nbsp;and&nbsp;productivity</a> -
-<a href="#Database">Database</a> -
-<a href="#Dictionaries">Dictionaries</a> -
-<a href="#Translation">Documentation&nbsp;translation</a> -
-<a href="#Editors">Editors</a> -
-<a href="#Education">Education</a> -
-<a href="#Email">Email</a> -
-<a href="#Fonts">Fonts</a> -
-<a href="#gnuorg">GNU&nbsp;organization</a> -
-<a href="#Games">Games</a> -
-<a href="#Graphics">Graphics</a> -
-<a href="#Health">Health</a> -
-<a href="#Interface">Interface</a> -
-<a href="#Internet">Internet&nbsp;applications</a> -
-<a href="#Live">Live&nbsp;communications</a> -
-<a href="#Localization">Localization</a> -
-<a href="#Mathematics">Mathematics</a> -
-<a href="#Music">Music</a> -
-<a href="#Printing">Printing</a> -
-<a href="#Science">Science</a> -
-<a href="#Security">Security</a> -
-<a href="#Software">Software&nbsp;development</a> -
-<a href="#Libraries">Software&nbsp;libraries</a> -
-<a href="#Spreadsheets">Spreadsheets</a> -
-<a href="#Sysadmin">System&nbsp;administration</a> -
-<a href="#Telephony">Telephony</a> -
-<a href="#Text">Text&nbsp;creation&nbsp;and&nbsp;manipulation</a> -
-<a href="#Version">Version&nbsp;control</a> -
-<a href="#Video">Video</a> -
-<a href="#Web">Web&nbsp;authoring</a> -
+<a href="#Archiving">Arquivamento</a> - <a href="#Audio">Áudio</a> - <a
+href="#Business">Negócios&nbsp;e&nbsp;produtividade</a> - <a
+href="#Database">Banco de dados</a> - <a
+href="#Dictionaries">Dicionários</a> - <a
+href="#Translation">Tradução&nbsp;da&nbsp;documentação</a> - <a
+href="#Editors">Editores</a> - <a href="#Education">Educação</a> - <a
+href="#Email">E-mail</a> - <a href="#Fonts">Fontes</a> - <a
+href="#gnuorg">Organização&nbsp;do&nbsp;GNU</a> - <a href="#Games">Jogos</a>
+- <a href="#Graphics">Gráficos</a> - <a href="#Health">Saúde</a> - <a
+href="#Interface">Interface</a> - <a
+href="#Internet">Aplicativos&nbsp;de&nbsp;Internet</a> - <a
+href="#Live">Comunicações&nbsp;ao&nbsp;vivo</a> - <a
+href="#Localization">Localização</a> - <a href="#Mathematics">Matemática</a>
+- <a href="#Music">Música</a> - <a href="#Printing">Impressão</a> - <a
+href="#Science">Ciência</a> - <a href="#Security">Segurança</a> - <a
+href="#Software">Desenvolvimento&nbsp;de&nbsp;software</a> - <a
+href="#Libraries">Bibliotecas&nbsp;de&nbsp;software</a> - <a
+href="#Spreadsheets">Planilhas</a> - <a
+href="#Sysadmin">Administração&nbsp;de&nbsp;sistema</a> - <a
+href="#Telephony">Telefonia</a> - <a
+href="#Text">Criação&nbsp;e&nbsp;manipulação&nbsp;de&nbsp;texto</a> - <a
+href="#Version">Controle&nbsp;de&nbsp;versão</a> - <a
+href="#Video">Vídeo</a> - <a href="#Web">Autoria&nbsp;web</a> -
 </p>
 
 <table>
@@ -40,1867 +32,1970 @@
 
 
 <tr>
-<td id="Archiving" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><big><b>Archiving</b></big></td></tr>
+<td id="Archiving" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><big><b>Arquivamento</b></big></td></tr>
 
 <tr id="cpio"><td>* <a href="/software/cpio/manual/">Cpio</a></td>
-    <td>Manage cpio and tar file archives.
-       [<a href="/software/cpio/">cpio&nbsp;home</a>]</td></tr>
+    <td>Gerencia pacotes de arquivos cpio e tar.  [<a
+href="/software/cpio/">página&nbsp;do&nbsp;cpio</a>]</td></tr>
 
 <tr id="gzip"><td>* <a href="/software/gzip/manual/">Gzip</a></td>
-    <td>General file (de)compression (using lzw).
-       [<a href="/software/gzip/">gzip&nbsp;home</a>]</td></tr>
+    <td>(De)compressão de arquivos em geral (usando lzw).  [<a
+href="/software/gzip/">página&nbsp;do&nbsp;gzip</a>]</td></tr>
 
 <tr id="paxutils"><td>* <a href="/software/paxutils/">Paxutils</a></td>
-    <td>Manage cpio, tar, and pax file archives.
-       [<a href="/software/paxutils/">paxutils&nbsp;home</a>]</td></tr>
+    <td>Gerencia pacotes de arquivos cpio, tar e pax.  [<a
+href="/software/paxutils/">página&nbsp;do&nbsp;paxutils</a>]</td></tr>
 
 <tr id="sharutils"><td>* <a 
href="/software/sharutils/manual/">Sharutils</a></td>
-    <td>Archives in shell scripts, uuencode/uudecode.
-       [<a href="/software/sharutils/">sharutils&nbsp;home</a>]</td></tr>
+    <td>Pacotes em scripts shell, uuencode/uudecode.  [<a
+href="/software/sharutils/">página&nbsp;do&nbsp;sharutils</a>]</td></tr>
 
 <tr id="tar"><td>* <a href="/software/tar/manual/">Tar</a></td>
-    <td>Managing tar archives.
-       [<a href="/software/tar/">tar&nbsp;home</a>]</td></tr>
+    <td>Gerencia pacotes tar.  [<a
+href="/software/tar/">página&nbsp;do&nbsp;tar</a>]</td></tr>
 
 <tr id="xorriso"><td>* <a 
href="/software/xorriso/man_1_xorriso.html">Xorriso</a></td>
-    <td>Create, manipulate, burn ISO-9660 filesystems.
-       [<a href="/software/xorriso/">xorriso&nbsp;home</a>]</td></tr>
+    <td>Cria, manipula, grava sistemas de arquivos ISO-9660.  [<a
+href="/software/xorriso/">página&nbsp;do&nbsp;xorriso</a>]</td></tr>
 
 
 <tr>
-<td id="Audio" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/aud/";><big><b>Audio</b></big></a></td></tr>
+<td id="Audio" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/aud/";><big><b>Áudio</b></big></a></td></tr>
 
 <tr id="ccd2cue"><td>* <a href="/software/ccd2cue/manual/">Ccd2cue</a></td>
-    <td>CCD to CUE sheet conversion.
-       [<a href="/software/ccd2cue/">ccd2cue&nbsp;home</a>]</td></tr>
+    <td>Conversão de CCD para CUE.  [<a
+href="/software/ccd2cue/">página&nbsp;do&nbsp;ccd2cue</a>]</td></tr>
 
 <tr id="emms"><td>* <a 
href="https://www.gnu.org/software/emms/manual/";>EMMS</a></td>
-    <td>Emacs Multimedia System.
-       [<a href="/software/emms/">emms&nbsp;home</a>]</td></tr>
+    <td>Sistema de multimídia do Emacs.  [<a
+href="/software/emms/">página&nbsp;do&nbsp;emms</a>]</td></tr>
 
-<tr id="gmediaserver"><td>* <a 
href="https://www.gnu.org/software/gmediaserver/manual/";>Gmediaserver</a></td>
-    <td>UPnP compatible media server.
-       [<a href="/software/gmediaserver/">gmediaserver&nbsp;home</a>]</td></tr>
+<tr id="gmediaserver"><td>* <a
+href="https://www.gnu.org/software/gmediaserver/manual/";>Gmediaserver</a></td>
+    <td>Servidor de mídia compatível com UPnP.  [<a
+href="/software/gmediaserver/">página&nbsp;do&nbsp;gmediaserver</a>]</td></tr>
 
 <tr id="gnufm"><td>* <a href="/software/gnufm/">GNUfm</a></td>
-    <td>Social music explorations.
-       [<a href="/software/gnufm/">gnufm&nbsp;home</a>]</td></tr>
+    <td>Explorações de música social.  [<a
+href="/software/gnufm/">página&nbsp;do&nbsp;gnufm</a>]</td></tr>
 
 <tr id="gnump3d"><td>* <a 
href="/software/gnump3d/documents.html">GNUmp3d</a></td>
-    <td>Server for streaming audio files.
-       [<a href="/software/gnump3d/">gnump3d&nbsp;home</a>]</td></tr>
+    <td>Servidor para fazer streaming de arquivos de áudio.  [<a
+href="/software/gnump3d/">página&nbsp;do&nbsp;gnump3d</a>]</td></tr>
 
 <tr id="gnupod"><td>* <a href="/software/gnupod/gnupod.html">GNUpod</a></td>
-    <td>Manage portable audio device.
-       [<a href="/software/gnupod/">gnupod&nbsp;home</a>]</td></tr>
+    <td>Gerencia dispositivo de áudio portátil.  [<a
+href="/software/gnupod/">página&nbsp;do&nbsp;gnupod</a>]</td></tr>
 
 <tr id="gnuradio"><td>* <a 
href="http://gnuradio.org/redmine/projects/gnuradio/wiki";>Radio</a></td>
-    <td>Software radio implementations.
-       [<a href="/software/gnuradio/">gnuradio&nbsp;home</a>]</td></tr>
+    <td>Implementações de rádio por software  [<a
+href="/software/gnuradio/">página&nbsp;do&nbsp;gnuradio</a>]</td></tr>
 
 <tr id="gnusound"><td>* <a 
href="/software/gnusound/Documentation/">GNUsound</a></td>
-    <td>Multi-track sound editor for GNOME.
-       [<a href="/software/gnusound/">gnusound&nbsp;home</a>]</td></tr>
+    <td>Editor de som multi-trilhas para o GNOME.  [<a
+href="/software/gnusound/">página&nbsp;do&nbsp;gnusound</a>]</td></tr>
 
 <tr id="guile-sdl"><td>* <a 
href="/software/guile-sdl/manual/">Guile-SDL</a></td>
-    <td>Guile interface for SDL (Simple DirectMedia Layer).
-       [<a href="/software/guile-sdl/">guile-sdl&nbsp;home</a>]</td></tr>
+    <td>Interface Guile para SDL (Simple DirectMedia Layer).  [<a
+href="/software/guile-sdl/">página&nbsp;do&nbsp;guile-sdl</a>]</td></tr>
 
 <tr id="libcdio"><td>* <a 
href="https://www.gnu.org/software/libcdio/libcdio.html";>Libcdio</a>
-<small>(<a 
href="https://www.gnu.org/software/libcdio/cd-text-format.html";>cd-text</a>)</small>
+<small>(<a
+href="https://www.gnu.org/software/libcdio/cd-text-format.html";>cd-text</a>)</small>
 </td>
-    <td>CD Input and Control library.
-       [<a href="/software/libcdio/">libcdio&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de controle e entrada de CD.  [<a
+href="/software/libcdio/">página&nbsp;do&nbsp;libcdio</a>]</td></tr>
 
-<tr id="libextractor"><td>* <a 
href="https://www.gnu.org/software/libextractor/manual/html_node/";>Libextractor</a></td>
-    <td>Library to extract meta-data from media files.
-       [<a href="/software/libextractor/">libextractor&nbsp;home</a>]</td></tr>
+<tr id="libextractor"><td>* <a
+href="https://www.gnu.org/software/libextractor/manual/html_node/";>Libextractor</a></td>
+    <td>Biblioteca para extrair metadados de arquivos de mídia.  [<a
+href="/software/libextractor/">página&nbsp;do&nbsp;libextractor</a>]</td></tr>
 
 <tr id="speex"><td>* <a href="http://www.speex.org/docs/";>Speex</a></td>
-    <td>Library for patent-free audio compression format.
-       [<a href="/software/speex/">speex&nbsp;home</a>]</td></tr>
+    <td>Biblioteca para formato de compressão de áudio livre de patentes.  
[<a
+href="/software/speex/">página&nbsp;do&nbsp;speex</a>]</td></tr>
 
 
 <tr>
-<td id="Business" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/prod/";><big><b>Business and 
productivity</b></big></a></td></tr>
+<td id="Business" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/prod/";><big><b>Negócios e
+produtividade</b></big></a></td></tr>
 
 <tr id="barcode"><td>* <a href="/software/barcode/">Barcode</a></td>
-    <td>Convert text strings to printed bars in various standards.
-       [<a href="/software/barcode/">barcode&nbsp;home</a>]</td></tr>
+    <td>Converte sequências de texto para barras impressas em vários 
padrões.  [<a
+href="/software/barcode/">página&nbsp;do&nbsp;barcode</a>]</td></tr>
 
-<tr id="bpel2owfn"><td>* <a 
href="https://www.gnu.org/software/bpel2owfn/manual/2.0.x/bpel2owfn.html";>BPEL2oWFN</a></td>
-    <td>Translating web service in BPEL to Open Workflow Nets.
-       [<a href="/software/bpel2owfn/">bpel2owfn&nbsp;home</a>]</td></tr>
+<tr id="bpel2owfn"><td>* <a
+href="https://www.gnu.org/software/bpel2owfn/manual/2.0.x/bpel2owfn.html";>BPEL2oWFN</a></td>
+    <td>Tradução de serviço web em BPEL para Open Workflow Nets.  [<a
+href="/software/bpel2owfn/">página&nbsp;do&nbsp;bpel2owfn</a>]</td></tr>
 
 <tr id="foliot"><td>* <a href="/software/foliot/">Foliot</a></td>
-    <td>An application for tracking time spent on projects.
-       [<a href="/software/foliot/">foliot&nbsp;home</a>]</td></tr>
+    <td>Um aplicativo para rastrear o tempo gasto em projetos.  [<a
+href="/software/foliot/">página&nbsp;do&nbsp;foliot</a>]</td></tr>
 
 <tr id="gcal"><td>* <a href="/software/gcal/manual/">Gcal</a></td>
-    <td>Calculating and printing a wide variety of calendars.
-       [<a href="/software/gcal/">gcal&nbsp;home</a>]</td></tr>
+    <td>Cálculo e impressão de uma ampla variedade de calendários.  [<a
+href="/software/gcal/">página&nbsp;do&nbsp;gcal</a>]</td></tr>
 
 <tr id="gnucash"><td>* <a 
href="http://www.gnucash.org/docs.phtml";>GnuCash</a></td>
-    <td>Personal and small business financial accounting software.
-       [<a href="/software/gnucash/">gnucash&nbsp;home</a>]</td></tr>
+    <td>Software de contabilidade financeira pessoal e de pequenas empresas.  
[<a
+href="/software/gnucash/">página&nbsp;do&nbsp;gnucash</a>]</td></tr>
 
 <tr id="gnue"><td>* <a href="/software/gnue/">GNU Enterprise</a></td>
-    <td>Enterprise resource planning, et al.
-       [<a href="/software/gnue/">gnue&nbsp;home</a>]</td></tr>
+    <td>Planejamento de recursos empresariais e outros.  [<a
+href="/software/gnue/">página&nbsp;do&nbsp;gnue</a>]</td></tr>
 
 <tr id="gretl"><td>* <a 
href="http://sourceforge.net/projects/gretl/files/manual/";>Gretl</a></td>
-    <td>Statistical analysis of economic data (econometrics).
-       [<a href="/software/gretl/">gretl&nbsp;home</a>]</td></tr>
+    <td>Análise estatística de dados econômicos (econometria).  [<a
+href="/software/gretl/">página&nbsp;do&nbsp;gretl</a>]</td></tr>
 
 <tr id="pem"><td>* <a href="/software/pem/">Pem</a></td>
-    <td>Personal expenses manager.
-       [<a href="/software/pem/">pem&nbsp;home</a>]</td></tr>
+    <td>Gerenciador pessoal de despesas. [<a
+href="/software/pem/">página&nbsp;do&nbsp;pem</a>]</td></tr>
 
 <tr id="taler"><td>* <a href="/software/taler/">Taler</a></td>
-    <td>Electronic payments for a liberal society.
-       [<a href="/software/taler/">taler&nbsp;home</a>]</td></tr>
+    <td>Pagamento eletrônico para uma sociedade liberal. [<a
+href="/software/taler/">página&nbsp;do&nbsp;taler</a>]</td></tr>
 
 
 <tr>
-<td id="Database" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/db/";><big><b>Database</b></big></a></td></tr>
+<td id="Database" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/db/";><big><b>Banco de
+dados</b></big></a></td></tr>
 
 <tr id="ferret"><td>* <a href="/software/ferret/">Ferret</a></td>
-    <td>Entity/relationship based data modeler.
-       [<a href="/software/ferret/">ferret&nbsp;home</a>]</td></tr>
+    <td>Modelador de dados baseado em entidade/relacionamento.  [<a
+href="/software/ferret/">página&nbsp;do&nbsp;ferret</a>]</td></tr>
 
 <tr id="gdbm"><td>* <a 
href="http://www.gnu.org.ua/software/gdbm/manual/";>Gdbm</a></td>
-    <td>Hash library of database functions compatible with traditional dbm.
-       [<a href="/software/gdbm/">gdbm&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de hash de funções de banco de dados compatível com o dbm
+tradicional.  [<a 
href="/software/gdbm/">página&nbsp;do&nbsp;gdbm</a>]</td></tr>
 
-<tr id="guile-dbi"><td>* <a 
href="http://htmlpreview.github.io/?https://github.com/opencog/guile-dbi/blob/master/website/guile-dbi.html";>Guile-dbi</a></td>
-    <td>Guile database abstraction layer.
-       [<a href="/software/guile-dbi/">guile-dbi&nbsp;home</a>]</td></tr>
+<tr id="guile-dbi"><td>* <a
+href="http://htmlpreview.github.io/?https://github.com/opencog/guile-dbi/blob/master/website/guile-dbi.html";>Guile-dbi</a></td>
+    <td>Camada de abstração de banco de dados do Guile.  [<a
+href="/software/guile-dbi/">página&nbsp;do&nbsp;guile-dbi</a>]</td></tr>
 
 <tr id="gurgle"><td>* <a 
href="http://homepages.inf.ed.ac.uk/timc/gurgle/gurgle.html";>Gurgle</a></td>
-    <td>GNU Report Generator Language.
-       [<a href="/software/gurgle/">gurgle&nbsp;home</a>]</td></tr>
+    <td>Linguagem geradora de relatório do GNU. [<a
+href="/software/gurgle/">página&nbsp;do&nbsp;gurgle</a>]</td></tr>
 
 <tr id="libdbh"><td>* <a href="/software/libdbh/">Libdbh</a></td>
-    <td>Advanced library for disk-based hash tables.
-       [<a href="/software/libdbh/">libdbh&nbsp;home</a>]</td></tr>
+    <td>Biblioteca avançada para tabelas de hash baseada em disco.  [<a
+href="/software/libdbh/">página&nbsp;do&nbsp;libdbh</a>]</td></tr>
 
 <tr id="metaexchange"><td>* <a 
href="/software/metaexchange/#Documentation">Metaexchange</a></td>
-    <td>Manipulate metadata from OAI-PMH and Z39.50.
-       [<a href="/software/metaexchange/">metaexchange&nbsp;home</a>]</td></tr>
+    <td>Manipula metadados de OAI-PMH e Z39.50.  [<a
+href="/software/metaexchange/">página&nbsp;do&nbsp;metaexchange</a>]</td></tr>
 
 <tr id="recutils"><td>* <a href="/software/recutils/manual/">Recutils</a></td>
-    <td>Manipulate plain text files as databases.
-       [<a href="/software/recutils/">recutils&nbsp;home</a>]</td></tr>
+    <td>Manipula arquivos de texto simples como banco de dados.  [<a
+href="/software/recutils/">página&nbsp;do&nbsp;recutils</a>]</td></tr>
 
 <tr id="sqltutor"><td>* <a href="/software/sqltutor/manual/">Sqltutor</a></td>
-    <td>Interactively learn SQL by example.
-       [<a href="/software/sqltutor/">sqltutor&nbsp;home</a>]</td></tr>
+    <td>Aprenda SQL interativamente por exemplos.  [<a
+href="/software/sqltutor/">página&nbsp;do&nbsp;sqltutor</a>]</td></tr>
 
 
 <tr>
-<td id="Dictionaries" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a 
href="http://directory.fsf.org/category/dict/";><big><b>Dictionaries</b></big></a></td></tr>
+<td id="Dictionaries" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a
+href="http://directory.fsf.org/category/dict/";><big><b>Dicionários</b></big></a></td></tr>
 
 <tr id="dico"><td>* <a href="http://dico.man.gnu.org.ua/";>Dico</a></td>
-    <td>Implementation of DICT server (RFC 2229).
-       [<a href="/software/dico/">dico&nbsp;home</a>]</td></tr>
+    <td>Uma implementação de servidor DICT (RFC 2229). [<a
+href="/software/dico/">página&nbsp;do&nbsp;dico</a>]</td></tr>
 
 <tr id="gcide"><td>* <a href="/software/gcide/">Gcide</a></td>
-    <td>GNU Collaborative International Dictionary of English.
-       [<a href="/software/gcide/">gcide&nbsp;home</a>]</td></tr>
+    <td>Dicionário inglês internacional e colaborativo do GNU.  [<a
+href="/software/gcide/">página&nbsp;do&nbsp;gcide</a>]</td></tr>
 
 <tr id="vera"><td>* <a href="/software/vera/">Vera</a></td>
-    <td>List of acronyms.
-       [<a href="/software/vera/">vera&nbsp;home</a>]</td></tr>
+    <td>Lista de acrônimos.  [<a
+href="/software/vera/">página&nbsp;do&nbsp;vera</a>]</td></tr>
 
 
 <tr>
-<td id="Translation" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a 
href="http://directory.fsf.org/category/dtrans/";><big><b>Documentation 
translation</b></big></a></td></tr>
+<td id="Translation" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a 
href="http://directory.fsf.org/category/dtrans/";><big><b>Tradução de
+documentação</b></big></a></td></tr>
 
 <tr id="gnujdoc"><td>* <a href="/software/gnujdoc/">GNUjdoc</a></td>
-    <td>Japanese translations of GNU documents.
-       [<a href="/software/gnujdoc/">gnujdoc&nbsp;home</a>]</td></tr>
+    <td>Traduções japonesas de documentos do GNU.  [<a
+href="/software/gnujdoc/">página&nbsp;do&nbsp;gnujdoc</a>]</td></tr>
 
-<tr id="gnun"><td>* <a href="/software/trans-coord/manual/">GNUnited 
Nations</a>
-<small>(<a 
href="https://www.gnu.org/software/trans-coord/manual/gnun/html_node/";>gnun<!-- 
again --></a>
-  <a 
href="https://www.gnu.org/software/trans-coord/manual/web-trans/html_node/";>web-trans</a>)</small>
+<tr id="gnun"><td><!-- again -->
+* <a href="/software/trans-coord/manual/">GNUnited Nations</a> <small>(<a
+href="https://www.gnu.org/software/trans-coord/manual/gnun/html_node/";>gnun</a>
+<a
+href="https://www.gnu.org/software/trans-coord/manual/web-trans/html_node/";>web-trans</a>)</small>
 </td>
-    <td>Build system for www.gnu.org translations.
-       [<a href="/software/gnun/">gnun&nbsp;home</a>]</td></tr>
+    <td>Sistema de compilação de traduções do www.gnu.org.  [<a
+href="/software/gnun/">página&nbsp;do&nbsp;gnun</a>]</td></tr>
 
 <tr id="trans-coord"><td>* <a 
href="/software/trans-coord/manual/">Trans-coord</a></td>
-    <td>Organizational infrastructure for translating www.gnu.org.
-       [<a href="/software/trans-coord/">trans-coord&nbsp;home</a>]</td></tr>
+    <td>Infraestrutura organizacional para tradução do www.gnu.org.  [<a
+href="/software/trans-coord/">página&nbsp;do&nbsp;trans-coord</a>]</td></tr>
 
 
 <tr>
-<td id="Editors" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/editors/";><big><b>Editors</b></big></a></td></tr>
+<td id="Editors" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/editors/";><big><b>Editores</b></big></a></td></tr>
 
-<tr id="emacs"><td>* <a href="/software/emacs/#Manuals">Emacs</a>
-<small>(<a 
href="https://www.gnu.org/software/emacs/manual/html_node/ada-mode/";>ada-mode</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/autotype/";>autotype</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/ccmode/";>ccmode</a>
-  <a href="https://www.gnu.org/software/emacs/manual/html_node/cl/";>cl</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/dired-x/";>dired-x</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/ebrowse/";>ebrowse</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/ediff/";>ediff</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/eieio/";>eieio</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/elisp/";>elisp</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/emacs/";>emacs<!-- 
again --></a>
-  <a href="https://www.gnu.org/software/emacs/manual/html_node/epa/";>epa</a>
-  <a href="https://www.gnu.org/software/emacs/manual/html_node/erc/";>erc</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/eshell/";>eshell</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/flymake/";>flymake</a>
-  <a href="https://www.gnu.org/software/emacs/manual/html_node/gnus/";>gnus</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/idlwave/";>idlwave</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/message/";>message</a>
-  <a href="https://www.gnu.org/software/emacs/manual/html_node/mh-e/";>mh-e</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/nxml-mode/";>nxml-mode</a>
-  <a href="https://www.gnu.org/software/emacs/manual/html_node/org/";>org</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/pcl-cvs/";>pcl-cvs</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/rcirc/";>rcirc</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/semantic/";>semantic</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/smtpmail/";>smtp</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/speedbar/";>speedbar</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/tramp/";>tramp</a>
-  <a href="https://www.gnu.org/software/emacs/manual/html_node/vip/";>vip</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/viper/";>viper</a>
-  <a 
href="https://www.gnu.org/software/emacs/manual/html_node/woman/";>woman</a>)</small>
+<tr id="emacs"><td><!-- again -->
+* <a href="/software/emacs/#Manuals">Emacs</a> <small>(<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ada-mode/";>ada-mode</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/autotype/";>autotype</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ccmode/";>ccmode</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/cl/";>cl</a> <a
+href="https://www.gnu.org/software/emacs/manual/html_node/dired-x/";>dired-x</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ebrowse/";>ebrowse</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ediff/";>ediff</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/eieio/";>eieio</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/elisp/";>elisp</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/emacs/";>emacs</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/epa/";>epa</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/erc/";>erc</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/eshell/";>eshell</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/flymake/";>flymake</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/gnus/";>gnus</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/idlwave/";>idlwave</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/message/";>message</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/mh-e/";>mh-e</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/nxml-mode/";>nxml-mode</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/org/";>org</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/pcl-cvs/";>pcl-cvs</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/rcirc/";>rcirc</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/semantic/";>semantic</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/smtpmail/";>smtp</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/speedbar/";>speedbar</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/tramp/";>tramp</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/vip/";>vip</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/viper/";>viper</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/woman/";>woman</a>)</small>
 </td>
-    <td>The extensible, customizable, self-documenting text editor.
-       <br/>Available in print:
-       <cite><a 
href="https://shop.fsf.org/books-docs/emacs-reference-card-v25";>Emacs Reference 
Cards</a></cite>,
-       <cite><a 
href="https://shop.fsf.org/books/gnu-emacs-manual-18th-edition-v-261";>GNU Emacs 
Manual</a></cite>.
-       [<a href="/software/emacs/">emacs&nbsp;home</a>]</td></tr>
+    <td>O editor de texto autodocumentável, extensível e personalizável.
+       <br/>Disponível impresso: <cite><a
+href="https://shop.fsf.org/books-docs/emacs-reference-card-v25";>Cartão de
+Referência do Emacs</a></cite>, <cite><a
+href="https://shop.fsf.org/books/gnu-emacs-manual-18th-edition-v-261";>Manual
+do GNU Emacs</a></cite>.  [<a
+href="/software/emacs/">página&nbsp;do&nbsp;emacs</a>]</td></tr>
 
 <tr id="moe"><td>* <a 
href="https://www.gnu.org/software/moe/manual/moe_manual.html";>Moe</a></td>
-    <td>Modeless, multiple-buffer, user-friendly 8-bit text editor.
-       [<a href="/software/moe/">moe&nbsp;home</a>]</td></tr>
+    <td>Editor de texto amigável de 8 bits, com múltiplos buffer e sem 
modelo.  [<a
+href="/software/moe/">página&nbsp;do&nbsp;moe</a>]</td></tr>
 
 <tr id="nano"><td>* <a href="http://www.nano-editor.org/docs.php";>Nano</a></td>
-    <td>Small, user-friendly console text editor.
-       [<a href="/software/nano/">nano&nbsp;home</a>]</td></tr>
+    <td>Editor de texto de console pequeno e amigável.  [<a
+href="/software/nano/">página&nbsp;do&nbsp;nano</a>]</td></tr>
 
-<tr id="readline"><td>* <a 
href="https://tiswww.cwru.edu/php/chet/readline/readline.html";>Readline</a>
-<small>(<a 
href="https://tiswww.cwru.edu/php/chet/readline/history.html";>history</a>
-  <a 
href="https://tiswww.cwru.edu/php/chet/readline/rluserman.html";>rluserman</a>)</small>
+<tr id="readline"><td>* <a
+href="https://tiswww.cwru.edu/php/chet/readline/readline.html";>Readline</a>
+<small>(<a
+href="https://tiswww.cwru.edu/php/chet/readline/history.html";>histórico</a>
+<a
+href="https://tiswww.cwru.edu/php/chet/readline/rluserman.html";>rluserman</a>)</small>
 </td>
-    <td>Edit command lines while typing, with history support.
-       [<a href="/software/readline/">readline&nbsp;home</a>]</td></tr>
+    <td>Edita linhas de comando enquanto digita, com suporte a histórico.  [<a
+href="/software/readline/">página&nbsp;do&nbsp;readline</a>]</td></tr>
 
 <tr id="zile"><td>* <a href="/software/zile/">Zile</a></td>
-    <td>Zile is lossy Emacs, a lightweight Emacs clone.
-       [<a href="/software/zile/">zile&nbsp;home</a>]</td></tr>
+    <td>Zile é um Emacs com perdas, um clone leve do Emacs.  [<a
+href="/software/zile/">páginas&nbsp;do&nbsp;zile</a>]</td></tr>
 
 
 <tr>
-<td id="Education" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/educ/";><big><b>Education</b></big></a></td></tr>
+<td id="Education" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/educ/";><big><b>Educação</b></big></a></td></tr>
 
 <tr id="dr-geo"><td>* <a href="https://www.gnu.org/software/dr-geo/doc/";>Dr. 
Geo</a></td>
-    <td>Interactive geometry software.
-       [<a href="/software/dr-geo/">dr-geo&nbsp;home</a>]</td></tr>
+    <td>Software interativo de geometria.  [<a
+href="/software/dr-geo/">página&nbsp;do&nbsp;dr-geo</a>]</td></tr>
 
 <tr id="eprints"><td>* <a 
href="http://wiki.eprints.org/w/EPrints_Manual";>Eprints</a></td>
-    <td>Web-based repository software, with a default setup for research 
papers.
-       [<a href="/software/eprints/">eprints&nbsp;home</a>]</td></tr>
+    <td>Software de repositório baseado em web, com uma configuração 
padrão para
+trabalhos de pesquisa.  [<a
+href="/software/eprints/">página&nbsp;do&nbsp;eprints</a>]</td></tr>
 
 <tr id="fisicalab"><td>* <a href="/software/fisicalab/">FisicaLab</a></td>
-    <td>Educational application for solving physics problems.
-       [<a href="/software/fisicalab/">fisicalab&nbsp;home</a>]</td></tr>
+    <td>Aplicativo educacional para resolver problemas físicos.  [<a
+href="/software/fisicalab/">página&nbsp;do&nbsp;fisicalab</a>]</td></tr>
 
 <tr id="gcompris"><td>* <a 
href="http://gcompris.net/wiki/Manual";>GCompris</a></td>
-    <td>Educational games for small children.
-       [<a href="/software/gcompris/">gcompris&nbsp;home</a>]</td></tr>
+    <td>Jogos educacionais para filhos pequenos.  [<a
+href="/software/gcompris/">página&nbsp;do&nbsp;gcompris</a>]</td></tr>
 
 <tr id="ggradebook"><td>* <a href="/software/ggradebook/">Ggradebook</a></td>
-    <td>GNOME application to track students' grades for teachers.
-       [<a href="/software/ggradebook/">ggradebook&nbsp;home</a>]</td></tr>
+    <td>Aplicativo do GNOME para professores rastrearem notas dos estudantes.  
[<a
+href="/software/ggradebook/">página&nbsp;do&nbsp;ggradebook</a>]</td></tr>
 
 <tr id="glean"><td>* <a href="/software/glean/">Glean</a></td>
-    <td>extensible quizzing and tutorial for self-study.
-       [<a href="/software/glean/">glean&nbsp;home</a>]</td></tr>
+    <td>Questionário e tutorial extensível para estudo autodidata.  [<a
+href="/software/glean/">página&nbsp;do&nbsp;glean</a>]</td></tr>
 
-<tr id="gnuschool"><td>* <a 
href="https://www.gnu.org/software/gnuschool/gnuschool.html";>GNUschool</a></td>
-    <td>Web application for educators, students, and school administrators.
-       [<a href="/software/gnuschool/">gnuschool&nbsp;home</a>]</td></tr>
+<tr id="gnuschool"><td>* <a
+href="https://www.gnu.org/software/gnuschool/gnuschool.html";>GNUschool</a></td>
+    <td>Aplicativo web para educadores, estudantes e administradores de 
escola.  [<a
+href="/software/gnuschool/">página&nbsp;do&nbsp;gnuschool</a>]</td></tr>
 
 <tr id="gtypist"><td>* <a 
href="https://www.gnu.org/software/gtypist/doc/";>Gtypist</a></td>
-    <td>Typing tutor.
-       [<a href="/software/gtypist/">gtypist&nbsp;home</a>]</td></tr>
+    <td>Tutor de digitação.  [<a
+href="/software/gtypist/">página&nbsp;do&nbsp;gtypist</a>]</td></tr>
 
 <tr id="ignuit"><td>* <a href="/software/ignuit/">Ignuit</a></td>
-    <td>Memorization aid based on Leitner flashcards.
-       [<a href="/software/ignuit/">ignuit&nbsp;home</a>]</td></tr>
+    <td>Auxílio de memorização baseado em <em>flashcards</em> de Leitner.  
[<a
+href="/software/ignuit/">página&nbsp;do&nbsp;ignuit</a>]</td></tr>
 
 <tr id="jtw"><td>* <a href="/software/jtw/">Java Training Wheels</a></td>
-    <td>A simplified Java environment for learning programming.
-       [<a href="/software/jtw/">jtw&nbsp;home</a>]</td></tr>
+    <td>Um ambinete simplificado de Java para aprender programação.  [<a
+href="/software/jtw/">página&nbsp;do&nbsp;jtw</a>]</td></tr>
 
 <tr id="mdk"><td>* <a href="/software/mdk/manual/">MIX Development Kit</a></td>
-    <td>Virtual development environment for Knuth's MIX.
-       <br/>Available in print:
-       <cite><a href="http://shop.fsf.org/product/gnu-mdk/";>GNU MDK</a></cite>.
-       [<a href="/software/mdk/">mdk&nbsp;home</a>]</td></tr>
+    <td>Ambiente virtual de desenvolvimento para MIX do Knuth.
+       <br/>Disponível impresso: <cite><a
+href="http://shop.fsf.org/product/gnu-mdk/";>GNU MDK</a></cite>.  [<a
+href="/software/mdk/">página&nbsp;do&nbsp;mdk</a>]</td></tr>
 
 
 <tr>
-<td id="Email" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/email/";><big><b>Email</b></big></a></td></tr>
+<td id="Email" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/email/";><big><b>E-mail</b></big></a></td></tr>
 
 <tr id="anubis"><td>* <a href="/software/anubis/manual/">Anubis</a></td>
-    <td>SMTP message submission daemon.
-       [<a href="/software/anubis/">anubis&nbsp;home</a>]</td></tr>
+    <td>Daemon de envio de mensagem SMTP.  [<a
+href="/software/anubis/">página&nbsp;do&nbsp;anubis</a>]</td></tr>
 
 <tr id="gnubiff"><td>* <a 
href="http://gnubiff.sourceforge.net/documentation.php";>GNUbiff</a></td>
-    <td>Mail notification program.
-       [<a href="/software/gnubiff/">gnubiff&nbsp;home</a>]</td></tr>
+    <td>Programa de notificação de correio.  [<a
+href="/software/gnubiff/">página&nbsp;do&nbsp;gnubiff</a>]</td></tr>
 
 <tr id="mailman"><td>* <a href="/software/mailman/docs.html">Mailman</a></td>
-    <td>Mailing list manager.
-       [<a href="/software/mailman/">mailman&nbsp;home</a>]</td></tr>
+    <td>Gerenciador de lista de discussão.  [<a
+href="/software/mailman/">página&nbsp;do&nbsp;mailman</a>]</td></tr>
 
 <tr id="mailutils"><td>* <a 
href="/software/mailutils/manual/">Mailutils</a></td>
-    <td>Utilities and library for reading and serving mail.
-       [<a href="/software/mailutils/">mailutils&nbsp;home</a>]</td></tr>
+    <td>Utilitários e biblioteca para leitura e entrega de correio.  [<a
+href="/software/mailutils/">página&nbsp;do&nbsp;mailutils</a>]</td></tr>
 
 
 <tr>
-<td id="Fonts" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/fonts/";><big><b>Fonts</b></big></a></td></tr>
+<td id="Fonts" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/fonts/";><big><b>Fontes</b></big></a></td></tr>
 
 <tr id="fontopia"><td>* <a href="/software/fontopia/">Fontopia</a></td>
-    <td>A console font editor.
-       [<a href="/software/fontopia/">fontopia&nbsp;home</a>]</td></tr>
+    <td>Um editor de fontes de console.  [<a
+href="/software/fontopia/">página&nbsp;do&nbsp;fontopia</a>]</td></tr>
 
-<tr id="fontutils"><td>* <a 
href="http://www.delorie.com/gnu/docs/fontutils/fontu_toc.html";>Fontutils</a></td>
-    <td>Scanned image, bitmap, outline font manipulation.
-       [<a href="/software/fontutils/">fontutils&nbsp;home</a>]</td></tr>
+<tr id="fontutils"><td>* <a
+href="http://www.delorie.com/gnu/docs/fontutils/fontu_toc.html";>Fontutils</a></td>
+    <td>Manipulação de imagem digitalizada, bitmap e fonte de contorno.  [<a
+href="/software/fontutils/">página&nbsp;do&nbsp;fontutils</a>]</td></tr>
 
 <tr id="freefont"><td>* <a href="/software/freefont/">Free UCS Outline 
Fonts</a></td>
-    <td>Unicode-encoded outline fonts.
-       [<a href="/software/freefont/">freefont&nbsp;home</a>]</td></tr>
+    <td>Fontes de contorno codificadas em Unicode.  [<a
+href="/software/freefont/">página&nbsp;do&nbsp;freefont</a>]</td></tr>
 
 <tr id="intlfonts"><td>* <a href="/software/intlfonts/">Intlfonts</a></td>
-    <td>TrueType and BDF fonts covering many scripts.
-       [<a href="/software/intlfonts/">intlfonts&nbsp;home</a>]</td></tr>
+    <td>Fontes TrueType e BDF cobrindo muitos scripts.  [<a
+href="/software/intlfonts/">página&nbsp;do&nbsp;intlfonts</a>]</td></tr>
 
 <tr id="unifont"><td>* <a href="/software/unifont/">Unifont</a></td>
-    <td>Large bitmap font covering Unicode's Basic Multilingual Plane.
-       [<a href="/software/unifont/">unifont&nbsp;home</a>]</td></tr>
+    <td>Fonte bitmap grande cobrindo o Plano Multilíngue Básico do Unicode.  
[<a
+href="/software/unifont/">página&nbsp;do&nbsp;unifont</a>]</td></tr>
 
 
 <tr>
-<td id="gnuorg" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><big><b>GNU organization</b></big></td></tr>
+<td id="gnuorg" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><big><b>Organização do GNU</b></big></td></tr>
 
-<tr id="gnustandards"><td>* <a href="/software/gnustandards/">GNU 
organization</a>
-<small>(<a href="https://www.gnu.org/prep/maintain/html_node/";>maintain</a>
-  <a 
href="https://www.gnu.org/prep/standards/html_node/";>standards</a>)</small>
+<tr id="gnustandards"><td>* <a href="/software/gnustandards/">Organização do 
GNU</a> <small>(<a
+href="https://www.gnu.org/prep/maintain/html_node/";>manutenção</a> <a
+href="https://www.gnu.org/prep/standards/html_node/";>padrões</a>)</small>
 </td>
-    <td>GNU coding standards and maintainer information.
-       [<a href="/software/gnustandards/">gnustandards&nbsp;home</a>]</td></tr>
+    <td>Padrões de codificação do GNU e informações para mantenedores.  
[<a
+href="/software/gnustandards/">página&nbsp;do&nbsp;gnustandards</a>]</td></tr>
 
 
 <tr>
-<td id="Games" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/games/";><big><b>Games</b></big></a></td></tr>
+<td id="Games" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/games/";><big><b>Jogos</b></big></a></td></tr>
 
 <tr id="acm"><td>* <a href="/software/acm/">Acm</a></td>
-    <td>Multiplayer aerial combat simulation.
-       [<a href="/software/acm/">acm&nbsp;home</a>]</td></tr>
+    <td>Simulação de combate aéreo multijogador.  [<a
+href="/software/acm/">página&nbsp;do&nbsp;acm</a>]</td></tr>
 
 <tr id="ballandpaddle"><td>* <a href="/software/ballandpaddle/">Ball and 
Paddle</a></td>
-    <td>Ball and paddle game extensible with Guile.
-       [<a 
href="/software/ballandpaddle/">ballandpaddle&nbsp;home</a>]</td></tr>
+    <td>Jogo de bola e remo extensível com Guile.  [<a
+href="/software/ballandpaddle/">página&nbsp;do&nbsp;ballandpaddle</a>]</td></tr>
 
 <tr id="chess"><td>* <a href="/software/chess/manual/">Chess</a></td>
-    <td>Full chess implementation.
-       [<a href="/software/chess/">chess&nbsp;home</a>]</td></tr>
+    <td>Implementação completa de xadrez.  [<a
+href="/software/chess/">página&nbsp;do&nbsp;chess&nbsp;</a>]</td></tr>
 
 <tr id="dominion"><td>* <a href="/software/dominion/">Dominion</a></td>
-    <td>Multi-player world simulation and role-playing game.
-       [<a href="/software/dominion/">dominion&nbsp;home</a>]</td></tr>
+    <td>Jogo de RPG e simulação de mundo multijogador.  [<a
+href="/software/dominion/">página&nbsp;do&nbsp;dominion</a>]</td></tr>
 
 <tr id="freedink"><td>* <a 
href="http://www.freedink.org/doc/";>FreeDink</a></td>
-    <td>Twisted adventures of young pig farmer Dink Smallwood.
-       [<a href="/software/freedink/">freedink&nbsp;home</a>]</td></tr>
+    <td>As aventuras distorcidas do jovem criador de porcos Dink Smallwood.  
[<a
+href="/software/freedink/">página&nbsp;do&nbsp;freedink</a>]</td></tr>
 
 <tr id="gnubg"><td>* <a 
href="http://www.gnubg.com/documentation/doku.php";>Backgammon</a></td>
-    <td>Backgammon game.
-       [<a href="/software/gnubg/">gnubg&nbsp;home</a>]</td></tr>
+    <td>Um jogo de gamão.  [<a
+href="/software/gnubg/">página&nbsp;do&nbsp;gnubg</a>]</td></tr>
 
 <tr id="gnubik"><td>* <a href="/software/gnubik/manual/">GNUbik</a></td>
-    <td>3d Rubik's cube game.
-       [<a href="/software/gnubik/">gnubik&nbsp;home</a>]</td></tr>
+    <td>Jogo 3D de cubo do Rubik.  [<a
+href="/software/gnubik/">página&nbsp;do&nbsp;gnubik</a>]</td></tr>
 
 <tr id="gnugo"><td>* <a href="/software/gnugo/gnugo_toc.html">GNUgo</a></td>
-    <td>Play the game of Go.
-       [<a href="/software/gnugo/">gnugo&nbsp;home</a>]</td></tr>
+    <td>Jogue o jogo de Go.  [<a
+href="/software/gnugo/">página&nbsp;do&nbsp;gnugo</a>]</td></tr>
 
 <tr id="gnujump"><td>* <a href="/software/gnujump/">GNUjump</a></td>
-    <td>Game of jumping to the next floor, trying not to fall.
-       [<a href="/software/gnujump/">gnujump&nbsp;home</a>]</td></tr>
+    <td>Jogo de pular para o próximo andar, tentando não cair.  [<a
+href="/software/gnujump/">página&nbsp;do&nbsp;gnujump</a>]</td></tr>
 
 <tr id="gnukart"><td>* <a href="/software/gnukart/">GNUkart</a></td>
-    <td>Racing game.
-       [<a href="/software/gnukart/">gnukart&nbsp;home</a>]</td></tr>
+    <td>Jogo de corrida.  [<a
+href="/software/gnukart/">página&nbsp;do&nbsp;gnukart</a>]</td></tr>
 
 <tr id="gnurobots"><td>* <a 
href="/software/gnurobots/readme.html">Robots</a></td>
-    <td>Program a little robot and watch him explore a world.
-       [<a href="/software/gnurobots/">gnurobots&nbsp;home</a>]</td></tr>
+    <td>Programe um pequeno robô e veja-o explorar um mundo.  [<a
+href="/software/gnurobots/">página&nbsp;do&nbsp;gnurobots</a>]</td></tr>
 
-<tr id="gnushogi"><td>* <a 
href="http://www.cs.caltech.edu/~mvanier/hacking/gnushogi/gnushogi_toc.html";>GNUshogi</a></td>
-    <td>The game of Shogi (Japanese chess).
-       [<a href="/software/gnushogi/">gnushogi&nbsp;home</a>]</td></tr>
+<tr id="gnushogi"><td>* <a
+href="http://www.cs.caltech.edu/~mvanier/hacking/gnushogi/gnushogi_toc.html";>GNUshogi</a></td>
+    <td>O jogo de Shogi (xadrez japonês).  [<a
+href="/software/gnushogi/">página&nbsp;do&nbsp;gnushogi</a>]</td></tr>
 
 <tr id="leg"><td>* <a href="/software/leg/">Leg</a></td>
-    <td>Libraries and engines for game programming.
-       [<a href="/software/leg/">leg&nbsp;home</a>]</td></tr>
+    <td>Bibliotecas e motores para programação de jogos.  [<a
+href="/software/leg/">página&nbsp;do&nbsp;leg</a>]</td></tr>
 
 <tr id="liquidwar6"><td>* <a href="/software/liquidwar6/manual/">Liquid War 
6</a></td>
-    <td>Multiplayer wargame where your army is a blob of liquid.
-       [<a href="/software/liquidwar6/">liquidwar6&nbsp;home</a>]</td></tr>
+    <td>Jogo de guerra multijogador em que seu exército é uma bolha de 
líquido.  [<a
+href="/software/liquidwar6/">página&nbsp;do&nbsp;liquidwar6</a>]</td></tr>
 
 <tr id="motti"><td>* <a 
href="https://www.gnu.org/software/motti/manual/";>Motti</a></td>
-    <td>Multiplayer strategy game.
-       [<a href="/software/motti/">motti&nbsp;home</a>]</td></tr>
+    <td>Jogo de estratégia multijogador.  [<a
+href="/software/motti/">página&nbsp;do&nbsp;motti</a>]</td></tr>
 
 <tr id="rpge"><td>* <a href="/software/rpge/">Rpge</a></td>
-    <td>Role playing game engine.
-       [<a href="/software/rpge/">rpge&nbsp;home</a>]</td></tr>
+    <td>Motor de RPG.  [<a 
href="/software/rpge/">página&nbsp;do&nbsp;rpge</a>]</td></tr>
 
-<tr id="talkfilters"><td>* <a 
href="http://www.hyperrealm.com/talkfilters/talkfilters.pdf";>Talkfilters</a></td>
-    <td>Convert English text to humorous dialects.
-       [<a href="/software/talkfilters/">talkfilters&nbsp;home</a>]</td></tr>
+<tr id="talkfilters"><td>* <a
+href="http://www.hyperrealm.com/talkfilters/talkfilters.pdf";>Talkfilters</a></td>
+    <td>Converte texto em inglês para dialetos humorísticos.  [<a
+href="/software/talkfilters/">página&nbsp;do&nbsp;talkfilters</a>]</td></tr>
 
 <tr id="xboard"><td>* <a href="/software/xboard/manual/">XBoard</a></td>
-    <td>Graphical user interface for chess programs.
-       [<a href="/software/xboard/">xboard&nbsp;home</a>]</td></tr>
+    <td>Interface gráfica de usuário para programas de xadrez.  [<a
+href="/software/xboard/">página&nbsp;do&nbsp;xboard</a>]</td></tr>
 
 
 <tr>
-<td id="Graphics" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/graph/";><big><b>Graphics</b></big></a></td></tr>
+<td id="Graphics" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/graph/";><big><b>Gráficos</b></big></a></td></tr>
 
 <tr id="pkg_3dldf"><td>* <a href="/software/3dldf/manual/">3DLDF</a></td>
-    <td>3D drawing with MetaPost output.
-       [<a href="/software/3dldf/">3dldf&nbsp;home</a>]</td></tr>
+    <td>Desenho em 3D com saída MetaPost.  [<a
+href="/software/3dldf/">página&nbsp;do&nbsp;3dldf</a>]</td></tr>
 
 <tr id="dia"><td>* <a 
href="http://wiki.gnome.org/Apps/Dia/Documentation";>Dia</a></td>
-    <td>Diagram creation for GNOME.
-       [<a href="/software/dia/">dia&nbsp;home</a>]</td></tr>
+    <td>Criação de diagrama para o GNOME.  [<a
+href="/software/dia/">página&nbsp;do&nbsp;dia</a>]</td></tr>
 
 <tr id="gift"><td>* <a href="/software/gift/">GIFT</a></td>
-    <td>GNU Image Finding Tool, with query by example.
-       [<a href="/software/gift/">gift&nbsp;home</a>]</td></tr>
+    <td>Ferramenta de localização de imagem do GNU, com consulta por 
exemplos.  [<a
+href="/software/gift/">página&nbsp;do&nbsp;gift</a>]</td></tr>
 
 <tr id="gimp"><td>* <a href="http://www.gimp.org/docs/";>GIMP</a></td>
-    <td>GNU Image Manipulation Program.
-       [<a href="/software/gimp/">gimp&nbsp;home</a>]</td></tr>
+    <td>Programa de manipulação de imagem do GNU.  [<a
+href="/software/gimp/">página&nbsp;do&nbsp;gimp</a>]</td></tr>
 
 <tr id="gpaint"><td>* <a href="/software/gpaint/">Gpaint</a></td>
-    <td>Simple paint program for GNOME.
-       [<a href="/software/gpaint/">gpaint&nbsp;home</a>]</td></tr>
+    <td>Programa simples de pintura para o GNOME.  [<a
+href="/software/gpaint/">página&nbsp;do&nbsp;gpaint</a>]</td></tr>
 
 <tr id="gsegrafix"><td>* <a href="/software/gsegrafix/">Gsegrafix</a></td>
-    <td>GNOME application to create scientific and engineering plots.
-       [<a href="/software/gsegrafix/">gsegrafix&nbsp;home</a>]</td></tr>
+    <td>Aplicativo GNOME para criar gráficos científicos e de engenharia.  
[<a
+href="/software/gsegrafix/">página&nbsp;do&nbsp;gsegrafix</a>]</td></tr>
 
 <tr id="guile-opengl"><td>* <a 
href="/software/guile-opengl/">Guile-opengl</a></td>
-    <td>Guile binding for the OpenGL graphics API.
-       [<a href="/software/guile-opengl/">guile-opengl&nbsp;home</a>]</td></tr>
+    <td>Vinculação do Guile para a API de gráficos OpenGL.  [<a
+href="/software/guile-opengl/">página&nbsp;do&nbsp;guile-opengl</a>]</td></tr>
 
 <tr id="libxmi"><td>* <a href="/software/libxmi/">Libxmi</a></td>
-    <td>Library for rasterizing 2-d vector graphics.
-       [<a href="/software/libxmi/">libxmi&nbsp;home</a>]</td></tr>
+    <td>Biblioteca para rasterizar gráficos vetoriais em 2D.  [<a
+href="/software/libxmi/">página&nbsp;do&nbsp;libxmi</a>]</td></tr>
 
 <tr id="maverik"><td>* <a href="/software/maverik/">Maverik</a></td>
-    <td>Support interactive 3d virtual environments.
-       [<a href="/software/maverik/">maverik&nbsp;home</a>]</td></tr>
+    <td>Suporte a ambientes virtuais interativos em 3D.  [<a
+href="/software/maverik/">página&nbsp;do&nbsp;maverik</a>]</td></tr>
 
 <tr id="panorama"><td>* <a href="/software/panorama/">Panorama</a></td>
-    <td>Framework for 3D graphics production.
-       [<a href="/software/panorama/">panorama&nbsp;home</a>]</td></tr>
+    <td>Framework para produção de gráficos 3D.  [<a
+href="/software/panorama/">página&nbsp;do&nbsp;panorama</a>]</td></tr>
 
 <tr id="plotutils"><td>* <a href="/software/plotutils/">Plotutils</a></td>
-    <td>Plotting utilities and library.
-       [<a href="/software/plotutils/">plotutils&nbsp;home</a>]</td></tr>
+    <td>Utilitários e biblioteca de plotagem.  [<a
+href="/software/plotutils/">página&nbsp;do&nbsp;plotutils</a>]</td></tr>
 
 <tr id="xaos"><td>* <a 
href="http://matek.hu/xaos/doku.php?id=documentation:main";>XaoS</a></td>
-    <td>Real-time fractal zoomer.
-       [<a href="/software/xaos/">xaos&nbsp;home</a>]</td></tr>
+    <td>Aproximador/afastador (<em>zoom in/zoom out</em>) de fractal em tempo 
real.
+[<a href="/software/xaos/">página&nbsp;do&nbsp;xaos</a>]</td></tr>
 
 
 <tr>
-<td id="Health" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/health/";><big><b>Health</b></big></a></td></tr>
+<td id="Health" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/health/";><big><b>Saúde</b></big></a></td></tr>
 
 <tr id="gnumed"><td>* <a 
href="http://wiki.gnumed.de/bin/view/Gnumed/GnumedManual";>GNUmed</a></td>
-    <td>Paperless medical practice.
-       [<a href="/software/gnumed/">gnumed&nbsp;home</a>]</td></tr>
+    <td>Prática médica sem papel.  [<a
+href="/software/gnumed/">página&nbsp;do&nbsp;gnumed</a>]</td></tr>
 
 <tr id="gnutrition"><td>* <a 
href="/software/gnutrition/manual/">GNUtrition</a></td>
-    <td>Nutrition analysis.
-       [<a href="/software/gnutrition/">gnutrition&nbsp;home</a>]</td></tr>
+    <td>Análise nutricional.  [<a
+href="/software/gnutrition/">página&nbsp;do&nbsp;gnutrition</a>]</td></tr>
 
 <tr id="health"><td>* <a href="/software/health/">Health</a></td>
-    <td>Health and hospital information system.
-       [<a href="/software/health/">health&nbsp;home</a>]</td></tr>
+    <td>Sistema de informação hospitalar e saúde.  [<a
+href="/software/health/">página&nbsp;do&nbsp;health</a>]</td></tr>
 
 
 <tr>
-<td id="Interface" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/iface/";><big><b>Interface</b></big></a></td></tr>
+<td id="Interface" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/iface/";><big><b>Interface</b></big></a></td></tr>
 
 <tr id="g-golf"><td>* <a href="/software/g-golf/">G-Golf</a></td>
-    <td>Guile bindings for GObject Introspection.
-       [<a href="/software/g-golf/">g-golf&nbsp;home</a>]</td></tr>
+    <td>Vinculações Guile para introspecção de GObject.  [<a
+href="/software/g-golf/">página&nbsp;do&nbsp;g-golf</a>]</td></tr>
 
 <tr id="gnome"><td>* <a href="http://library.gnome.org";>GNOME</a></td>
-    <td>The GNU desktop environment.
-       [<a href="/software/gnome/">gnome&nbsp;home</a>]</td></tr>
+    <td>O ambiente gráfico do GNU.  [<a
+href="/software/gnome/">página&nbsp;do&nbsp;gnome</a>]</td></tr>
 
 <tr id="gnudos"><td>* <a href="/software/gnudos/">GnuDOS</a></td>
-    <td>MS-DOS-like file manager, editor, and other tools.
-       [<a href="/software/gnudos/">gnudos&nbsp;home</a>]</td></tr>
+    <td>Gerenciador de arquivos semelhante ao MS-DOS, editor e outras 
ferramentas.
+[<a href="/software/gnudos/">página&nbsp;do&nbsp;gnudos</a>]</td></tr>
 
 <tr id="gnuit"><td>* <a href="/software/gnuit/manual/">GNU Interactive 
Tools</a></td>
-    <td>Interactive utilities for file browsing, viewing, and more.
-       [<a href="/software/gnuit/">gnuit&nbsp;home</a>]</td></tr>
+    <td>Utilitários interativos para navegação de arquivos, visualização 
e mais.
+[<a href="/software/gnuit/">páginas&nbsp;do&nbsp;gnuit</a>]</td></tr>
 
 <tr id="gnuspeech"><td>* <a 
href="/software/gnuspeech/#Manuals">GNUspeech</a></td>
-    <td>Extensible rule-based text-to-speech.
-       [<a href="/software/gnuspeech/">gnuspeech&nbsp;home</a>]</td></tr>
+    <td>Texto-para-voz baseado em regras extensíveis.  [<a
+href="/software/gnuspeech/">página&nbsp;do&nbsp;gnuspeech</a>]</td></tr>
 
 <tr id="gtk"><td>* <a 
href="http://library.gnome.org/devel/gtk/stable/";>GTK+</a></td>
-    <td>Cross-platform toolkit for creating graphical user interfaces.
-       [<a href="/software/gtk+/">gtk+&nbsp;home</a>]</td></tr>
+    <td>Kit de ferramentas multiplataforma para criar interfaces gráficas de
+usuário.  [<a href="/software/gtk+/">página&nbsp;do&nbsp;gtk+</a>]</td></tr>
 
 <tr id="guile-ncurses"><td>* <a 
href="/software/guile-ncurses/manual/">Guile-ncurses</a></td>
-    <td>Guile bindings to ncurses.
-       [<a 
href="/software/guile-ncurses/">guile-ncurses&nbsp;home</a>]</td></tr>
+    <td>Vinculações Guile para ncurses. [<a
+href="/software/guile-ncurses/">página&nbsp;do&nbsp;guile-ncurses</a>]</td></tr>
 
 <tr id="gxmessage"><td>* <a href="/software/gxmessage/">Gxmessage</a></td>
-    <td>Open popup message window with buttons for return.
-       [<a href="/software/gxmessage/">gxmessage&nbsp;home</a>]</td></tr>
+    <td>Abre uma janela de mensagem <i lang="en">pop-up</i> com botões para
+retorno.  [<a 
href="/software/gxmessage/">página&nbsp;do&nbsp;gxmessage</a>]</td></tr>
 
 <tr id="inklingreader"><td>* <a 
href="/software/inklingreader/">Inklingreader</a></td>
-    <td>Wacom Inkling sketch format conversion and manipulation.
-       [<a 
href="/software/inklingreader/">inklingreader&nbsp;home</a>]</td></tr>
+    <td>Conversão e manipulação de formato de esboço do Wacom Inkling.  [<a
+href="/software/inklingreader/">página&nbsp;do&nbsp;inklingreader</a>]</td></tr>
 
 <tr id="mc"><td>* <a href="/software/mc/">Midnight Commander</a></td>
-    <td>Graphical file manager.
-       [<a href="/software/mc/">mc&nbsp;home</a>]</td></tr>
+    <td>Gerenciador de arquivos gráfico.  [<a
+href="/software/mc/">página&nbsp;do&nbsp;mc</a>]</td></tr>
 
 <tr id="ncurses"><td>* <a href="/software/ncurses/">Ncurses</a></td>
-    <td>Terminal emulation (termcap, terminfo) library.
-       [<a href="/software/ncurses/">ncurses&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de emulação de terminal (termcap, terminfo).  [<a
+href="/software/ncurses/">página&nbsp;do&nbsp;ncurses</a>]</td></tr>
 
 <tr id="oo-browser"><td>* <a href="/software/oo-browser/">OO-Browser</a></td>
-    <td>An interactive object-oriented class browser for Emacs.
-       [<a href="/software/oo-browser/">oo-browser&nbsp;home</a>]</td></tr>
+    <td>Um navegador interativo de classe orientado a objetos para o Emacs.  
[<a
+href="/software/oo-browser/">página&nbsp;do&nbsp;oo-browser</a>]</td></tr>
 
 <tr id="phantom_home"><td>* <a 
href="/software/phantom_home/">Phantom.Home</a></td>
-    <td>Computer-controlled home automation.
-       [<a href="/software/phantom_home/">phantom_home&nbsp;home</a>]</td></tr>
+    <td>Automação residencial controlada por computador.  [<a
+href="/software/phantom_home/">página&nbsp;do&nbsp;phantom_home</a>]</td></tr>
 
 <tr id="powerguru"><td>* <a 
href="/software/powerguru/#documentation">PowerGuru</a></td>
-    <td>Monitoring, logging, and remote control of power generation.
-       [<a href="/software/powerguru/">powerguru&nbsp;home</a>]</td></tr>
+    <td>Monitoramento, registro e controle remoto da geração de energia.  [<a
+href="/software/powerguru/">página&nbsp;do&nbsp;powerguru</a>]</td></tr>
 
 <tr id="remotecontrol"><td>* <a 
href="/software/remotecontrol/manual/">Remotecontrol</a></td>
-    <td>Management of IP-enabled thermostats and other HVAC devices.
-       [<a 
href="/software/remotecontrol/">remotecontrol&nbsp;home</a>]</td></tr>
+    <td>Gerenciamento de termostatos com IP e outros dispositivos HVAC.  [<a
+href="/software/remotecontrol/">página&nbsp;do&nbsp;remotecontrol</a>]</td></tr>
 
 <tr id="stalkerfs"><td>* <a href="/software/stalkerfs/">Stalkerfs</a></td>
-    <td>Desktop search engine for local files, using FUSE.
-       [<a href="/software/stalkerfs/">stalkerfs&nbsp;home</a>]</td></tr>
+    <td>Buscador de área de trabalho para arquivos locais, usando FUSE.  [<a
+href="/software/stalkerfs/">página&nbsp;do&nbsp;stalkerfs</a>]</td></tr>
 
 <tr id="termcap"><td>* <a 
href="/software/termutils/manual/termcap-1.3/termcap.html">Termcap</a></td>
-    <td>Terminal-independent display support.
-       [<a href="/software/termcap/">termcap&nbsp;home</a>]</td></tr>
+    <td>Suporte de exibição independente de terminal.  [<a
+href="/software/termcap/">página&nbsp;do&nbsp;termcap</a>]</td></tr>
 
 <tr id="termutils"><td>* <a 
href="/software/termutils/manual/termutils-2.0/tput.html">Termutils</a></td>
-    <td>The tput and tabs utilities for terminal operations.
-       [<a href="/software/termutils/">termutils&nbsp;home</a>]</td></tr>
+    <td>Os utilitários tput e tabs para operações de terminal.  [<a
+href="/software/termutils/">página&nbsp;do&nbsp;termutils</a>]</td></tr>
 
-<tr id="tramp"><td>* <a 
href="https://www.gnu.org/software/emacs/manual/html_node/tramp/";>TRAMP</a></td>
-    <td>Transparent Remote Access, Multiple Protocol GNU Emacs package.
-       [<a href="/software/tramp/">tramp&nbsp;home</a>]</td></tr>
+<tr id="tramp"><td>* <a
+href="https://www.gnu.org/software/emacs/manual/html_node/tramp/";>TRAMP</a></td>
+    <td>Acesso remoto transparente, por múltiplos protocolos, do pacote GNU 
Emacs.
+[<a href="/software/tramp/">página&nbsp;do&nbsp;tramp</a>]</td></tr>
 
 
 <tr>
-<td id="Internet" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/net/";><big><b>Internet 
applications</b></big></a></td></tr>
+<td id="Internet" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/net/";><big><b>Aplicativos de
+Internet</b></big></a></td></tr>
 
 <tr id="alive"><td>* <a href="/software/alive/manual/">Alive</a></td>
-    <td>Autologin and keep-alive daemon.
-       [<a href="/software/alive/">alive&nbsp;home</a>]</td></tr>
+    <td>Daemon de autologin e de kepp-alive.  [<a
+href="/software/alive/">página&nbsp;do&nbsp;alive</a>]</td></tr>
 
-<tr id="artanis"><td>* <a 
href="https://www.gnu.org/software/artanis/manual/html_node/";>Artanis</a></td>
-    <td>Web application framework written in Guile.
-       [<a href="/software/artanis/">artanis&nbsp;home</a>]</td></tr>
+<tr id="artanis"><td>* <a
+href="https://www.gnu.org/software/artanis/manual/html_node/";>Artanis</a></td>
+    <td>Framework de aplicativo da Web escrita em Guile.  [<a
+href="/software/artanis/">página&nbsp;do&nbsp;artanis</a>]</td></tr>
 
 <tr id="consensus"><td>* <a href="/software/consensus/">Consensus</a></td>
-    <td>Coordinate free software social networking projects.
-       [<a href="/software/consensus/">consensus&nbsp;home</a>]</td></tr>
+    <td>Coordena projetos de redes sociais de software livre.  [<a
+href="/software/consensus/">página&nbsp;do&nbsp;consensus</a>]</td></tr>
 
 <tr id="freetalk"><td>* <a 
href="/software/freetalk/freetalk.html">Freetalk</a></td>
-    <td>Extensible console-based Jabber client.
-       [<a href="/software/freetalk/">freetalk&nbsp;home</a>]</td></tr>
+    <td>Cliente Jabber extensível, baseado em console.  [<a
+href="/software/freetalk/">página&nbsp;do&nbsp;freetalk</a>]</td></tr>
 
 <tr id="garpd"><td>* <a href="/software/garpd/">Gratuitous ARP Daemon</a></td>
-    <td>Broadcast gratuitous ARP requests for IPMI and more.
-       [<a href="/software/garpd/">garpd&nbsp;home</a>]</td></tr>
+    <td>Transmissão de solicitações ARP gratuitas para o IPMI e mais.  [<a
+href="/software/garpd/">página&nbsp;do&nbsp;garpd</a>]</td></tr>
 
 <tr id="gnash"><td>* <a 
href="/software/gnash/documentation.html">Gnash</a></td>
-    <td>Flash movie player.
-       [<a href="/software/gnash/">gnash&nbsp;home</a>]</td></tr>
+    <td>Reprodutor de vídeos em Flash.  [<a
+href="/software/gnash/">página&nbsp;do&nbsp;gnash</a>]</td></tr>
 
 <tr id="gnunet"><td>* <a href="http://gnunet.org/book";>GNUnet</a></td>
-    <td>Secure, decentralized, peer-to-peer networking framework.
-       [<a href="/software/gnunet/">gnunet&nbsp;home</a>]</td></tr>
+    <td>Framework de rede segura, descentralizada e ponto a ponto.  [<a
+href="/software/gnunet/">página&nbsp;do&nbsp;gnunet</a>]</td></tr>
 
 <tr id="gnuzilla"><td>* <a href="/software/gnuzilla/">GNUzilla</a></td>
-    <td>Entirely free browser derived from Mozilla Firefox.
-       [<a href="/software/gnuzilla/">gnuzilla&nbsp;home</a>]</td></tr>
+    <td>Navegador totalmente livre derivado do Mozilla Firefox.  [<a
+href="/software/gnuzilla/">página&nbsp;do&nbsp;gnuzilla</a>]</td></tr>
 
 <tr id="httptunnel"><td>* <a href="/software/httptunnel/">Httptunnel</a></td>
-    <td>Bidirectional connection tunnelled inside HTTP requests.
-       [<a href="/software/httptunnel/">httptunnel&nbsp;home</a>]</td></tr>
+    <td>Conexão bidirecional encapsulada dentro de solicitações HTTP. [<a
+href="/software/httptunnel/">página&nbsp;do&nbsp;httptunnel</a>]</td></tr>
 
 <tr id="icecat"><td>* <a href="/software/icecat/">Icecat</a></td>
-    <td>Entirely free browser derived from Mozilla Firefox.
-       [<a href="/software/icecat/">icecat&nbsp;home</a>]</td></tr>
+    <td>Navegador totalmente livre derivado do Mozilla Firefox.  [<a
+href="/software/icecat/">página&nbsp;do&nbsp;icecat</a>]</td></tr>
 
 <tr id="inetutils"><td>* <a 
href="/software/inetutils/manual/">Inetutils</a></td>
-    <td>Basic networking utilities.
-       [<a href="/software/inetutils/">inetutils&nbsp;home</a>]</td></tr>
+    <td>Utilitários básicos de redes de computadores.  [<a
+href="/software/inetutils/">página&nbsp;do&nbsp;inetutils</a>]</td></tr>
 
 <tr id="jwhois"><td>* <a href="/software/jwhois/manual/">Jwhois</a></td>
-    <td>An extended whois client.
-       [<a href="/software/jwhois/">jwhois&nbsp;home</a>]</td></tr>
+    <td>Um cliente whois estendido.  [<a
+href="/software/jwhois/">página&nbsp;do&nbsp;jwhois</a>]</td></tr>
 
 <tr id="librejs"><td>* <a href="/software/librejs/manual/">Librejs</a></td>
-    <td>Browser add-on that blocks nonfree nontrivial JavaScript.
-       [<a href="/software/librejs/">librejs&nbsp;home</a>]</td></tr>
+    <td>Complemento de navegador que bloqueia JavaScript não trivial e não 
livre.
+[<a href="/software/librejs/">página&nbsp;do&nbsp;librejs</a>]</td></tr>
 
 <tr id="lrzsz"><td>* <a href="/software/lrzsz/">Lrzsz</a></td>
-    <td>Implementation of XMODEM/YMODEM/ZMODEM transfer protocols.
-       [<a href="/software/lrzsz/">lrzsz&nbsp;home</a>]</td></tr>
+    <td>Implementação dos protocolos de transferência XMODEM/YMODEM/ZMODEM. 
 [<a
+href="/software/lrzsz/">página&nbsp;do&nbsp;lrzsz</a>]</td></tr>
 
 <tr id="macchanger"><td>* <a href="/software/macchanger/">MAC Changer</a></td>
-    <td>Viewing and manipulating MAC addresses of network interfaces.
-       [<a href="/software/macchanger/">macchanger&nbsp;home</a>]</td></tr>
+    <td>Visualização e manipulação de endereços MAC de interfaces de 
rede.  [<a
+href="/software/macchanger/">página&nbsp;do&nbsp;macchanger</a>]</td></tr>
 
 <tr id="mediagoblin"><td>* <a 
href="http://docs.mediagoblin.org/";>Mediagoblin</a></td>
-    <td>Photo and media sharing.
-       [<a href="/software/mediagoblin/">mediagoblin&nbsp;home</a>]</td></tr>
+    <td>Compartilhamento de foto e mídia.  [<a
+href="/software/mediagoblin/">página&nbsp;do&nbsp;mediagoblin</a>]</td></tr>
 
 <tr id="network"><td>* <a href="/software/network/">Network</a></td>
-    <td>Initiative to encourage development of free network services.
-       [<a href="/software/network/">network&nbsp;home</a>]</td></tr>
+    <td>Iniciativa para encorajar desenvolvimento de serviços de rede livre.  
[<a
+href="/software/network/">página&nbsp;do&nbsp;network</a>]</td></tr>
 
 <tr id="pipo"><td>* <a href="/software/pipo/">Pipo</a></td>
-    <td>Bulletin board system.
-       [<a href="/software/pipo/">pipo&nbsp;home</a>]</td></tr>
+    <td>Sistema de boletins.  [<a
+href="/software/pipo/">página&nbsp;do&nbsp;pipo</a>]</td></tr>
 
 <tr id="proxyknife"><td>* <a 
href="/software/proxyknife/manual/">Proxyknife</a></td>
-    <td>Customizable multithread proxy hunter.
-       [<a href="/software/proxyknife/">proxyknife&nbsp;home</a>]</td></tr>
+    <td>Caçador de proxy multithread personalizável.  [<a
+href="/software/proxyknife/">página&nbsp;do&nbsp;proxyknife</a>]</td></tr>
 
 <tr id="shishi"><td>* <a href="/software/shishi/#status">Shishi</a></td>
-    <td>Implementation of the Kerberos 5 network security system.
-       [<a href="/software/shishi/">shishi&nbsp;home</a>]</td></tr>
+    <td>Implementação do sistema de segurança de rede Kerberos 5.  [<a
+href="/software/shishi/">página&nbsp;do&nbsp;shishi</a>]</td></tr>
 
 <tr id="social"><td>* <a href="/software/social/">Social</a></td>
-    <td>Decentralized social networking server.
-       [<a href="/software/social/">social&nbsp;home</a>]</td></tr>
+    <td>Servidor de rede social descentralizado.  [<a
+href="/software/social/">página&nbsp;do&nbsp;social</a>]</td></tr>
 
 <tr id="stump"><td>* <a href="/software/stump/">Stump</a></td>
-    <td>Secure team-based Usenet moderation program.
-       [<a href="/software/stump/">stump&nbsp;home</a>]</td></tr>
+    <td>Programa seguro de moderação de Usenet baseado em equipe.  [<a
+href="/software/stump/">página&nbsp;do&nbsp;stump</a>]</td></tr>
 
 <tr id="websocket4j"><td>* <a 
href="/software/websocket4j/manual/">Websocket4j</a></td>
-    <td>WebSocket protocol implementation for Java-HTML5 communication.
-       [<a href="/software/websocket4j/">websocket4j&nbsp;home</a>]</td></tr>
+    <td>Implementação do protocolo WebSocket para comunicação Java-HTML5.  
[<a
+href="/software/websocket4j/">página&nbsp;do&nbsp;websocket4j</a>]</td></tr>
 
 <tr id="webstump"><td>* <a href="/software/webstump/">WebSTUMP</a></td>
-    <td>Web interface to STUMP.
-       [<a href="/software/webstump/">webstump&nbsp;home</a>]</td></tr>
+    <td>Interface web para STUMP.  [<a
+href="/software/webstump/">página&nbsp;do&nbsp;webstump</a>]</td></tr>
 
 <tr id="wget"><td>* <a href="/software/wget/manual/">Wget</a></td>
-    <td>Non-interactive command-line utility for downloading files.
-       [<a href="/software/wget/">wget&nbsp;home</a>]</td></tr>
+    <td>Utilitário de linha de comando não interativo para <i 
lang="en">download</i>
+de arquivos.  [<a 
href="/software/wget/">página&nbsp;do&nbsp;wget</a>]</td></tr>
 
 
 <tr>
-<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
+<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Comunicação ao
+vivo</b></big></a></td></tr>
 
 <tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
-    <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+    <td>Um programa de comunicação que respeita a privacidade.  [<a
+href="/software/ring/">página&nbsp;do&nbsp;ring</a>]</td></tr>
 
 
 <tr>
-<td id="Localization" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a 
href="http://directory.fsf.org/category/local/";><big><b>Localization</b></big></a></td></tr>
+<td id="Localization" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a
+href="http://directory.fsf.org/category/local/";><big><b>Localização</b></big></a></td></tr>
 
 <tr id="fribidi"><td>* <a href="/software/fribidi/">FriBiDi</a></td>
-    <td>Implementation of the Unicode bidirectional algorithm.
-       [<a href="/software/fribidi/">fribidi&nbsp;home</a>]</td></tr>
+    <td>Implementação do algoritmo bidirecional Unicode.  [<a
+href="/software/fribidi/">página&nbsp;do&nbsp;fribidi</a>]</td></tr>
 
 <tr id="gettext"><td>* <a href="/software/gettext/manual/">Gettext</a></td>
-    <td>Tools and documentation for translation.
-       [<a href="/software/gettext/">gettext&nbsp;home</a>]</td></tr>
+    <td>Ferramentas e documentação para tradução.  [<a
+href="/software/gettext/">página&nbsp;do&nbsp;gettext</a>]</td></tr>
 
 
 <tr>
-<td id="Mathematics" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a 
href="http://directory.fsf.org/category/math/";><big><b>Mathematics</b></big></a></td></tr>
+<td id="Mathematics" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/math/";><big><b>Matemática</b></big></a></td></tr>
 
 <tr id="aris"><td>* <a href="/software/aris/">Aris</a></td>
-    <td>Natural deduction first-order logic interface.
-       [<a href="/software/aris/">aris&nbsp;home</a>]</td></tr>
+    <td>Interface lógica de primeira ordem para dedução natural.  [<a
+href="/software/aris/">página&nbsp;do&nbsp;aris</a>]</td></tr>
 
 <tr id="bc"><td>* <a href="/software/bc/manual/bc.html">Bc</a></td>
-    <td>Arbitrary precision numeric processing language.
-       [<a href="/software/bc/">bc&nbsp;home</a>]</td></tr>
+    <td>Linguagem de processamento numérico de precisão arbitrária.  [<a
+href="/software/bc/">página&nbsp;do&nbsp;bc</a>]</td></tr>
 
 <tr id="c-graph"><td>* <a href="/software/c-graph/manual/">C-graph</a></td>
-    <td>Visualizing and demonstrating convolution.
-       [<a href="/software/c-graph/">c-graph&nbsp;home</a>]</td></tr>
+    <td>Visualização e demonstração de convolução.  [<a
+href="/software/c-graph/">página&nbsp;do&nbsp;c-graph</a>]</td></tr>
 
 <tr id="dap"><td>* <a href="/software/dap/">Dap</a></td>
-    <td>Statistics and graphics package.
-       [<a href="/software/dap/">dap&nbsp;home</a>]</td></tr>
+    <td>Pacote de estatística e gráficos.  [<a
+href="/software/dap/">página&nbsp;do&nbsp;dap</a>]</td></tr>
 
 <tr id="datamash"><td>* <a href="/software/datamash/">Datamash</a></td>
-    <td>Scriptable statistics and data calculation.
-       [<a href="/software/datamash/">datamash&nbsp;home</a>]</td></tr>
+    <td>Cálculo de dados e estatísticas programáveis.  [<a
+href="/software/datamash/">página&nbsp;do&nbsp;datamash</a>]</td></tr>
 
 <tr id="dc"><td>* <a href="/software/bc/manual/dc-1.05/">Dc</a></td>
-    <td>Arbitrary precision numeric processing with reverse-polish notation.
-       [<a href="/software/dc/">dc&nbsp;home</a>]</td></tr>
+    <td>Processamento numérico de precisão arbitrária com notação de 
polimento
+reverso.  [<a href="/software/dc/">página&nbsp;do&nbsp;dc</a>]</td></tr>
 
 <tr id="gmp"><td>* <a href="/software/gmp/manual/">GMP</a></td>
-    <td>Multiple-precision arithmetic library.
-       [<a href="/software/gmp/">gmp&nbsp;home</a>]</td></tr>
+    <td>Biblioteca aritmética de precisão múltipla.  [<a
+href="/software/gmp/">página&nbsp;do&nbsp;gmp</a>]</td></tr>
 
-<tr id="gsl"><td>* <a 
href="https://www.gnu.org/software/gsl/manual/html_node/";>GNU Scientific 
Library</a></td>
-    <td>Numerical library for C and C++.
-       [<a href="/software/gsl/">gsl&nbsp;home</a>]</td></tr>
+<tr id="gsl"><td>* <a 
href="https://www.gnu.org/software/gsl/manual/html_node/";>GNU
+Scientific Library</a></td>
+    <td>Biblioteca numérica para C e C++.  [<a
+href="/software/gsl/">página&nbsp;do&nbsp;gsl</a>]</td></tr>
 
 <tr id="jacal"><td>* <a 
href="http://people.csail.mit.edu/jaffer/jacal_toc.html";>JACAL</a></td>
-    <td>Symbolic mathematics system.
-       [<a href="/software/jacal/">jacal&nbsp;home</a>]</td></tr>
+    <td>Sistema de matemática simbólica.  [<a
+href="/software/jacal/">página&nbsp;do&nbsp;jacal</a>]</td></tr>
 
-<tr id="libmatheval"><td>* <a 
href="https://www.gnu.org/software/libmatheval/manual/libmatheval.html";>Libmatheval</a></td>
-    <td>Library for evaluating symbolic expressions.
-       [<a href="/software/libmatheval/">libmatheval&nbsp;home</a>]</td></tr>
+<tr id="libmatheval"><td>* <a
+href="https://www.gnu.org/software/libmatheval/manual/libmatheval.html";>Libmatheval</a></td>
+    <td>Biblioteca para avaliar expressões simbólicas.  [<a
+href="/software/libmatheval/">página&nbsp;do&nbsp;libmatheval</a>]</td></tr>
 
 <tr id="mcsim"><td>* <a 
href="http://www.gnu.org/software/mcsim/mcsim.html";>MCSim</a></td>
-    <td>Monte Carlo simulation and analysis.
-       [<a href="/software/mcsim/">mcsim&nbsp;home</a>]</td></tr>
+    <td>Simulação e análise de Monte Carlo.  [<a
+href="/software/mcsim/">página&nbsp;do&nbsp;mcsim</a>]</td></tr>
 
 <tr id="metalogic-inference"><td>* <a 
href="/software/metalogic-inference/">MLI</a></td>
-    <td>Logical proof program.
-       [<a 
href="/software/metalogic-inference/">metalogic-inference&nbsp;home</a>]</td></tr>
+    <td>Programa de prova lógica.  [<a
+href="/software/metalogic-inference/">página&nbsp;do&nbsp;metalogic-inference</a>]</td></tr>
 
 <tr id="mpc"><td>* <a 
href="http://www.multiprecision.org/downloads/mpc-1.1.0.pdf";>Mpc</a></td>
-    <td>C library for arbitrary precision complex arithmetic.
-       [<a href="/software/mpc/">mpc&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C para aritmética complexa de precisão arbitrária.  [<a
+href="/software/mpc/">página&nbsp;do&nbsp;mpc</a>]</td></tr>
 
 <tr id="mpfr"><td>* <a 
href="http://www.mpfr.org/mpfr-current/#doc";>Mpfr</a></td>
-    <td>C library for arbitrary precision floating-point arithmetic.
-       [<a href="/software/mpfr/">mpfr&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C para aritmética de ponto flutuante de precisão 
arbitrária.  [<a
+href="/software/mpfr/">página&nbsp;do&nbsp;mpfr</a>]</td></tr>
 
 <tr id="mpria"><td>* <a href="/software/mpria/">Mpria</a></td>
-    <td>C library for arbitrary precision rational arithmetic.
-       [<a href="/software/mpria/">mpria&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C para aritmética racional de precisão arbitrária.  [<a
+href="/software/mpria/">página&nbsp;do&nbsp;mpria</a>]</td></tr>
 
 <tr id="octave"><td>* <a href="/software/octave/support.html">Octave</a></td>
-    <td>High-level language for numerical computation.
-       [<a href="/software/octave/">octave&nbsp;home</a>]</td></tr>
+    <td>Linguagem de alto nível para computação numérica.  [<a
+href="/software/octave/">página&nbsp;do&nbsp;octave</a>]</td></tr>
 
 <tr id="pspp"><td>* <a href="/software/pspp/manual/">PSPP</a></td>
-    <td>Statistical analysis.
-       [<a href="/software/pspp/">pspp&nbsp;home</a>]</td></tr>
+    <td>Análise estatística.  [<a
+href="/software/pspp/">página&nbsp;do&nbsp;pspp</a>]</td></tr>
 
 <tr id="r"><td>* <a href="http://cran.r-project.org/#doc";>R</a></td>
-    <td>Environment for statistical computing and graphics.
-       [<a href="/software/r/">r&nbsp;home</a>]</td></tr>
+    <td>Ambiente para computação estatística e gráficos.  [<a
+href="/software/r/">página&nbsp;do&nbsp;r</a>]</td></tr>
 
 
 <tr>
-<td id="Music" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/music/";><big><b>Music</b></big></a></td></tr>
+<td id="Music" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/music/";><big><b>Música</b></big></a></td></tr>
 
 <tr id="cursynth"><td>* <a href="/software/cursynth/">Cursynth</a></td>
-    <td>Polyphonic and MIDI subtractive music synthesizer using curses.
-       [<a href="/software/cursynth/">cursynth&nbsp;home</a>]</td></tr>
+    <td>Sintetizador de música subtrativo polifônico e MIDI usando curses.  
[<a
+href="/software/cursynth/">página&nbsp;do&nbsp;cursynth</a>]</td></tr>
 
 <tr id="denemo"><td>* <a href="/software/denemo/">Denemo</a></td>
-    <td>Graphical music notation, front-end to GNU Lilypond.
-       [<a href="/software/denemo/">denemo&nbsp;home</a>]</td></tr>
+    <td>Notação de gráfica música, <i lang="en">front-end</i> para o GNU 
Lilypond.
+[<a href="/software/denemo/">página&nbsp;do&nbsp;denemo</a>]</td></tr>
 
 <tr id="gtick"><td>* <a href="/software/gtick/">GTick</a></td>
-    <td>Customizable metronome application.
-       [<a href="/software/gtick/">gtick&nbsp;home</a>]</td></tr>
+    <td>Aplicativo de metrônomo personalizável.  [<a
+href="/software/gtick/">página&nbsp;do&nbsp;gtick</a>]</td></tr>
 
 <tr id="lilypond"><td>* <a 
href="http://lilypond.org/manuals.html";>Lilypond</a></td>
-    <td>Music typesetting.
-       [<a href="/software/lilypond/">lilypond&nbsp;home</a>]</td></tr>
+    <td>Compositor de música.  [<a
+href="/software/lilypond/">página&nbsp;do&nbsp;lilypond</a>]</td></tr>
 
-<tr id="psychosynth"><td>* <a 
href="http://www.psychosynth.com/index.php?title=Documentation";>Psychosynth</a></td>
-    <td>Interactive software synthesizer.
-       [<a href="/software/psychosynth/">psychosynth&nbsp;home</a>]</td></tr>
+<tr id="psychosynth"><td>* <a
+href="http://www.psychosynth.com/index.php?title=Documentation";>Psychosynth</a></td>
+    <td>Sintetizador de software interativo.  [<a
+href="/software/psychosynth/">página&nbsp;do&nbsp;psychosynth</a>]</td></tr>
 
 <tr id="solfege"><td>* <a href="/software/solfege/">Solfege</a></td>
-    <td>Ear training.
-       [<a href="/software/solfege/">solfege&nbsp;home</a>]</td></tr>
+    <td>Treinamento de ouvido.  [<a
+href="/software/solfege/">página&nbsp;do&nbsp;solfege</a>]</td></tr>
 
 
 <tr>
-<td id="Printing" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/print/";><big><b>Printing</b></big></a></td></tr>
+<td id="Printing" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/print/";><big><b>Impressão</b></big></a></td></tr>
 
 <tr id="a2ps"><td>* <a href="/software/a2ps/">a2ps</a></td>
-    <td>Any file to PostScript, including pretty-printing.
-       [<a href="/software/a2ps/">a2ps&nbsp;home</a>]</td></tr>
+    <td>Qualquer arquivo para PostScript, incluindo impressão bonita.  [<a
+href="/software/a2ps/">página&nbsp;do&nbsp;a2ps</a>]</td></tr>
 
 <tr id="enscript"><td>* <a href="/software/enscript/">Enscript</a></td>
-    <td>Generating PostScript, including pretty-printing.
-       [<a href="/software/enscript/">enscript&nbsp;home</a>]</td></tr>
+    <td>Geração de PostScript, incluindo impressão bonita.  [<a
+href="/software/enscript/">página&nbsp;do&nbsp;enscript</a>]</td></tr>
 
 <tr id="ghostscript"><td>* <a href="/software/ghostscript/">GNU 
Ghostscript</a></td>
-    <td>PostScript and PDF interpreter.
-       [<a href="/software/ghostscript/">ghostscript&nbsp;home</a>]</td></tr>
+    <td>Interpretador de PostScript e PDF.  [<a
+href="/software/ghostscript/">página&nbsp;do&nbsp;ghostscript</a>]</td></tr>
 
 <tr id="gnuspool"><td>* <a href="/software/gnuspool/">GNUspool</a></td>
-    <td>Spooling system with a variety of interfaces.
-       [<a href="/software/gnuspool/">gnuspool&nbsp;home</a>]</td></tr>
+    <td>Sistema de <i lang="en">spool</i> com uma variedade de interfaces.  [<a
+href="/software/gnuspool/">página&nbsp;do&nbsp;gnuspool</a>]</td></tr>
 
 <tr id="gv"><td>* <a href="/software/gv/manual/">Gv</a></td>
-    <td>PostScript and PDF viewer using Ghostscript as a back-end.
-       [<a href="/software/gv/">gv&nbsp;home</a>]</td></tr>
+    <td>Visualizador de PostScript e PDF usando o Ghostscript como back-end.  
[<a
+href="/software/gv/">página&nbsp;do&nbsp;gv</a>]</td></tr>
 
 <tr id="hp2xx"><td>* <a href="/software/hp2xx/">Hp2xx</a></td>
-    <td>Convert HP-GL format graphics to other vector and bitmap formats.
-       [<a href="/software/hp2xx/">hp2xx&nbsp;home</a>]</td></tr>
+    <td>Converte gráficos em formato HP-GL para outros formatos vetoriais e de
+bitmap.  [<a href="/software/hp2xx/">página&nbsp;do&nbsp;hp2xx</a>]</td></tr>
 
 <tr id="pdf"><td>* <a href="/software/pdf/">Pdf</a></td>
-    <td>Library and programs for manipulating PDF.
-       [<a href="/software/pdf/">pdf&nbsp;home</a>]</td></tr>
+    <td>Biblioteca e programas para manipulação de PDF.  [<a
+href="/software/pdf/">página&nbsp;do&nbsp;pdf</a>]</td></tr>
 
 <tr id="trueprint"><td>* <a href="/software/trueprint/">Trueprint</a></td>
-    <td>Pretty-print C sources and other plain text to PostScript.
-       [<a href="/software/trueprint/">trueprint&nbsp;home</a>]</td></tr>
+    <td>Fontes C de impressão bonita e outro texto simples para PostScript.  
[<a
+href="/software/trueprint/">página&nbsp;do&nbsp;trueprint</a>]</td></tr>
 
 
 <tr>
-<td id="Science" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/science/";><big><b>Science</b></big></a></td></tr>
+<td id="Science" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/science/";><big><b>Ciência</b></big></a></td></tr>
 
 <tr id="archimedes"><td>* <a 
href="/software/archimedes/manual/">Archimedes</a></td>
-    <td>Semiconductor device simulator.
-       [<a href="/software/archimedes/">archimedes&nbsp;home</a>]</td></tr>
+    <td>Simulador de dispositivo semicondutor.  [<a
+href="/software/archimedes/">página&nbsp;do&nbsp;archimedes</a>]</td></tr>
 
 <tr id="dionysus"><td>* <a href="/software/dionysus/">Dionysus</a></td>
-    <td>Local search for universal constants and scientific values.
-       [<a href="/software/dionysus/">dionysus&nbsp;home</a>]</td></tr>
+    <td>Busca local por constantes universais e valores científicos.  [<a
+href="/software/dionysus/">página&nbsp;do&nbsp;dionysus</a>]</td></tr>
 
 <tr id="electric"><td>* <a 
href="http://www.staticfreesoft.com/jmanual/";>Electric</a></td>
-    <td>Electrical CAD system.
-       [<a href="/software/electric/">electric&nbsp;home</a>]</td></tr>
+    <td>Sistema de CAD elétrico.  [<a
+href="/software/electric/">página&nbsp;do&nbsp;electric</a>]</td></tr>
 
 <tr id="gama"><td>* <a href="/software/gama/manual/">Gama</a></td>
-    <td>Adjustment of geodetic networks.
-       [<a href="/software/gama/">gama&nbsp;home</a>]</td></tr>
+    <td>Ajuste de redes geodésicas.  [<a
+href="/software/gama/">página&nbsp;do&nbsp;gama</a>]</td></tr>
 
 <tr id="gbehistun"><td>* <a href="/software/gbehistun/">Gbehistun</a></td>
-    <td>Planetary Science tools.
-       [<a href="/software/gbehistun/">gbehistun&nbsp;home</a>]</td></tr>
+    <td>Ferramentas de ciência planetária.  [<a
+href="/software/gbehistun/">página&nbsp;do&nbsp;gbehistun</a>]</td></tr>
 
 <tr id="gneuralnetwork"><td>* <a href="/software/gneuralnetwork/">Gneural 
Network</a></td>
-    <td>Programmable neural network.
-       [<a 
href="/software/gneuralnetwork/">gneuralnetwork&nbsp;home</a>]</td></tr>
+    <td>Rede neural programável.  [<a
+href="/software/gneuralnetwork/">página&nbsp;do&nbsp;gneuralnetwork</a>]</td></tr>
 
 <tr id="gnuae"><td>* <a href="/software/gnuae/manual/">GnuAE</a></td>
-    <td>Designing alternate energy systems.
-       [<a href="/software/gnuae/">gnuae&nbsp;home</a>]</td></tr>
+    <td>Projetando sistemas de energia alternativos.  [<a
+href="/software/gnuae/">página&nbsp;do&nbsp;gnuae</a>]</td></tr>
 
 <tr id="gnuastro"><td>* <a href="/software/gnuastro/">Gnuastro</a></td>
-    <td>Astronomy utilities.
-       [<a href="/software/gnuastro/">gnuastro&nbsp;home</a>]</td></tr>
+    <td>Utilitários de astronomia.  [<a
+href="/software/gnuastro/">página&nbsp;do&nbsp;gnuastro</a>]</td></tr>
 
 <tr id="gnucap"><td>* <a 
href="/software/gnucap/gnucap-man-html/">GNUcap</a></td>
-    <td>Mixed analog and digital circuit simulator.
-       [<a href="/software/gnucap/">gnucap&nbsp;home</a>]</td></tr>
+    <td>Simulador de circuito analógico e digital misto.  [<a
+href="/software/gnucap/">página&nbsp;do&nbsp;gnucap</a>]</td></tr>
 
 <tr id="goptical"><td>* <a href="/software/goptical/manual/">Goptical</a></td>
-    <td>C++ optical design and simulation library.
-       [<a href="/software/goptical/">goptical&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C++ de design óptico e de simulação. [<a
+href="/software/goptical/">página&nbsp;do&nbsp;goptical</a>]</td></tr>
 
 <tr id="libredwg"><td>* <a href="/software/libredwg/">Libredwg</a></td>
-    <td>C library to handle DWG (CAD-related) files.
-       [<a href="/software/libredwg/">libredwg&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C para manipular arquivos DWG (relacionado a CAD).  [<a
+href="/software/libredwg/">página&nbsp;do&nbsp;libredwg</a>]</td></tr>
 
 <tr id="lims"><td>* <a href="/software/lims/">Lims</a></td>
-    <td>Scientific laboratory information management system.
-       [<a href="/software/lims/">lims&nbsp;home</a>]</td></tr>
+    <td>Sistema de gestão de informação científica em laboratório.  [<a
+href="/software/lims/">página&nbsp;do&nbsp;lims</a>]</td></tr>
 
-<tr id="melting"><td>* <a 
href="http://www.ebi.ac.uk/compneur-srv/melting/melting5-doc/melting.html";>Melting</a></td>
-    <td>Temperature computations for a nucleic acid duplex.
-       [<a href="/software/melting/">melting&nbsp;home</a>]</td></tr>
+<tr id="melting"><td>* <a
+href="http://www.ebi.ac.uk/compneur-srv/melting/melting5-doc/melting.html";>Melting</a></td>
+    <td>Cálculos de temperatura para um duplex de ácido nucleico.  [<a
+href="/software/melting/">página&nbsp;do&nbsp;melting</a>]</td></tr>
 
 <tr id="nano-archimedes"><td>* <a 
href="/software/nano-archimedes/">Nano-archimedes</a></td>
-    <td>Simulation of quantum systems using the Wigner Monte Carlo method.
-       [<a 
href="/software/nano-archimedes/">nano-archimedes&nbsp;home</a>]</td></tr>
+    <td>Simulação de sistemas quânticos usando o método de Wigner Monte 
Carlo.  [<a
+href="/software/nano-archimedes/">página&nbsp;do&nbsp;nano-archimedes</a>]</td></tr>
 
 <tr id="pcb"><td>* <a href="/software/pcb/">Pcb</a></td>
-    <td>Design printed circuit board layouts.
-       [<a href="/software/pcb/">pcb&nbsp;home</a>]</td></tr>
+    <td>Projete layouts de placa de circuito impresso.  [<a
+href="/software/pcb/">página&nbsp;do&nbsp;pcb</a>]</td></tr>
 
 <tr id="polyxmass"><td>* <a href="/software/polyxmass/">Polyxmass</a></td>
-    <td>Mass spectrometric data simulations and analyses.
-       [<a href="/software/polyxmass/">polyxmass&nbsp;home</a>]</td></tr>
+    <td>Simulações e análises de dados de espectrometria de massa.  [<a
+href="/software/polyxmass/">página&nbsp;do&nbsp;polyxmass</a>]</td></tr>
 
 <tr id="spacechart"><td>* <a href="/software/spacechart/">SpaceChart</a></td>
-    <td>Stargazing in 3D under GNOME.
-       [<a href="/software/spacechart/">spacechart&nbsp;home</a>]</td></tr>
+    <td>Observação das estrelas em 3D sob o GNOME.  [<a
+href="/software/spacechart/">página&nbsp;do&nbsp;spacechart</a>]</td></tr>
 
 <tr id="units"><td>* <a href="/software/units/manual/">Units</a></td>
-    <td>Conversion between thousands of scales.
-       [<a href="/software/units/">units&nbsp;home</a>]</td></tr>
+    <td>Conversão entre milhares de escalas.  [<a
+href="/software/units/">página&nbsp;do&nbsp;units</a>]</td></tr>
 
 
 <tr>
-<td id="Security" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/sec/";><big><b>Security</b></big></a></td></tr>
+<td id="Security" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/sec/";><big><b>Segurança</b></big></a></td></tr>
 
 <tr id="gnu-crypto"><td>* <a 
href="https://www.gnu.org/software/gnu-crypto/manual/";>Crypto</a></td>
-    <td>Cryptographic primitives and tools for Java programming.
-       [<a href="/software/gnu-crypto/">gnu-crypto&nbsp;home</a>]</td></tr>
+    <td>Primitivas e ferramentas criptográficas para programação em Java.  
[<a
+href="/software/gnu-crypto/">página&nbsp;do&nbsp;gnu-crypto</a>]</td></tr>
 
 <tr id="gnu-pw-mgr"><td>* <a href="/software/gnu-pw-mgr/">GNU-pw-mgr</a></td>
-    <td>Retrieve login credentials without recording passwords.
-       [<a href="/software/gnu-pw-mgr/">gnu-pw-mgr&nbsp;home</a>]</td></tr>
+    <td>Obtenha credenciais de login sem registrar senhas.  [<a
+href="/software/gnu-pw-mgr/">página&nbsp;do&nbsp;gnu-pw-mgr</a>]</td></tr>
 
-<tr id="gnupg"><td>* <a href="http://www.gnupg.org/documentation/";>GnuPG</a>
-<small>(<a 
href="https://www.gnupg.org/documentation/manuals/assuan/";>assuan</a>
-  <a href="https://www.gnupg.org/documentation/manuals/dirmngr/";>dirmngr</a>
-  <a href="https://www.gnupg.org/documentation/manuals/gcrypt/";>gcrypt</a>
-  <a href="https://www.gnupg.org/documentation/manuals/gcrypt/";>libgcrypt</a>
-  <a href="https://www.gnupg.org/documentation/manuals/gnupg/";>gnupg<!-- again 
--></a>
-  <a href="https://www.gnupg.org/documentation/manuals/gpgme/";>gpgme</a>
-  <a href="https://www.gnupg.org/documentation/manuals/ksba/";>ksba</a>)</small>
+<tr id="gnupg"><td><!-- again -->
+* <a href="http://www.gnupg.org/documentation/";>GnuPG</a> <small>(<a
+href="https://www.gnupg.org/documentation/manuals/assuan/";>assuan</a> <a
+href="https://www.gnupg.org/documentation/manuals/dirmngr/";>dirmngr</a> <a
+href="https://www.gnupg.org/documentation/manuals/gcrypt/";>gcrypt</a> <a
+href="https://www.gnupg.org/documentation/manuals/gcrypt/";>libgcrypt</a> <a
+href="https://www.gnupg.org/documentation/manuals/gnupg/";>gnupg</a> <a
+href="https://www.gnupg.org/documentation/manuals/gpgme/";>gpgme</a> <a
+href="https://www.gnupg.org/documentation/manuals/ksba/";>ksba</a>)</small>
 </td>
-    <td>GNU Privacy Guard.
-       [<a href="/software/gnupg/">gnupg&nbsp;home</a>]</td></tr>
+    <td>GNU Privacy Guard (i.e. guardião de privacidade).  [<a
+href="/software/gnupg/">página&nbsp;do&nbsp;gnupg</a>]</td></tr>
 
 <tr id="gvpe"><td>* <a href="/software/gvpe/">GVPE</a></td>
-    <td>Secure VPN among multiple nodes over an untrusted network.
-       [<a href="/software/gvpe/">gvpe&nbsp;home</a>]</td></tr>
+    <td>VPN segura entre vários nós em uma rede não confiável.  [<a
+href="/software/gvpe/">página&nbsp;do&nbsp;gvpe</a>]</td></tr>
 
 <tr id="libtasn1"><td>* <a href="/software/libtasn1/manual/">Libtasn1</a></td>
-    <td>ASN.1 library.
-       [<a href="/software/libtasn1/">libtasn1&nbsp;home</a>]</td></tr>
+    <td>Biblioteca ASN.1.  [<a
+href="/software/libtasn1/">página&nbsp;do&nbsp;libtasn1</a>]</td></tr>
 
 <tr id="lsh"><td>* <a 
href="http://www.lysator.liu.se/~nisse/lsh/lsh.html";>Lsh</a></td>
-    <td>GNU implementation of the Secure Shell (ssh) protocols.
-       [<a href="/software/lsh/">lsh&nbsp;home</a>]</td></tr>
+    <td>Implementação do GNU de protocolos de Secure Shell (ssh).  [<a
+href="/software/lsh/">página&nbsp;do&nbsp;lsh</a>]</td></tr>
 
 <tr id="nettle"><td>* <a 
href="http://www.lysator.liu.se/~nisse/nettle/nettle.html";>Nettle</a></td>
-    <td>C library for low-level cryptographic functionality.
-       [<a href="/software/nettle/">nettle&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C para funcionalidade criptográfica de baixo nível.  [<a
+href="/software/nettle/">página&nbsp;do&nbsp;nettle</a>]</td></tr>
 
 <tr id="radius"><td>* <a href="/software/radius/manual/">Radius</a></td>
-    <td>Authentication and accounting services and daemon.
-       [<a href="/software/radius/">radius&nbsp;home</a>]</td></tr>
+    <td>Serviços de autenticação e contabilidade e daemon.  [<a
+href="/software/radius/">página&nbsp;do&nbsp;radius</a>]</td></tr>
 
-<tr id="userv"><td>* <a 
href="http://www.chiark.greenend.org.uk/~ian/userv/spec.html/";>Userv</a></td>
-    <td>Daemon to control service access.
-       [<a href="/software/userv/">userv&nbsp;home</a>]</td></tr>
+<tr id="userv"><td>* <a
+href="http://www.chiark.greenend.org.uk/~ian/userv/spec.html/";>Userv</a></td>
+    <td>Daemon para controlar acesso a serviços.  [<a
+href="/software/userv/">página&nbsp;do&nbsp;userv</a>]</td></tr>
 
 
 <tr>
-<td id="Software" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/dev/";><big><b>Software 
development</b></big></a></td></tr>
+<td id="Software" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/dev/";><big><b>Desenvolvimento de
+software</b></big></a></td></tr>
 
 <tr id="apl"><td>* <a href="/software/apl/">APL</a></td>
-    <td>APL interpreter.
-       [<a href="/software/apl/">apl&nbsp;home</a>]</td></tr>
+    <td>Interpretador de APL.  [<a
+href="/software/apl/">página&nbsp;do&nbsp;apl</a>]</td></tr>
 
 <tr id="autoconf"><td>* <a href="/software/autoconf/manual/">Autoconf</a></td>
-    <td>Create source code configuration scripts.
-       [<a href="/software/autoconf/">autoconf&nbsp;home</a>]</td></tr>
+    <td>Criação de scripts de configuração de código-fonte.  [<a
+href="/software/autoconf/">página&nbsp;do&nbsp;autoconf</a>]</td></tr>
 
 <tr id="autoconf-archive"><td>* <a 
href="/software/autoconf-archive/">Autoconf-archive</a></td>
-    <td>Collection of freely reusable Autoconf macros.
-       [<a 
href="/software/autoconf-archive/">autoconf-archive&nbsp;home</a>]</td></tr>
+    <td>Coleção de macros de Autoconf livremente reusáveis.  [<a
+href="/software/autoconf-archive/">página&nbsp;do&nbsp;autoconf-archive</a>]</td></tr>
 
 <tr id="autogen"><td>* <a href="/software/autogen/manual/">Autogen</a></td>
-    <td>Automated program generator.
-       [<a href="/software/autogen/">autogen&nbsp;home</a>]</td></tr>
+    <td>Gerador automatizado de programa.  [<a
+href="/software/autogen/">página&nbsp;do&nbsp;autogen</a>]</td></tr>
 
 <tr id="automake"><td>* <a href="/software/automake/manual/">Automake</a></td>
-    <td>Making GNU standards-compliant Makefiles.
-       [<a href="/software/automake/">automake&nbsp;home</a>]</td></tr>
+    <td>Criação de Makefiles compatíveis com o padrão do GNU.  [<a
+href="/software/automake/">página&nbsp;do&nbsp;automake</a>]</td></tr>
 
 <tr id="bash"><td>* <a href="/software/bash/manual/">Bash</a></td>
-    <td>The GNU Bourne-Again SHell.
-       [<a href="/software/bash/">bash&nbsp;home</a>]</td></tr>
+    <td>O GNU Bourne-Again SHell.  [<a
+href="/software/bash/">página&nbsp;do&nbsp;bash</a>]</td></tr>
 
-<tr id="binutils"><td>* <a href="/software/binutils/manual/">Binutils</a>
-<small>(<a href="https://sourceware.org/binutils/docs/as/";>as</a>
-  <a href="https://sourceware.org/binutils/docs/bfd/";>bfd</a>
-  <a href="https://sourceware.org/binutils/docs/binutils/";>binutils<!-- again 
--></a>
-  <a href="https://sourceware.org/binutils/docs/gprof/";>gprof</a>
-  <a href="https://sourceware.org/binutils/docs/ld/";>ld</a>)</small>
+<tr id="binutils"><td><!-- again -->
+* <a href="/software/binutils/manual/">Binutils</a> <small>(<a
+href="https://sourceware.org/binutils/docs/as/";>as</a> <a
+href="https://sourceware.org/binutils/docs/bfd/";>bfd</a> <a
+href="https://sourceware.org/binutils/docs/binutils/";>binutils</a> <a
+href="https://sourceware.org/binutils/docs/gprof/";>gprof</a> <a
+href="https://sourceware.org/binutils/docs/ld/";>ld</a>)</small>
 </td>
-    <td>Binary utilities: bfd gas gprof ld.
-       [<a href="/software/binutils/">binutils&nbsp;home</a>]</td></tr>
+    <td>Utilitários de binários: bfd gas gprof ld.  [<a
+href="/software/binutils/">página&nbsp;do&nbsp;binutils</a>]</td></tr>
 
 <tr id="bison"><td>* <a href="/software/bison/manual/">Bison</a></td>
-    <td>Parser generator.
-       <br/>Available in print:
-       <cite><a href="http://shop.fsf.org/product/bison-manual/";>The Bison 
Manual</a></cite>.
-       [<a href="/software/bison/">bison&nbsp;home</a>]</td></tr>
+    <td>Gerador de analisador.
+       <br/>Disponível impresso: <cite><a
+href="http://shop.fsf.org/product/bison-manual/";>O manual do
+Bison</a></cite>.  [<a 
href="/software/mdk/">página&nbsp;do&nbsp;mdk</a>]</td></tr>
 
 <tr id="ccide"><td>* <a href="/software/ccide/">Ccide</a></td>
-    <td>Decision table code generator.
-       [<a href="/software/ccide/">ccide&nbsp;home</a>]</td></tr>
+    <td>Gerador de código de tabela de decisão.  [<a
+href="/software/ccide/">página&nbsp;do&nbsp;ccide</a>]</td></tr>
 
 <tr id="cflow"><td>* <a href="/software/cflow/manual/">Cflow</a></td>
-    <td>Create a graph of control flow within a program.
-       [<a href="/software/cflow/">cflow&nbsp;home</a>]</td></tr>
+    <td>Crie um grafo de fluxo de controle dentro de um programa.  [<a
+href="/software/cflow/">página&nbsp;do&nbsp;cflow</a>]</td></tr>
 
 <tr id="cim"><td>* <a href="/software/cim/">Cim</a></td>
-    <td>Simula compiler.
-       [<a href="/software/cim/">cim&nbsp;home</a>]</td></tr>
+    <td>Compilador de Simula.  [<a
+href="/software/cim/">página&nbsp;do&nbsp;cim</a>]</td></tr>
 
 <tr id="clisp"><td>* <a 
href="/software/clisp/impnotes/clisp.html">CLISP</a></td>
-    <td>A Common Lisp implementation.
-       [<a href="/software/clisp/">clisp&nbsp;home</a>]</td></tr>
+    <td>Uma implementação do Common Lisp.  [<a
+href="/software/clisp/">página&nbsp;do&nbsp;clisp</a>]</td></tr>
 
 <tr id="complexity"><td>* <a 
href="/software/complexity/manual/">Complexity</a></td>
-    <td>Analyze complexity of C functions.
-       [<a href="/software/complexity/">complexity&nbsp;home</a>]</td></tr>
+    <td>Análise de complexidade de funções C.  [<a
+href="/software/complexity/">página&nbsp;do&nbsp;complexity</a>]</td></tr>
 
 <tr id="config"><td>* <a href="/software/config/">Config</a></td>
-    <td>Ubiquitious config.guess and config.sub scripts.
-       [<a href="/software/config/">config&nbsp;home</a>]</td></tr>
+    <td>Scripts onipresentes config.guess e config.sub.  [<a
+href="/software/config/">página&nbsp;do&nbsp;config</a>]</td></tr>
 
 <tr id="coreutils"><td>* <a 
href="/software/coreutils/manual/">Coreutils</a></td>
-    <td>Core GNU utilities (file, text, shell).
-       [<a href="/software/coreutils/">coreutils&nbsp;home</a>]</td></tr>
+    <td>Utilitários principais do GNU (arquivo, texto, shell).  [<a
+href="/software/coreutils/">página&nbsp;do&nbsp;coreutils</a>]</td></tr>
 
 <tr id="cppi"><td>* <a href="/software/cppi/manual/">Cppi</a></td>
-    <td>Indent C preprocessor directives to reflect nesting and more.
-       [<a href="/software/cppi/">cppi&nbsp;home</a>]</td></tr>
+    <td>Aplica recuo de diretivas do pré-processador C para refletir o 
aninhamento e
+mais.  [<a href="/software/cppi/">página&nbsp;do&nbsp;cppi</a>]</td></tr>
 
-<tr id="ddd"><td>* <a 
href="https://www.gnu.org/software/ddd/manual/html_mono/ddd.html";>DDD</a></td>
-    <td>Graphical front-end for GDB and other debuggers.
-       [<a href="/software/ddd/">ddd&nbsp;home</a>]</td></tr>
+<tr id="ddd"><td>* <a
+href="https://www.gnu.org/software/ddd/manual/html_mono/ddd.html";>DDD</a></td>
+    <td>Front-end gráfico para o GDB e outros depuradores.  [<a
+href="/software/ddd/">página&nbsp;do&nbsp;ddd</a>]</td></tr>
 
 <tr id="dejagnu"><td>* <a href="/software/dejagnu/manual/">DejaGnu</a></td>
-    <td>GNU software testing framework.
-       [<a href="/software/dejagnu/">dejagnu&nbsp;home</a>]</td></tr>
+    <td>Framework de teste de softwares GNU.  [<a
+href="/software/dejagnu/">página&nbsp;do&nbsp;dejagnu</a>]</td></tr>
 
 <tr id="djgpp"><td>* <a href="/software/djgpp/">DJGPP</a></td>
-    <td>Development system and GNU utilities for DOS on x86 hardware.
-       [<a href="/software/djgpp/">djgpp&nbsp;home</a>]</td></tr>
+    <td>Sistema de desenvolvimento e utilitários GNU para DOS em hardware 
x86.  [<a
+href="/software/djgpp/">página&nbsp;do&nbsp;djgpp</a>]</td></tr>
 
 <tr id="edma"><td>* <a href="/software/edma/">EDMA</a></td>
-    <td>Object-oriented component-based development environment.
-       [<a href="/software/edma/">edma&nbsp;home</a>]</td></tr>
+    <td>Ambiente de desenvolvimento baseado em componentes orientado a objeto. 
 [<a
+href="/software/edma/">página&nbsp;do&nbsp;edma</a>]</td></tr>
 
 <tr id="epsilon"><td>* <a href="/software/epsilon/manual/">Epsilon</a></td>
-    <td>A purely functional programming language.
-       [<a href="/software/epsilon/">epsilon&nbsp;home</a>]</td></tr>
+    <td>Uma linguagem de programação puramente funcional.  [<a
+href="/software/epsilon/">página&nbsp;do&nbsp;epsilon</a>]</td></tr>
 
 <tr id="findutils"><td>* <a 
href="/software/findutils/manual/">Findutils</a></td>
-    <td>Operating on files matching given criteria.
-       [<a href="/software/findutils/">findutils&nbsp;home</a>]</td></tr>
+    <td>Operação em arquivos que correspondem a critérios dados.  [<a
+href="/software/findutils/">página&nbsp;do&nbsp;findutils</a>]</td></tr>
 
-<tr id="gcc"><td>* <a href="/software/gcc/">GCC</a>
-<small>(<a href="https://gcc.gnu.org/onlinedocs/cpp/";>cpp</a>
-  <a href="https://gcc.gnu.org/onlinedocs/cppinternals/";>cppinternals</a>
-  <a href="https://gcc.gnu.org/onlinedocs/gcc/";>gcc<!-- again --></a>
-  <a href="https://gcc.gnu.org/onlinedocs/gccint/";>gccint</a>
-  <a href="https://gcc.gnu.org/onlinedocs/gfc-internals/";>gfc-internals</a>
-  <a href="https://gcc.gnu.org/onlinedocs/gfortran/";>gfortran</a>
-  <a href="https://gcc.gnu.org/onlinedocs/gnat-style/";>gnat-style</a>
-  <a href="https://gcc.gnu.org/onlinedocs/gnat_rm/";>gnat_rm</a>
-  <a href="https://gcc.gnu.org/onlinedocs/gnat_ugn/";>gnat_ugn</a>
-  <a href="https://gcc.gnu.org/onlinedocs/libgomp/";>libgomp</a>
-  <a href="https://gcc.gnu.org/onlinedocs/libiberty/";>libiberty</a>
-  <a href="https://gcc.gnu.org/onlinedocs/libstdc++/";>libstdc++</a>)</small>
+<tr id="gcc"><td><!-- again -->
+* <a href="/software/gcc/">GCC</a> <small>(<a
+href="https://gcc.gnu.org/onlinedocs/cpp/";>cpp</a> <a
+href="https://gcc.gnu.org/onlinedocs/cppinternals/";>cppinternals</a> <a
+href="https://gcc.gnu.org/onlinedocs/gcc/";>gcc</a> <a
+href="https://gcc.gnu.org/onlinedocs/gccint/";>gccint</a> <a
+href="https://gcc.gnu.org/onlinedocs/gfc-internals/";>gfc-internals</a> <a
+href="https://gcc.gnu.org/onlinedocs/gfortran/";>gfortran</a> <a
+href="https://gcc.gnu.org/onlinedocs/gnat-style/";>gnat-style</a> <a
+href="https://gcc.gnu.org/onlinedocs/gnat_rm/";>gnat_rm</a> <a
+href="https://gcc.gnu.org/onlinedocs/gnat_ugn/";>gnat_ugn</a> <a
+href="https://gcc.gnu.org/onlinedocs/libgomp/";>libgomp</a> <a
+href="https://gcc.gnu.org/onlinedocs/libiberty/";>libiberty</a> <a
+href="https://gcc.gnu.org/onlinedocs/libstdc++/";>libstdc++</a>)</small>
 </td>
     <td>GNU Compiler Collection.
-       <br/>Available in print:
-       <cite><a 
href="http://shop.fsf.org/product/using-gcc-gnu-compiler-collection-reference-manual/";>Using
 GCC: The GNU Compiler Collection Reference Manual</a></cite>.
-       [<a href="/software/gcc/">gcc&nbsp;home</a>]</td></tr>
+       <br/>Disponível impresso: <cite><a
+href="http://shop.fsf.org/product/using-gcc-gnu-compiler-collection-reference-manual/";>Using
+GCC: The GNU Compiler Collection Reference Manual</a></cite>.  [<a
+href="/software/gcc/">página&nbsp;do&nbsp;gcc</a>]</td></tr>
 
 <tr id="gcl"><td>* <a href="/software/gcl/">GNU Common Lisp</a></td>
-    <td>A Common Lisp implementation.
-       [<a href="/software/gcl/">gcl&nbsp;home</a>]</td></tr>
+    <td>Uma implementação do Common Lisp.  [<a
+href="/software/gcl/">página&nbsp;do&nbsp;gcl</a>]</td></tr>
 
-<tr id="gdb"><td>* <a href="/software/gdb/documentation/">GDB</a>
-<small>(<a href="https://sourceware.org/gdb/current/onlinedocs/gdb/";>gdb<!-- 
again --></a>
-  <a 
href="https://sourceware.org/gdb/current/onlinedocs/stabs/";>stabs</a>)</small>
+<tr id="gdb"><td><!-- again -->
+* <a href="/software/gdb/documentation/">GDB</a> <small>(<a
+href="https://sourceware.org/gdb/current/onlinedocs/gdb/";>gdb</a> <a
+href="https://sourceware.org/gdb/current/onlinedocs/stabs/";>stabs</a>)</small>
 </td>
-    <td>The GNU debugger.
-       <br/>Available in print:
-       <cite><a 
href="http://shop.fsf.org/product/debugging-gdb-gnu-source-level-debugger-10/";>Debugging
 with GDB: The GNU Source-Level Debugger</a></cite>.
-       [<a href="/software/gdb/">gdb&nbsp;home</a>]</td></tr>
+    <td>O depurador do GNU.
+       <br/>Disponível impresso: <cite><a
+href="http://shop.fsf.org/product/debugging-gdb-gnu-source-level-debugger-10/";>Debugging
+with GDB: The GNU Source-Level Debugger</a></cite>.  [<a
+href="/software/gdb/">página&nbsp;do&nbsp;gdb</a>]</td></tr>
 
 <tr id="gengen"><td>* <a href="/software/gengen/gengen.html">Gengen</a></td>
-    <td>A parameterized-text-generator generator based on a template.
-       [<a href="/software/gengen/">gengen&nbsp;home</a>]</td></tr>
+    <td>Um gerador de gerador-parametrizado-por-texto baseado em um modelo.  
[<a
+href="/software/gengen/">página&nbsp;do&nbsp;gengen</a>]</td></tr>
 
 <tr id="gengetopt"><td>* <a 
href="/software/gengetopt/gengetopt.html">Gengetopt</a></td>
-    <td>Create parsers for command line options.
-       [<a href="/software/gengetopt/">gengetopt&nbsp;home</a>]</td></tr>
+    <td>Cria analisadores para opções de linha de comando.  [<a
+href="/software/gengetopt/">página&nbsp;do&nbsp;gengetopt</a>]</td></tr>
 
-<tr id="gforth"><td>* <a 
href="https://www.complang.tuwien.ac.at/forth/gforth/Docs-html/";>Gforth</a></td>
-    <td>Forth interpreter.
-       [<a href="/software/gforth/">gforth&nbsp;home</a>]</td></tr>
-
-<tr id="global"><td>* <a 
href="https://www.gnu.org/software/global/manual/global.html";>Global</a></td>
-    <td>Cross-environment source code tag system.
-       [<a href="/software/global/">global&nbsp;home</a>]</td></tr>
+<tr id="gforth"><td>* <a
+href="https://www.complang.tuwien.ac.at/forth/gforth/Docs-html/";>Gforth</a></td>
+    <td>Interpretador de Forth.  [<a
+href="/software/gforth/">página&nbsp;do&nbsp;gforth</a>]</td></tr>
+
+<tr id="global"><td>* <a
+href="https://www.gnu.org/software/global/manual/global.html";>Global</a></td>
+    <td>Sistema de tag de código-fonte de ambiente cruzado.  [<a
+href="/software/global/">página&nbsp;do&nbsp;global</a>]</td></tr>
 
 <tr id="glue"><td>* <a href="/software/glue/">GLUE</a></td>
-    <td>Distributed groupware application framework.
-       [<a href="/software/glue/">glue&nbsp;home</a>]</td></tr>
+    <td>Estrutura de aplicativo de groupware distribuído.  [<a
+href="/software/glue/">página&nbsp;do&nbsp;glue</a>]</td></tr>
 
 <tr id="gnat"><td>* <a href="/software/gnat/">GNAT</a></td>
-    <td>Ada compiler.
-       [<a href="/software/gnat/">gnat&nbsp;home</a>]</td></tr>
+    <td>Compilador de Ada.  [<a 
href="/software/gnat/">página&nbsp;do&nbsp;gnat</a>]</td></tr>
 
 <tr id="gnats"><td>* <a href="/software/gnats/#documentation">GNATS</a></td>
-    <td>GNU problem report and bug management system.
-       [<a href="/software/gnats/">gnats&nbsp;home</a>]</td></tr>
+    <td>Sistema GNU para relatório de problemas e gerenciamento de bugs.  [<a
+href="/software/gnats/">página&nbsp;do&nbsp;gnats</a>]</td></tr>
 
 <tr id="gnatsweb"><td>* <a href="/software/gnatsweb/">Gnatsweb</a></td>
-    <td>Web interface to GNATS.
-       [<a href="/software/gnatsweb/">gnatsweb&nbsp;home</a>]</td></tr>
+    <td>Interface web para o GNATS.  [<a
+href="/software/gnatsweb/">página&nbsp;do&nbsp;gnatsweb</a>]</td></tr>
 
-<tr id="gnu-c-manual"><td>* <a 
href="https://www.gnu.org/software/gnu-c-manual/gnu-c-manual.html";>GNU C 
reference manual</a></td>
-    <td>Reference manual for the C programming language.
-       [<a href="/software/gnu-c-manual/">gnu-c-manual&nbsp;home</a>]</td></tr>
+<tr id="gnu-c-manual"><td>* <a
+href="https://www.gnu.org/software/gnu-c-manual/gnu-c-manual.html";>Manual de
+referência C do GNU</a></td>
+    <td>Manual de referência para a linguagem de programação C.  [<a
+href="/software/gnu-c-manual/">página&nbsp;do&nbsp;gnu-c-manual</a>]</td></tr>
 
 <tr id="gnucobol"><td>* <a 
href="http://open-cobol.sourceforge.net/doc/gnucobol.html";>GnuCOBOL</a></td>
-    <td>A modern COBOL compiler.
-       [<a href="/software/gnucobol/">gnucobol&nbsp;home</a>]</td></tr>
+    <td>Um compilador moderno de COBOL.  [<a
+href="/software/gnucobol/">página&nbsp;do&nbsp;gnucobol</a>]</td></tr>
 
 <tr id="gnulib"><td>* <a href="/software/gnulib/manual/">GNUlib</a></td>
-    <td>Source files to share among distributions.
-       [<a href="/software/gnulib/">gnulib&nbsp;home</a>]</td></tr>
+    <td>Arquivos fontes para compartilhar entre distribuições.  [<a
+href="/software/gnulib/">página&nbsp;do&nbsp;gnulib</a>]</td></tr>
 
 <tr id="gnumach"><td>* <a 
href="/software/hurd/microkernel/mach/documentation.html">Mach</a></td>
-    <td>Microkernel of the GNU system.
-       [<a href="/software/gnumach/">gnumach&nbsp;home</a>]</td></tr>
+    <td>Microkernel do sistema GNU.  [<a
+href="/software/gnumach/">página&nbsp;do&nbsp;gnumach</a>]</td></tr>
 
-<tr id="gnuprologjava"><td>* <a 
href="/software/gnuprologjava/api/">GNUprologjava</a>
-<small>(<a 
href="https://www.gnu.org/software/gnuprologjava/manual/";>gnuprologjava<!-- 
again --></a>)</small>
+<tr id="gnuprologjava"><td><!-- again -->
+* <a href="/software/gnuprologjava/api/">GNUprologjava</a> <small>(<a
+href="https://www.gnu.org/software/gnuprologjava/manual/";>gnuprologjava</a>)</small>
 </td>
-    <td>Implementation of Prolog as a Java library.
-       [<a 
href="/software/gnuprologjava/">gnuprologjava&nbsp;home</a>]</td></tr>
+    <td>Implementação de Prolog como uma biblioteca Java.  [<a
+href="/software/gnuprologjava/">página&nbsp;do&nbsp;gnuprologjava</a>]</td></tr>
 
 <tr id="gnustep"><td>* <a 
href="http://www.gnustep.org/developers/documentation.html";>GNUstep</a></td>
-    <td>Object-oriented application development environment.
-       [<a href="/software/gnustep/">gnustep&nbsp;home</a>]</td></tr>
+    <td>Ambiente de desenvolvimento de aplicativos orientado a objeto.  [<a
+href="/software/edma/">página&nbsp;do&nbsp;gnustep</a>]</td></tr>
 
 <tr id="gorm"><td>* <a 
href="http://wiki.gnustep.org/index.php/Gorm_Manual";>Gorm</a></td>
-    <td>GNUstep interface designer.
-       [<a href="/software/gorm/">gorm&nbsp;home</a>]</td></tr>
+    <td>Designer de interface GNUstep.  [<a
+href="/software/gorm/">página&nbsp;do&nbsp;gorm</a>]</td></tr>
 
 <tr id="gperf"><td>* <a href="/software/gperf/manual/">Gperf</a></td>
-    <td>Perfect hash function generator.
-       [<a href="/software/gperf/">gperf&nbsp;home</a>]</td></tr>
+    <td>Gerador de função de hash perfeita.  [<a
+href="/software/gperf/">página&nbsp;do&nbsp;gperf</a>]</td></tr>
 
 <tr id="gprolog"><td>* <a 
href="http://www.gprolog.org/manual/";>Gprolog</a></td>
-    <td>Prolog compiler.
-       [<a href="/software/gprolog/">gprolog&nbsp;home</a>]</td></tr>
+    <td>Compilador de Prolog.  [<a
+href="/software/gprolog/">página&nbsp;do&nbsp;gprolog</a>]</td></tr>
 
 <tr id="greg"><td>* <a href="/software/greg/gregdoc.html">Greg</a></td>
-    <td>Software testing framework.
-       [<a href="/software/greg/">greg&nbsp;home</a>]</td></tr>
+    <td>Framework de teste de software.  [<a
+href="/software/greg/">página&nbsp;do&nbsp;greg</a>]</td></tr>
 
 <tr id="guile"><td>* <a href="/software/guile/manual/">Guile</a></td>
-    <td>Scheme implementation intended especially for extensions.
-       [<a href="/software/guile/">guile&nbsp;home</a>]</td></tr>
+    <td>Implementação de Scheme destinada especialmente para extensões.  [<a
+href="/software/guile/">página&nbsp;do&nbsp;guile</a>]</td></tr>
 
-<tr id="guile-gnome"><td>* <a 
href="/software/guile-gnome/docs/">Guile-gnome</a>
-<small>(<a 
href="https://www.gnu.org/software/guile-gnome/docs/atk/html/";>atk</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/clutter-glx/html/";>clutter-glx</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/clutter/html/";>clutter</a>
-  <a href="https://www.gnu.org/software/guile-gnome/docs/corba/html/";>corba</a>
-  <a href="https://www.gnu.org/software/guile-gnome/docs/gconf/html/";>gconf</a>
-  <a href="https://www.gnu.org/software/guile-gnome/docs/gdk/html/";>gdk</a>
-  <a href="https://www.gnu.org/software/guile-gnome/docs/glib/html/";>glib</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/gnome-vfs/html/";>gnome-vfs</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/gobject/html/";>gobject</a>
-  <a href="https://www.gnu.org/software/guile-gnome/docs/gtk/html/";>gtk</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/libglade/html/";>libglade</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/libgnome/html/";>libgnome</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/libgnomecanvas/html/";>libgnomecanvas</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/libgnomeui/html/";>libgnomeui</a>
-  <a href="https://www.gnu.org/software/guile-gnome/docs/pango/html/";>pango</a>
-  <a 
href="https://www.gnu.org/software/guile-gnome/docs/pangocairo/html/";>pangocairo</a>)</small>
+<tr id="guile-gnome"><td>* <a 
href="/software/guile-gnome/docs/">Guile-gnome</a> <small>(<a
+href="https://www.gnu.org/software/guile-gnome/docs/atk/html/";>atk</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/clutter-glx/html/";>clutter-glx</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/clutter/html/";>clutter</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/corba/html/";>corba</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/gconf/html/";>gconf</a>
+<a href="https://www.gnu.org/software/guile-gnome/docs/gdk/html/";>gdk</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/glib/html/";>glib</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/gnome-vfs/html/";>gnome-vfs</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/gobject/html/";>gobject</a>
+<a href="https://www.gnu.org/software/guile-gnome/docs/gtk/html/";>gtk</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/libglade/html/";>libglade</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/libgnome/html/";>libgnome</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/libgnomecanvas/html/";>libgnomecanvas</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/libgnomeui/html/";>libgnomeui</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/pango/html/";>pango</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/pangocairo/html/";>pangocairo</a>)</small>
 </td>
-    <td>Guile interface for GTK+ programming for GNOME.
-       [<a href="/software/guile-gnome/">guile-gnome&nbsp;home</a>]</td></tr>
+    <td>Interface Guile para programação em GTK+ para o GNOME.  [<a
+href="/software/guile-gnome/">página&nbsp;do&nbsp;guile-gnome</a>]</td></tr>
 
 <tr id="guile-rpc"><td>* <a 
href="/software/guile-rpc/manual/">Guile-rpc</a></td>
-    <td>Pure Scheme implementation for the ONC RPC standard.
-       [<a href="/software/guile-rpc/">guile-rpc&nbsp;home</a>]</td></tr>
+    <td>Implementação do Pure Scheme para o padrão ONC RPC.  [<a
+href="/software/guile-rpc/">página&nbsp;do&nbsp;guile-rpc</a>]</td></tr>
 
 <tr id="hello"><td>* <a href="/software/hello/manual/">Hello</a></td>
-    <td>Hello, GNU world: An example GNU package.
-       [<a href="/software/hello/">hello&nbsp;home</a>]</td></tr>
+    <td>Olá, mundo GNU: Um exemplo de pacote GNU.  [<a
+href="/software/hello/">página&nbsp;do&nbsp;hello</a>]</td></tr>
 
 <tr id="hurd"><td>* <a href="/software/hurd/doc/doc.html">Hurd</a></td>
-    <td>The kernel servers for the GNU operating system.
-       [<a href="/software/hurd/">hurd&nbsp;home</a>]</td></tr>
+    <td>Os servidores do kernel para o sistema operacional GNU.  [<a
+href="/software/hurd/">página&nbsp;do&nbsp;hurd</a>]</td></tr>
 
 <tr id="idutils"><td>* <a href="/software/idutils/manual/">Idutils</a></td>
-    <td>Identifier database utilities.
-       [<a href="/software/idutils/">idutils&nbsp;home</a>]</td></tr>
+    <td>Utilitários do banco de dados de identificadores.  [<a
+href="/software/idutils/">página&nbsp;do&nbsp;idutils</a>]</td></tr>
 
 <tr id="indent"><td>* <a href="/software/indent/manual/">Indent</a></td>
-    <td>Code reformatter.
-       [<a href="/software/indent/">indent&nbsp;home</a>]</td></tr>
+    <td>Reformatador de código.  [<a
+href="/software/indent/">página&nbsp;do&nbsp;indent</a>]</td></tr>
 
 <tr id="kawa"><td>* <a href="/software/kawa/">Kawa</a></td>
-    <td>Java framework and implementation of Scheme, Elisp, and more.
-       [<a href="/software/kawa/">kawa&nbsp;home</a>]</td></tr>
+    <td>Framework Java e implementação de Scheme, Elisp e muito mais.  [<a
+href="/software/kawa/">página&nbsp;do&nbsp;kawa</a>]</td></tr>
 
 <tr id="kopi"><td>* <a href="/software/kopi/">Kopi</a></td>
-    <td>Java development environment for interactive database applications.
-       [<a href="/software/kopi/">kopi&nbsp;home</a>]</td></tr>
+    <td>Ambiente de desenvolvimento Java para aplicativos interativos de banco 
de
+dados.  [<a href="/software/kopi/">página&nbsp;do&nbsp;kopi</a>]</td></tr>
 
 <tr id="liberty-eiffel"><td>* <a href="/software/liberty-eiffel/">Liberty 
Eiffel</a></td>
-    <td>Eiffel compiler.
-       [<a 
href="/software/liberty-eiffel/">liberty-eiffel&nbsp;home</a>]</td></tr>
+    <td>Compilador de Eiffel.  [<a
+href="/software/liberty-eiffel/">página&nbsp;do&nbsp;liberty-eiffel</a>]</td></tr>
 
 <tr id="libsigsegv"><td>* <a href="/software/libsigsegv/">Libsigsegv</a></td>
-    <td>Library for handling page faults.
-       [<a href="/software/libsigsegv/">libsigsegv&nbsp;home</a>]</td></tr>
+    <td>Biblioteca para lidar com falhas de página.  [<a
+href="/software/libsigsegv/">página&nbsp;do&nbsp;libsigsegv</a>]</td></tr>
 
 <tr id="linux-libre"><td>* <a 
href="/software/linux-libre/">Linux-libre</a></td>
-    <td>100% free redistribution of a cleaned Linux kernel.
-       [<a href="/software/linux-libre/">linux-libre&nbsp;home</a>]</td></tr>
+    <td>Redistribuição 100% livre de um kernel Linux limpo.  [<a
+href="/software/linux-libre/">página&nbsp;do&nbsp;linux-libre</a>]</td></tr>
 
-<tr id="lispintro"><td>* <a 
href="/software/emacs/emacs-lisp-intro/emacs-lisp-intro.html">Lispintro</a></td>
-    <td>Introduction to programming in Emacs Lisp.
-       <br/>Available in print:
-       <cite><a 
href="http://shop.fsf.org/product/Intro_to_Emacs_Lisp_3rd_Ed/";>An Introduction 
to Emacs Lisp</a></cite>.
-       [<a href="/software/lispintro/">lispintro&nbsp;home</a>]</td></tr>
+<tr id="lispintro"><td>* <a
+href="/software/emacs/emacs-lisp-intro/emacs-lisp-intro.html">Lispintro</a></td>
+    <td>Introdução à programação no Lisp do Emacs.
+       <br/>Disponível impresso: <cite><a
+href="http://shop.fsf.org/product/Intro_to_Emacs_Lisp_3rd_Ed/";>An
+Introduction to Emacs Lisp</a></cite>.  [<a
+href="/software/lispintro/">página&nbsp;do&nbsp;lispintro</a>]</td></tr>
 
 <tr id="make"><td>* <a href="/software/make/manual/">Make</a></td>
-    <td>Remake files automatically.
-       [<a href="/software/make/">make&nbsp;home</a>]</td></tr>
+    <td>Recria arquivos automaticamente.  [<a
+href="/software/make/">página&nbsp;do&nbsp;make</a>]</td></tr>
 
 <tr id="marst"><td>* <a href="/software/marst/">MARST</a></td>
-    <td>Algol-to-C translator.
-       [<a href="/software/marst/">marst&nbsp;home</a>]</td></tr>
+    <td>Tradução Algol para C.  [<a
+href="/software/marst/">página&nbsp;do&nbsp;marst</a>]</td></tr>
 
 <tr id="mig"><td>* <a href="/software/mig/">Mig</a></td>
-    <td>Mach 3.0 interface generator for the Hurd.
-       [<a href="/software/mig/">mig&nbsp;home</a>]</td></tr>
+    <td>Gerador de interface Mach 3.0 para o Hurd.  [<a
+href="/software/mig/">página&nbsp;do&nbsp;mig</a>]</td></tr>
 
 <tr id="mit-scheme"><td>* <a 
href="/software/mit-scheme/#Documentation">MIT/GNU Scheme</a>
-<small>(<a 
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-imail/";>mit-scheme-imail</a>
-  <a 
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-ref/";>mit-scheme-ref</a>
-  <a 
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/";>sos</a>
-  <a 
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/";>mit-scheme-user</a>)</small>
+<small>(<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-imail/";>mit-scheme-imail</a>
+<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-ref/";>mit-scheme-ref</a>
+<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/";>sos</a>
+<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/";>mit-scheme-user</a>)</small>
 </td>
-    <td>A Scheme implementation with integrated editor and debugger.
-       [<a href="/software/mit-scheme/">mit-scheme&nbsp;home</a>]</td></tr>
+    <td>Uma implementação de Scheme com editor e depurador integrados.  [<a
+href="/software/mit-scheme/">página&nbsp;do&nbsp;mit-scheme</a>]</td></tr>
 
 <tr id="pascal"><td>* <a href="http://www.gnu-pascal.de/gpc/";>Pascal</a></td>
-    <td>GNU Pascal compiler.
-       [<a href="/software/pascal/">pascal&nbsp;home</a>]</td></tr>
+    <td>Compilador GNU Pascal.  [<a
+href="/software/pascal/">página&nbsp;do&nbsp;pascal</a>]</td></tr>
 
 <tr id="patch"><td>* <a 
href="/software/diffutils/manual/#Invoking-patch">Patch</a></td>
-    <td>Apply differences to originals, with optional backups.
-       [<a href="/software/patch/">patch&nbsp;home</a>]</td></tr>
+    <td>Aplica diferenças a originais, com backups opcionais.  [<a
+href="/software/patch/">página&nbsp;do&nbsp;patch</a>]</td></tr>
 
 <tr id="pexec"><td>* <a href="/software/pexec/pexec.1.html">Pexec</a></td>
-    <td>Execute a command in parallel on multiple hosts.
-       [<a href="/software/pexec/">pexec&nbsp;home</a>]</td></tr>
+    <td>Executa um comando em paralelo em vários hosts.  [<a
+href="/software/pexec/">página&nbsp;do&nbsp;pexec</a>]</td></tr>
 
 <tr id="pgccfd"><td>* <a href="/software/pgccfd/">Porting GCC for 
Dunces</a></td>
-    <td>Guide on porting the GNU compiler to new platforms.
-       [<a href="/software/pgccfd/">pgccfd&nbsp;home</a>]</td></tr>
+    <td>Guia sobre como portar o compilador GNU para novas plataformas.  [<a
+href="/software/pgccfd/">página&nbsp;do&nbsp;pgccfd</a>]</td></tr>
 
 <tr id="pies"><td>* <a 
href="http://www.gnu.org.ua/software/pies/manual.html";>Pies</a></td>
-    <td>Program invocation and execution supervisor.
-       [<a href="/software/pies/">pies&nbsp;home</a>]</td></tr>
+    <td>Supervisor de invocação e execução de programas.  [<a
+href="/software/pies/">página&nbsp;do&nbsp;pies</a>]</td></tr>
 
 <tr id="pyconfigure"><td>* <a 
href="/software/pyconfigure/manual/">Pyconfigure</a></td>
-    <td>Configure interface for Python-based packages.
-       [<a href="/software/pyconfigure/">pyconfigure&nbsp;home</a>]</td></tr>
+    <td>Configura interface para pacotes baseados em Python.  [<a
+href="/software/pyconfigure/">página&nbsp;do&nbsp;pyconfigure</a>]</td></tr>
 
 <tr id="pythonwebkit"><td>* <a 
href="/software/pythonwebkit/">Pythonwebkit</a></td>
-    <td>W3C DOM bindings to Webkit for use with GTK and more.
-       [<a href="/software/pythonwebkit/">pythonwebkit&nbsp;home</a>]</td></tr>
+    <td>Vinculações DOM do W3C ao Webkit para uso com o GTK e mais.  [<a
+href="/software/pythonwebkit/">página&nbsp;do&nbsp;pythonwebkit</a>]</td></tr>
 
 <tr id="qexo"><td>* <a href="/software/qexo/#Documentation">Qexo</a></td>
-    <td>Java implementation of XQuery using GNU Kawa.
-       [<a href="/software/qexo/">qexo&nbsp;home</a>]</td></tr>
+    <td>Implementação Java de XQuery usando GNU Kawa.  [<a
+href="/software/qexo/">página&nbsp;do&nbsp;qexo</a>]</td></tr>
 
 <tr id="rush"><td>* <a 
href="http://puszcza.gnu.org.ua/software/rush/manual.html";>Rush</a></td>
-    <td>Restricted user (login) shell.
-       [<a href="/software/rush/">rush&nbsp;home</a>]</td></tr>
+    <td>Shell de usuário restrito (<i lang="en">login</i>).  [<a
+href="/software/rush/">página&nbsp;do&nbsp;rush</a>]</td></tr>
 
 <tr id="sather"><td>* <a href="/software/sather/#doc">Sather</a></td>
-    <td>An object-oriented language designed to be simple, efficient, safe.
-       [<a href="/software/sather/">sather&nbsp;home</a>]</td></tr>
+    <td>Uma linguagem orientada a objetos projetada para ser simples, 
eficiente e
+segura.  [<a 
href="/software/sather/">página&nbsp;do&nbsp;sather</a>]</td></tr>
 
 <tr id="scm"><td>* <a 
href="http://people.csail.mit.edu/jaffer/scm_toc.html";>SCM</a></td>
-    <td>A Scheme implementation.
-       [<a href="/software/scm/">scm&nbsp;home</a>]</td></tr>
+    <td>Uma implementação de Scheme.  [<a
+href="/software/scm/">página&nbsp;do&nbsp;scm</a>]</td></tr>
 
 <tr id="screen"><td>* <a href="/software/screen/manual/">Screen</a></td>
-    <td>Full-screen window manager providing multiple terminals.
-       [<a href="/software/screen/">screen&nbsp;home</a>]</td></tr>
+    <td>Gerenciador de janela de tela cheia fornecendo vários terminais.  [<a
+href="/software/screen/">página&nbsp;do&nbsp;screen</a>]</td></tr>
 
 <tr id="shmm"><td>* <a href="/software/shmm/">Shmm</a></td>
-    <td>Shared memory manager utility.
-       [<a href="/software/shmm/">shmm&nbsp;home</a>]</td></tr>
+    <td>Utilitário gerenciador de memória compartilhada.  [<a
+href="/software/shmm/">página&nbsp;do&nbsp;shmm</a>]</td></tr>
 
 <tr id="shtool"><td>* <a href="/software/shtool/">Shtool</a></td>
-    <td>Compilation of utility shell scripts into a shell tool.
-       [<a href="/software/shtool/">shtool&nbsp;home</a>]</td></tr>
+    <td>Compilação de shell scripts utilitários em uma ferramenta de shell. 
 [<a
+href="/software/shtool/">página&nbsp;do&nbsp;shtool</a>]</td></tr>
 
 <tr id="slib"><td>* <a 
href="http://people.csail.mit.edu/jaffer/slib/index.html";>SLIB</a></td>
-    <td>Portable library for Scheme.
-       [<a href="/software/slib/">slib&nbsp;home</a>]</td></tr>
+    <td>Biblioteca portátil para Scheme.  [<a
+href="/software/slib/">página&nbsp;do&nbsp;slib</a>]</td></tr>
 
-<tr id="smalltalk"><td>* <a 
href="http://smalltalk.gnu.org/documentation";>Smalltalk</a>
-<small>(<a 
href="https://www.gnu.org/software/smalltalk/manual-base/html_node/";>smalltalk-base</a>
-  <a 
href="https://www.gnu.org/software/smalltalk/manual-libs/html_node/";>smalltalk-libs</a>
-  <a 
href="https://www.gnu.org/software/smalltalk/manual/html_node/";>smalltalk<!-- 
again --></a>)</small>
+<tr id="smalltalk"><td><!-- again -->
+* <a href="http://smalltalk.gnu.org/documentation";>Smalltalk</a> <small>(<a
+href="https://www.gnu.org/software/smalltalk/manual-base/html_node/";>smalltalk-base</a>
+<a
+href="https://www.gnu.org/software/smalltalk/manual-libs/html_node/";>smalltalk-libs</a>
+<a
+href="https://www.gnu.org/software/smalltalk/manual/html_node/";>smalltalk</a>)</small>
 </td>
-    <td>Smalltalk environment.
-       [<a href="/software/smalltalk/">smalltalk&nbsp;home</a>]</td></tr>
+    <td>Ambiente para Smalltalk.  [<a
+href="/software/smalltalk/">página&nbsp;do&nbsp;smalltalk</a>]</td></tr>
 
 <tr id="superopt"><td>* <a href="/software/superopt/">Superopt</a></td>
-    <td>Super-optimizer of given functions.
-       [<a href="/software/superopt/">superopt&nbsp;home</a>]</td></tr>
+    <td>Superotimizador de funções dadas.  [<a
+href="/software/superopt/">página&nbsp;do&nbsp;superopt</a>]</td></tr>
 
 <tr id="swbis"><td>* <a 
href="https://www.gnu.org/software/swbis/manual.html";>Swbis</a></td>
-    <td>POSIX software packaging utilities.
-       [<a href="/software/swbis/">swbis&nbsp;home</a>]</td></tr>
+    <td>Utilitários de empacotamento de software POSIX.  [<a
+href="/software/swbis/">página&nbsp;do&nbsp;swbis</a>]</td></tr>
 
 <tr id="teseq"><td>* <a href="/software/teseq/manual/">Teseq</a></td>
-    <td>Analyze files with terminal control sequences, for debugging.
-       [<a href="/software/teseq/">teseq&nbsp;home</a>]</td></tr>
+    <td>Analisa arquivos com sequências de controle de terminal, para 
depuração.
+[<a href="/software/teseq/">página&nbsp;do&nbsp;teseq</a>]</td></tr>
 
 <tr id="thales"><td>* <a 
href="https://www.gnu.org/software/thales/manual/";>Thales</a></td>
-    <td>Unit test framework for Guile.
-       [<a href="/software/thales/">thales&nbsp;home</a>]</td></tr>
+    <td>Framework de teste de unidade para Guile.  [<a
+href="/software/thales/">página&nbsp;do&nbsp;thales</a>]</td></tr>
 
 <tr id="vmgen"><td>* <a href="/software/vmgen/">Vmgen</a></td>
-    <td>Generic virtual machine generation, used by gforth.
-       [<a href="/software/vmgen/">vmgen&nbsp;home</a>]</td></tr>
+    <td>Geração de máquina virtual genérica, usado pelo gforth.  [<a
+href="/software/vmgen/">página&nbsp;do&nbsp;vmgen</a>]</td></tr>
 
 <tr id="womb"><td>* <a href="/software/womb/">Womb</a></td>
-    <td>Repository for GNU work not intended to be separate packages.
-       [<a href="/software/womb/">womb&nbsp;home</a>]</td></tr>
+    <td>Repositório para o trabalho do GNU não destinado a pacotes 
separados.  [<a
+href="/software/womb/">página&nbsp;do&nbsp;womb</a>]</td></tr>
 
 <tr id="xnee"><td>* <a 
href="http://xnee.wordpress.com/documentation/";>Xnee</a></td>
-    <td>Record, replay and distribute user actions under X11.
-       [<a href="/software/xnee/">xnee&nbsp;home</a>]</td></tr>
+    <td>Grava, reproduz e distribui ações de usuários sob o X11.  [<a
+href="/software/xnee/">página&nbsp;do&nbsp;xnee</a>]</td></tr>
 
 
 <tr>
-<td id="Libraries" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/libs/";><big><b>Software 
libraries</b></big></a></td></tr>
+<td id="Libraries" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/libs/";><big><b>Bibliotecas de
+software</b></big></a></td></tr>
 
 <tr id="pkg_8sync"><td>* <a href="/software/8sync/manual/">8sync</a></td>
-    <td>An asynchronous programming library for Guile.
-       [<a href="/software/8sync/">8sync&nbsp;home</a>]</td></tr>
+    <td>Uma biblioteca de programação assíncrona para Guile.  [<a
+href="/software/8sync/">página&nbsp;do&nbsp;8sync</a>]</td></tr>
 
 <tr id="adns"><td>* <a href="/software/adns/">Adns</a></td>
-    <td>Asynchronous DNS client library and utilities.
-       [<a href="/software/adns/">adns&nbsp;home</a>]</td></tr>
+    <td>Biblioteca e utilitários de cliente DNS assíncrono.  [<a
+href="/software/adns/">página&nbsp;do&nbsp;adns</a>]</td></tr>
 
 <tr id="avl"><td>* <a href="http://adtinfo.org/libavl.html/";>Avl</a></td>
-    <td>Binary and balanced search trees.
-       [<a href="/software/avl/">avl&nbsp;home</a>]</td></tr>
+    <td>Árvores de pesquisa binária e balanceada.  [<a
+href="/software/avl/">página&nbsp;do&nbsp;avl</a>]</td></tr>
 
 <tr id="bfd"><td>* <a 
href="https://sourceware.org/binutils/docs/bfd/";>BFD</a></td>
-    <td>Binary File Descriptor library.
-       [<a href="/software/bfd/">bfd&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de Binary File Descriptor.  [<a
+href="/software/bfd/">página&nbsp;do&nbsp;bfd</a>]</td></tr>
 
 <tr id="cgicc"><td>* <a href="/software/cgicc/">Cgicc</a></td>
-    <td>C++ class library for writing CGI applications.
-       [<a href="/software/cgicc/">cgicc&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de classes C++ para escrita de aplicativos de CGI.  [<a
+href="/software/cgicc/">página&nbsp;do&nbsp;cgicc</a>]</td></tr>
 
 <tr id="classpath"><td>* <a href="/software/classpath/docs/">Classpath</a></td>
-    <td>Core class libraries for Java.
-       [<a href="/software/classpath/">classpath&nbsp;home</a>]</td></tr>
+    <td>Bibliotecas de classes centrais para Java.  [<a
+href="/software/classpath/">página&nbsp;do&nbsp;classpath</a>]</td></tr>
 
 <tr id="classpathx"><td>* <a href="/software/classpathx/">Classpathx</a></td>
-    <td>Classpath extensions: javax.* libraries.
-       [<a href="/software/classpathx/">classpathx&nbsp;home</a>]</td></tr>
+    <td>Extensões de classpath: bibliotecas javax.*.  [<a
+href="/software/classpathx/">página&nbsp;do&nbsp;classpathx</a>]</td></tr>
 
-<tr id="commoncpp"><td>* <a 
href="/software/commoncpp/commoncpp.html#documentation">[u]Common C++</a></td>
-    <td>[u]Common C++ framework for threaded applications.
-       [<a href="/software/commoncpp/">commoncpp&nbsp;home</a>]</td></tr>
+<tr id="commoncpp"><td>* <a 
href="/software/commoncpp/commoncpp.html#documentation">[u]Common
+C++</a></td>
+    <td>Framework de [u]Common C++ para aplicativos <i lang="en">threaded</i>. 
 [<a
+href="/software/commoncpp/">página&nbsp;do&nbsp;commoncpp</a>]</td></tr>
 
 <tr id="freeipmi"><td>* <a 
href="/software/freeipmi/documentation.html">FreeIPMI</a></td>
-    <td>Platform management, including sensor and power monitoring.
-       [<a href="/software/freeipmi/">freeipmi&nbsp;home</a>]</td></tr>
+    <td>Gerenciamento de plataforma, incluindo monitoramento de sensor e 
energia.
+[<a href="/software/freeipmi/">página&nbsp;do&nbsp;freeipmi</a>]</td></tr>
 
 <tr id="gleem"><td>* <a href="/software/gleem/doc/">Gleem</a></td>
-    <td>OpenGL Extremely Easy-to-use Manipulators.
-       [<a href="/software/gleem/">gleem&nbsp;home</a>]</td></tr>
+    <td>Manipuladores de OpenGL extremamente fáceis de usar.  [<a
+href="/software/gleem/">página&nbsp;do&nbsp;gleem</a>]</td></tr>
 
 <tr id="glib"><td>* <a 
href="http://library.gnome.org/devel/glib/unstable/";>GLib</a></td>
-    <td>Thread-safe general utility library; basis of GTK+ and GNOME.
-       [<a href="/software/glib/">glib&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de utilitário geral de <i lang="en">thread</i> segura; 
base do
+GTK+ e GNOME.  [<a 
href="/software/glib/">página&nbsp;do&nbsp;glib</a>]</td></tr>
 
 <tr id="glpk"><td>* <a href="/software/glpk/">GLPK</a></td>
-    <td>GNU Linear Programming Kit, supporting the MathProg language.
-       [<a href="/software/glpk/">glpk&nbsp;home</a>]</td></tr>
+    <td>GNU Linear Programming Kit, com suporte à linguagem MathProg.  [<a
+href="/software/glpk/">página&nbsp;do&nbsp;glpk</a>]</td></tr>
 
 <tr id="gnutls"><td>* <a href="/software/gnutls/manual/">GnuTLS</a></td>
-    <td>Transport layer security library.
-       [<a href="/software/gnutls/">gnutls&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de segurança para a camada de transporte.  [<a
+href="/software/gnutls/">página&nbsp;do&nbsp;gnutls</a>]</td></tr>
 
 <tr id="gsasl"><td>* <a href="/software/gsasl/manual/">Gsasl</a></td>
-    <td>Simple Authentication and Security Layer library.
-       [<a href="/software/gsasl/">gsasl&nbsp;home</a>]</td></tr>
+    <td>Biblioteca Simple Authentication and Security Layer.  [<a
+href="/software/gsasl/">página&nbsp;do&nbsp;gsasl</a>]</td></tr>
 
 <tr id="gslip"><td>* <a href="/software/gslip/">GNU Slip</a></td>
-    <td>SLIP (Symmetric LIst Processor) implementation.
-       [<a href="/software/gslip/">gslip&nbsp;home</a>]</td></tr>
+    <td>Implementação de SLIP (Symmetric LIst Processor).  [<a
+href="/software/gslip/">página&nbsp;do&nbsp;gslip</a>]</td></tr>
 
 <tr id="gss"><td>* <a href="/software/gss/manual/">Generic Security 
Service</a></td>
-    <td>Generic Security Service library.
-       [<a href="/software/gss/">gss&nbsp;home</a>]</td></tr>
+    <td>Biblioteca Generic Security Service.  [<a
+href="/software/gss/">página&nbsp;do&nbsp;gss</a>]</td></tr>
 
 <tr id="guile-cv"><td>* <a href="/software/guile-cv/">Guile-cv</a></td>
-    <td>Computer Vision library for Guile.
-       [<a href="/software/guile-cv/">guile-cv&nbsp;home</a>]</td></tr>
+    <td>Biblioteca Computer Vision para Guile.  [<a
+href="/software/guile-cv/">página&nbsp;do&nbsp;guile-cv</a>]</td></tr>
 
 <tr id="gwl"><td>* <a href="/software/gwl/">GWL</a></td>
-    <td>Workflow language for GNU Guix.
-       [<a href="/software/gwl/">gwl&nbsp;home</a>]</td></tr>
+    <td>Linguagem de fluxo de trabalho para GNU Guix.  [<a
+href="/software/gwl/">página&nbsp;do&nbsp;gwl</a>]</td></tr>
 
-<tr id="java-getopt"><td>* <a 
href="http://www.urbanophile.com/arenn/hacking/getopt/Package-gnu.getopt.html";>Java-getopt</a></td>
-    <td>Java port of GNU getopt.
-       [<a href="/software/java-getopt/">java-getopt&nbsp;home</a>]</td></tr>
+<tr id="java-getopt"><td>* <a
+href="http://www.urbanophile.com/arenn/hacking/getopt/Package-gnu.getopt.html";>Java-getopt</a></td>
+    <td><i lang="en">Port</i> Java do GNU getopt.  [<a
+href="/software/java-getopt/">página&nbsp;do&nbsp;java-getopt</a>]</td></tr>
 
 <tr id="jel"><td>* <a href="/software/jel/manual.html">Jel</a></td>
-    <td>Java expression library and compiler.
-       [<a href="/software/jel/">jel&nbsp;home</a>]</td></tr>
+    <td>Biblioteca e compilador de expressões java.  [<a
+href="/software/jel/">página&nbsp;do&nbsp;jel</a>]</td></tr>
 
 <tr id="libc"><td>* <a href="/software/libc/manual/">GNU C Library</a></td>
-    <td>C library.
-       [<a href="/software/libc/">libc&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C do GNU. [<a
+href="/software/libc/">página&nbsp;do&nbsp;libc</a>]</td></tr>
 
 <tr id="libffcall"><td>* <a href="/software/libffcall/">Libffcall</a></td>
-    <td>Foreign function calls from interpreters.
-       [<a href="/software/libffcall/">libffcall&nbsp;home</a>]</td></tr>
+    <td>Chamadas de funções estrangeiras de interpretadores.  [<a
+href="/software/libffcall/">página&nbsp;do&nbsp;libffcall</a>]</td></tr>
 
-<tr id="libgcrypt"><td>* <a 
href="https://www.gnupg.org/documentation/manuals/gcrypt/";>Libgcrypt</a></td>
-    <td>Cryptographic function library.
-       [<a href="/software/libgcrypt/">libgcrypt&nbsp;home</a>]</td></tr>
+<tr id="libgcrypt"><td>* <a
+href="https://www.gnupg.org/documentation/manuals/gcrypt/";>Libgcrypt</a></td>
+    <td>Biblioteca de função criptográfica.  [<a
+href="/software/libgcrypt/">página&nbsp;do&nbsp;libgcrypt</a>]</td></tr>
 
 <tr id="libiconv"><td>* <a href="/software/libiconv/">Libiconv</a></td>
-    <td>Character set conversion library.
-       [<a href="/software/libiconv/">libiconv&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de conversão de conjunto de caracteres.  [<a
+href="/software/libiconv/">página&nbsp;do&nbsp;libiconv</a>]</td></tr>
 
 <tr id="libidn"><td>* <a href="/software/libidn/manual/">Libidn</a></td>
-    <td>Internationalized string processing library.
-       [<a href="/software/libidn/">libidn&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de processamento de textos internacionalizados.  [<a
+href="/software/libidn/">página&nbsp;do&nbsp;libidn</a>]</td></tr>
 
 <tr id="libjit"><td>* <a href="/software/libjit/">Libjit</a></td>
-    <td>Just-in-Time compilation library.
-       [<a href="/software/libjit/">libjit&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de compilação Just-in-Time.  [<a
+href="/software/libjit/">página&nbsp;do&nbsp;libjit</a>]</td></tr>
 
 <tr id="libmicrohttpd"><td>* <a 
href="/software/libmicrohttpd/manual/">Libmicrohttpd</a></td>
-    <td>C library implementing an HTTP 1.1 server.
-       [<a 
href="/software/libmicrohttpd/">libmicrohttpd&nbsp;home</a>]</td></tr>
+    <td>Implementação da biblioteca C em um servidor HTTP 1.1.  [<a
+href="/software/libmicrohttpd/">página&nbsp;do&nbsp;libmicrohttpd</a>]</td></tr>
 
 <tr id="libtool"><td>* <a href="/software/libtool/manual/">Libtool</a></td>
-    <td>Generic shared library support tools.
-       [<a href="/software/libtool/">libtool&nbsp;home</a>]</td></tr>
+    <td>Ferramentas genéricas de suporte a bibliotecas compartilhadas.  [<a
+href="/software/libtool/">página&nbsp;do&nbsp;libtool</a>]</td></tr>
 
 <tr id="libunistring"><td>* <a 
href="/software/libunistring/manual/">Libunistring</a></td>
-    <td>C library for manipulating Unicode strings.
-       [<a href="/software/libunistring/">libunistring&nbsp;home</a>]</td></tr>
+    <td>Biblioteca C para manipular textos em Unicode.  [<a
+href="/software/libunistring/">página&nbsp;do&nbsp;libunistring</a>]</td></tr>
 
 <tr id="lightning"><td>* <a 
href="/software/lightning/manual/">Lightning</a></td>
-    <td>Library for generating assembly code at runtime.
-       [<a href="/software/lightning/">lightning&nbsp;home</a>]</td></tr>
+    <td>Biblioteca para gerar código assembly em tempo de execução.  [<a
+href="/software/lightning/">página&nbsp;do&nbsp;lightning</a>]</td></tr>
 
 <tr id="mempool"><td>* <a href="/software/mempool/">MemPool</a></td>
-    <td>Block allocator library.
-       [<a href="/software/mempool/">mempool&nbsp;home</a>]</td></tr>
+    <td>Biblioteca alocadora de bloco.  [<a
+href="/software/mempool/">página&nbsp;do&nbsp;mempool</a>]</td></tr>
 
 <tr id="mifluz"><td>* <a href="/software/mifluz/doc.en.html">Mifluz</a></td>
-    <td>Full text indexing library.
-       [<a href="/software/mifluz/">mifluz&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de indexação de texto completo.  [<a
+href="/software/mifluz/">página&nbsp;do&nbsp;mifluz</a>]</td></tr>
 
 <tr id="nana"><td>* <a href="/software/nana/">Nana</a></td>
-    <td>Library for assertions, logging, performance measurement.
-       [<a href="/software/nana/">nana&nbsp;home</a>]</td></tr>
+    <td>Biblioteca para asserções, registros, medida de desempenho.  [<a
+href="/software/nana/">página&nbsp;do&nbsp;nana</a>]</td></tr>
 
 <tr id="osip"><td>* <a href="/software/osip/doc/html/">oSIP</a></td>
-    <td>Library implementing SIP (RFC-3261).
-       [<a href="/software/osip/">osip&nbsp;home</a>]</td></tr>
+    <td>Biblioteca que implementa SIP (RFC-3261).  [<a
+href="/software/osip/">página&nbsp;do&nbsp;osip</a>]</td></tr>
 
 <tr id="pth"><td>* <a href="/software/pth/pth-manual.html">Pth</a></td>
-    <td>Portable thread library.
-       [<a href="/software/pth/">pth&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de <i lang="en">thread</i> portátil.  [<a
+href="/software/pth/">página&nbsp;do&nbsp;pth</a>]</td></tr>
 
 <tr id="quickthreads"><td>* <a 
href="/software/quickthreads/">Quickthreads</a></td>
-    <td>Thread library.
-       [<a href="/software/quickthreads/">quickthreads&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de <i lang="en">thread</i>.  [<a
+href="/software/quickthreads/">página&nbsp;do&nbsp;quickthreads</a>]</td></tr>
 
 <tr id="wb"><td>* <a 
href="http://people.csail.mit.edu/jaffer/wb_toc.html";>WB</a></td>
-    <td>Disk-based associative array B-tree database library.
-       [<a href="/software/wb/">wb&nbsp;home</a>]</td></tr>
+    <td>Biblioteca de banco de dados de árvore B de matriz associativa 
baseada em
+disco.  [<a href="/software/wb/">página&nbsp;do&nbsp;wb</a>]</td></tr>
 
 
 <tr>
-<td id="Spreadsheets" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a 
href="http://directory.fsf.org/category/ssheet/";><big><b>Spreadsheets</b></big></a></td></tr>
+<td id="Spreadsheets" colspan="2" style="padding-top:.8em; 
padding-left:16%;"><a
+href="http://directory.fsf.org/category/ssheet/";><big><b>Planilhas</b></big></a></td></tr>
 
-<tr id="gnumeric"><td>* <a 
href="http://www.gnome.org/projects/gnumeric/doc/gnumeric.shtml";>GNUmeric</a></td>
-    <td>Spreadsheet application.
-       [<a href="/software/gnumeric/">gnumeric&nbsp;home</a>]</td></tr>
+<tr id="gnumeric"><td>* <a
+href="http://www.gnome.org/projects/gnumeric/doc/gnumeric.shtml";>GNUmeric</a></td>
+    <td>Aplicativo de planilha.  [<a
+href="/software/gnumeric/">página&nbsp;do&nbsp;gnumeric</a>]</td></tr>
 
 <tr id="oleo"><td>* <a href="/software/oleo/doc/oleo.html">Oleo</a></td>
-    <td>Spreadsheet for both terminal and graphical interfaces.
-       [<a href="/software/oleo/">oleo&nbsp;home</a>]</td></tr>
+    <td>Planilha para interfaces gráficas e terminais.  [<a
+href="/software/oleo/">página&nbsp;do&nbsp;oleo</a>]</td></tr>
 
 <tr id="ssw"><td>* <a href="/software/ssw/">Spread Sheet Widget</a></td>
-    <td>Gtk+ widget for viewing and manipulating tabular data.
-       [<a href="/software/ssw/">ssw&nbsp;home</a>]</td></tr>
+    <td>Widget Gtk+ para visualizar e manipular dados tabulares.  [<a
+href="/software/ssw/">página&nbsp;do&nbsp;ssw</a>]</td></tr>
 
 
 <tr>
-<td id="Sysadmin" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/admin/";><big><b>System 
administration</b></big></a></td></tr>
+<td id="Sysadmin" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/admin/";><big><b>Administração de
+sistema</b></big></a></td></tr>
 
 <tr id="acct"><td>* <a 
href="/software/acct/manual/accounting.html">Acct</a></td>
-    <td>Standard login and process accounting utilities.
-       [<a href="/software/acct/">acct&nbsp;home</a>]</td></tr>
+    <td>Utilitários padrão de login e contas de processo.  [<a
+href="/software/acct/">página&nbsp;do&nbsp;acct</a>]</td></tr>
 
-<tr id="ddrescue"><td>* <a 
href="https://www.gnu.org/software/ddrescue/manual/ddrescue_manual.html";>ddrescue</a></td>
-    <td>Data recovery utility.
-       [<a href="/software/ddrescue/">ddrescue&nbsp;home</a>]</td></tr>
+<tr id="ddrescue"><td>* <a
+href="https://www.gnu.org/software/ddrescue/manual/ddrescue_manual.html";>ddrescue</a></td>
+    <td>Utilitário de recuperação de dados.  [<a
+href="/software/ddrescue/">página&nbsp;do&nbsp;ddrescue</a>]</td></tr>
 
 <tr id="direvent"><td>* <a href="/software/direvent/">Direvent</a></td>
-    <td>Daemon to monitor directories for events such as file removal.
-       [<a href="/software/direvent/">direvent&nbsp;home</a>]</td></tr>
+    <td>Daemon para monitorar diretórios de eventos, como remoção de 
arquivos.  [<a
+href="/software/direvent/">página&nbsp;do&nbsp;direvent</a>]</td></tr>
 
 <tr id="fdisk"><td>* <a href="/software/fdisk/">Fdisk</a></td>
-    <td>Low-level disk partitioning and formatting.
-       [<a href="/software/fdisk/">fdisk&nbsp;home</a>]</td></tr>
+    <td>Particionamento e formatação de disco de baixo nível.  [<a
+href="/software/fdisk/">página&nbsp;do&nbsp;fdisk</a>]</td></tr>
 
 <tr id="gnubatch"><td>* <a href="/software/gnubatch/">GNUbatch</a></td>
-    <td>Advanced batch scheduling and job control.
-       [<a href="/software/gnubatch/">gnubatch&nbsp;home</a>]</td></tr>
+    <td>Agendamento em lote avançado e controle de tarefas.  [<a
+href="/software/gnubatch/">página&nbsp;do&nbsp;gnubatch</a>]</td></tr>
 
 <tr id="grub"><td>* <a 
href="/software/grub/grub-documentation.html">GRUB</a></td>
-    <td>GRand Unified Boot loader.
-       [<a href="/software/grub/">grub&nbsp;home</a>]</td></tr>
+    <td>Carregador GRand Unified Boot.  [<a
+href="/software/grub/">página&nbsp;do&nbsp;grub</a>]</td></tr>
 
 <tr id="gsrc"><td>* <a href="/software/gsrc/manual/">GNU Source Release 
Collection</a></td>
-    <td>Install latest official GNU releases from original source.
-       [<a href="/software/gsrc/">gsrc&nbsp;home</a>]</td></tr>
+    <td>Instala os últimos lançamentos oficiais do GNU a partir do 
código-fonte
+original.  [<a href="/software/gsrc/">página&nbsp;do&nbsp;gsrc</a>]</td></tr>
 
 <tr id="guix"><td>* <a href="/software/guix/manual/">Guix</a></td>
-    <td>Functional package manager for installed software packages and 
versions.
-       [<a href="/software/guix/">guix&nbsp;home</a>]</td></tr>
+    <td>Gerenciador de pacotes funcional para pacotes e versões de software
+instalados.  [<a 
href="/software/guix/">página&nbsp;do&nbsp;guix</a>]</td></tr>
 
 <tr id="mcron"><td>* <a href="/software/mcron/">Mcron</a></td>
-    <td>Run jobs at scheduled times.
-       [<a href="/software/mcron/">mcron&nbsp;home</a>]</td></tr>
+    <td>Executa tarefas em horários agendados.  [<a
+href="/software/mcron/">página&nbsp;do&nbsp;mcron</a>]</td></tr>
 
 <tr id="mes"><td>* <a href="/software/mes/manual/">Mes</a></td>
-    <td>Full source bootstrapping for GNU systems.
-       [<a href="/software/mes/">mes&nbsp;home</a>]</td></tr>
+    <td><i lang="en">Bootstrap</i> de fonte completa para sistemas GNU.  [<a
+href="/software/mes/">página&nbsp;do&nbsp;mes</a>]</td></tr>
 
 <tr id="mtools"><td>* <a href="/software/mtools/mailing.html">Mtools</a></td>
-    <td>Access MS-DOS disks without mounting.
-       [<a href="/software/mtools/">mtools&nbsp;home</a>]</td></tr>
+    <td>Acessa discos MS-DOS sem montá-los.  [<a
+href="/software/mtools/">página&nbsp;do&nbsp;mtools</a>]</td></tr>
 
 <tr id="parallel"><td>* <a href="/software/parallel/man.html">Parallel</a></td>
-    <td>Build and execute command lines in parallel.
-       [<a href="/software/parallel/">parallel&nbsp;home</a>]</td></tr>
+    <td>Compila e executa linhas de comandos em paralelo.  [<a
+href="/software/parallel/">página&nbsp;do&nbsp;parallel</a>]</td></tr>
 
 <tr id="parted"><td>* <a href="/software/parted/manual/">Parted</a></td>
-    <td>Disk partition editor.
-       [<a href="/software/parted/">parted&nbsp;home</a>]</td></tr>
+    <td>Editor de partição de disco.  [<a
+href="/software/parted/">página&nbsp;do&nbsp;parted</a>]</td></tr>
 
 <tr id="rottlog"><td>* <a href="/software/rottlog/manual/">Rottlog</a></td>
-    <td>Log rotation and management.
-       [<a href="/software/rottlog/">rottlog&nbsp;home</a>]</td></tr>
+    <td>Rotação e gerenciamento de logs.  [<a
+href="/software/rottlog/">página&nbsp;do&nbsp;rottlog</a>]</td></tr>
 
 <tr id="serveez"><td>* <a href="/software/serveez/manual/">Serveez</a></td>
-    <td>Framework for implementing IP-based servers.
-       [<a href="/software/serveez/">serveez&nbsp;home</a>]</td></tr>
+    <td>Framework para implementar servidores baseados em IP.  [<a
+href="/software/serveez/">página&nbsp;do&nbsp;serveez</a>]</td></tr>
 
 <tr id="shepherd"><td>* <a href="/software/shepherd/">Shepherd</a></td>
-    <td>System service manager.
-       [<a href="/software/shepherd/">shepherd&nbsp;home</a>]</td></tr>
+    <td>Gerenciador de serviço de sistema.  [<a
+href="/software/shepherd/">página&nbsp;do&nbsp;shepherd</a>]</td></tr>
 
 <tr id="stow"><td>* <a href="/software/stow/manual/">Stow</a></td>
-    <td>Managing installed software packages.
-       [<a href="/software/stow/">stow&nbsp;home</a>]</td></tr>
+    <td>Gerenciamento de pacotes de softwares instalados.  [<a
+href="/software/stow/">página&nbsp;do&nbsp;stow</a>]</td></tr>
 
 <tr id="sysutils"><td>* <a href="/software/sysutils/">Sysutils</a></td>
-    <td>Standard system administration utilities: passwd, chsh, and more.
-       [<a href="/software/sysutils/">sysutils&nbsp;home</a>]</td></tr>
+    <td>Utilitários padrão de administração de sistema: passwd, chsh e 
mais.  [<a
+href="/software/sysutils/">página&nbsp;do&nbsp;sysutils</a>]</td></tr>
 
 <tr id="time"><td>* <a href="/software/time/">Time</a></td>
-    <td>Run a command, then display its resource usage.
-       [<a href="/software/time/">time&nbsp;home</a>]</td></tr>
+    <td>Executa um comando, então exibe seu uso de recursos.  [<a
+href="/software/time/">página&nbsp;do&nbsp;time</a>]</td></tr>
 
 <tr id="uucp"><td>* <a href="/software/uucp/">UUCP</a></td>
-    <td>UUCP protocol implementation.
-       [<a href="/software/uucp/">uucp&nbsp;home</a>]</td></tr>
+    <td>Implementação do protocolo UUCP.  [<a
+href="/software/uucp/">página&nbsp;do&nbsp;uucp</a>]</td></tr>
 
 <tr id="which"><td>* <a href="/software/which/">Which</a></td>
-    <td>Find full path of shell commands.
-       [<a href="/software/which/">which&nbsp;home</a>]</td></tr>
+    <td>Localiza o caminho completo de comandos de shell.  [<a
+href="/software/which/">página&nbsp;do&nbsp;which</a>]</td></tr>
 
 <tr id="xlogmaster"><td>* <a 
href="/software/xlogmaster/tutorial_toc.html">Xlogmaster</a></td>
-    <td>GUI program for monitoring log and other files.
-       [<a href="/software/xlogmaster/">xlogmaster&nbsp;home</a>]</td></tr>
+    <td>Programa GUI para monitorar log e outros arquivos.  [<a
+href="/software/xlogmaster/">página&nbsp;do&nbsp;xlogmaster</a>]</td></tr>
 
 
 <tr>
-<td id="Telephony" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/tel/";><big><b>Telephony</b></big></a></td></tr>
+<td id="Telephony" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/tel/";><big><b>Telefonia</b></big></a></td></tr>
 
 <tr id="bayonne"><td>* <a 
href="/software/bayonne/bayonne.html#documentation">Bayonne</a></td>
-    <td>Telephony server.
-       [<a href="/software/bayonne/">bayonne&nbsp;home</a>]</td></tr>
+    <td>Servidor de telefonia.  [<a
+href="/software/bayonne/">página&nbsp;do&nbsp;bayonne</a>]</td></tr>
 
 <tr id="ccaudio"><td>* <a 
href="/software/ccaudio/ccaudio.html#documentation">ccAudio</a></td>
-    <td>Standalone C++ class framework for manipulating audio data.
-       [<a href="/software/ccaudio/">ccaudio&nbsp;home</a>]</td></tr>
+    <td>Framework de classe C++ autônomo para manipular dados de áudio.  [<a
+href="/software/ccaudio/">página&nbsp;do&nbsp;ccaudio</a>]</td></tr>
 
 <tr id="ccrtp"><td>* <a 
href="/software/ccrtp/ccrtp.html#documentation">ccRTP</a></td>
-    <td>Implementation of RTP (real-time transport protocol).
-       [<a href="/software/ccrtp/">ccrtp&nbsp;home</a>]</td></tr>
+    <td>Implementação de RTP (protocolo de transporte em tempo real).  [<a
+href="/software/ccrtp/">página&nbsp;do&nbsp;ccrtp</a>]</td></tr>
 
 <tr id="ccscript"><td>* <a 
href="/software/ccscript/ccscript.html#documentation">ccScript</a></td>
-    <td>C++ class framework for virtual machine execution.
-       [<a href="/software/ccscript/">ccscript&nbsp;home</a>]</td></tr>
+    <td>Framework de classe C++ para execução de máquina virtual.  [<a
+href="/software/ccscript/">página&nbsp;do&nbsp;ccscript</a>]</td></tr>
 
 <tr id="gnucomm"><td>* <a 
href="/software/gnucomm/overview.html">GnuComm</a></td>
-    <td>GNU telecommunications project / GNU Telephony.
-       [<a href="/software/gnucomm/">gnucomm&nbsp;home</a>]</td></tr>
+    <td>Projeto de telecomunicações do GNU / GNU Telephony.  [<a
+href="/software/gnucomm/">página&nbsp;do&nbsp;gnucomm</a>]</td></tr>
 
 <tr id="halifax"><td>* <a href="/software/halifax/">HaliFAX</a></td>
-    <td>Fax support.
-       [<a href="/software/halifax/">halifax&nbsp;home</a>]</td></tr>
+    <td>Suporte a fax.  [<a
+href="/software/halifax/">página&nbsp;do&nbsp;halifax</a>]</td></tr>
 
 <tr id="sipwitch"><td>* <a 
href="/software/sipwitch/sipwitch.html#documentation">Sipwitch</a></td>
-    <td>Secure peer-to-peer VoIP server for the SIP protocol.
-       [<a href="/software/sipwitch/">sipwitch&nbsp;home</a>]</td></tr>
+    <td>Servidor VOIP ponto a ponto seguro para o protocolo SIP.  [<a
+href="/software/sipwitch/">página&nbsp;do&nbsp;sipwitch</a>]</td></tr>
 
 
 <tr>
-<td id="Text" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/text/";><big><b>Text creation and 
manipulation</b></big></a></td></tr>
+<td id="Text" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/text/";><big><b>Criação e
+manipulação de texto</b></big></a></td></tr>
 
 <tr id="aspell"><td>* <a 
href="http://aspell.net/man-html/index.html";>Aspell</a></td>
-    <td>Spell checker.
-       [<a href="/software/aspell/">aspell&nbsp;home</a>]</td></tr>
+    <td>Verificador ortográfico.  [<a
+href="/software/aspell/">página&nbsp;do&nbsp;aspell</a>]</td></tr>
 
 <tr id="auctex"><td>* <a href="/software/auctex/manual/">AUCTeX</a></td>
-    <td>Emacs environment for editing (all flavors of) TeX files.
-       [<a href="/software/auctex/">auctex&nbsp;home</a>]</td></tr>
+    <td>Ambiente Emacs para edição de (todos os sabores de) arquivos TeX.  
[<a
+href="/software/auctex/">página&nbsp;do&nbsp;auctex</a>]</td></tr>
 
 <tr id="bool"><td>* <a href="/software/bool/">Bool</a></td>
-    <td>Finding text and HTML files that match boolean expressions.
-       [<a href="/software/bool/">bool&nbsp;home</a>]</td></tr>
+    <td>Localiza texto e arquivos HTML que correspondem a expressões 
booleanas.  [<a
+href="/software/bool/">página&nbsp;do&nbsp;bool</a>]</td></tr>
 
 <tr id="combine"><td>* <a href="/software/combine/manual/">Combine</a></td>
-    <td>Extensible file matching and filtering.
-       [<a href="/software/combine/">combine&nbsp;home</a>]</td></tr>
+    <td>Combinação e filtragem de arquivos extensíveis.  [<a
+href="/software/combine/">página&nbsp;do&nbsp;combine</a>]</td></tr>
 
 <tr id="diction"><td>* <a href="/software/diction/">Diction</a></td>
-    <td>Identifies wordy and commonly misused phrases.
-       [<a href="/software/diction/">diction&nbsp;home</a>]</td></tr>
+    <td>Identifica frases com palavras comumente mal utilizadas.  [<a
+href="/software/diction/">página&nbsp;do&nbsp;diction</a>]</td></tr>
 
-<tr id="diffutils"><td>* <a 
href="https://www.gnu.org/software/diffutils/manual/html_node/";>Diffutils</a></td>
-    <td>Comparing and merging files.
-       [<a href="/software/diffutils/">diffutils&nbsp;home</a>]</td></tr>
+<tr id="diffutils"><td>* <a
+href="https://www.gnu.org/software/diffutils/manual/html_node/";>Diffutils</a></td>
+    <td>Comparação e mesclagem de arquivos.  [<a
+href="/software/diffutils/">página&nbsp;do&nbsp;diffutils</a>]</td></tr>
 
 <tr id="ed"><td>* <a 
href="https://www.gnu.org/software/ed/manual/ed_manual.html";>Ed</a></td>
-    <td>Line-oriented text editor.
-       [<a href="/software/ed/">ed&nbsp;home</a>]</td></tr>
+    <td>Editor de texto orientado a linha.  [<a
+href="/software/ed/">página&nbsp;do&nbsp;ed</a>]</td></tr>
 
-<tr id="gawk"><td>* <a href="/software/gawk/manual/">Gawk</a>
-<small>(<a 
href="https://www.gnu.org/software/gawk/manual/gawkinet/html_node/";>gawkinet</a>
-  <a href="https://www.gnu.org/software/gawk/manual/html_node/";>gawk<!-- again 
--></a>)</small>
+<tr id="gawk"><td><!-- again -->
+* <a href="/software/gawk/manual/">Gawk</a> <small>(<a
+href="https://www.gnu.org/software/gawk/manual/gawkinet/html_node/";>gawkinet</a>
+<a
+href="https://www.gnu.org/software/gawk/manual/html_node/";>gawk</a>)</small>
 </td>
-    <td>Text scanning and processing language.
-       [<a href="/software/gawk/">gawk&nbsp;home</a>]</td></tr>
+    <td>Linguagem de varredura e processamento de texto.  [<a
+href="/software/gawk/">página&nbsp;do&nbsp;gawk</a>]</td></tr>
 
 <tr id="grep"><td>* <a href="/software/grep/manual/">Grep</a></td>
-    <td>Print lines matching a pattern.
-       [<a href="/software/grep/">grep&nbsp;home</a>]</td></tr>
+    <td>Imprime linhas correspondentes a um padrão.  [<a
+href="/software/grep/">página&nbsp;do&nbsp;grep</a>]</td></tr>
 
 <tr id="groff"><td>* <a 
href="https://www.gnu.org/software/groff/manual/html_node/";>Groff</a></td>
-    <td>Typesetting from plain text mixed with formatting commands.
-       [<a href="/software/groff/">groff&nbsp;home</a>]</td></tr>
+    <td>Formatação de texto simples misturado com comandos de formatação.  
[<a
+href="/software/groff/">página&nbsp;do&nbsp;groff</a>]</td></tr>
 
 <tr id="help2man"><td>* <a href="/software/help2man/">Help2man</a></td>
-    <td>Automatically generate man pages from program --help.
-       [<a href="/software/help2man/">help2man&nbsp;home</a>]</td></tr>
+    <td>Gera automaticamente páginas man a partir do --help do programa.  [<a
+href="/software/help2man/">página&nbsp;do&nbsp;help2man</a>]</td></tr>
 
 <tr id="html-info"><td>* <a href="/software/html-info/">Html-info</a></td>
-    <td>HTML-Info viewer and tools.
-       [<a href="/software/html-info/">html-info&nbsp;home</a>]</td></tr>
+    <td>Visualizador e ferramentas de HTML-Info.  [<a
+href="/software/html-info/">página&nbsp;do&nbsp;html-info</a>]</td></tr>
 
 <tr id="hyperbole"><td>* <a href="/software/hyperbole/">Hyperbole</a></td>
-    <td>Emacs hypertext system via customizable buttons.
-       [<a href="/software/hyperbole/">hyperbole&nbsp;home</a>]</td></tr>
+    <td>Sistema de hipertexto para Emacs por meio de botões personalizáveis. 
 [<a
+href="/software/hyperbole/">página&nbsp;do&nbsp;hyperbole</a>]</td></tr>
 
 <tr id="less"><td>* <a href="/software/less/">Less</a></td>
-    <td>Paginator for terminals.
-       [<a href="/software/less/">less&nbsp;home</a>]</td></tr>
+    <td>Paginador para terminais.  [<a
+href="/software/less/">página&nbsp;do&nbsp;less</a>]</td></tr>
 
 <tr id="m4"><td>* <a href="/software/m4/manual/">M4</a></td>
-    <td>Macro processor.
-       [<a href="/software/m4/">m4&nbsp;home</a>]</td></tr>
+    <td>Processador de macros.  [<a 
href="/software/m4/">página&nbsp;do&nbsp;m4</a>]</td></tr>
 
 <tr id="miscfiles"><td>* <a href="/software/miscfiles/">Miscfiles</a></td>
-    <td>Data files for airport codes, zip codes, a dictionary, and more.
-       [<a href="/software/miscfiles/">miscfiles&nbsp;home</a>]</td></tr>
+    <td>Arquivos de dados para códigos de aeroporto, códigos postais, um 
dicionário
+e mais.  [<a 
href="/software/miscfiles/">página&nbsp;do&nbsp;miscfiles</a>]</td></tr>
 
-<tr id="ocrad"><td>* <a 
href="https://www.gnu.org/software/ocrad/manual/ocrad_manual.html";>Ocrad</a></td>
-    <td>Optical character recognition based on feature extraction.
-       [<a href="/software/ocrad/">ocrad&nbsp;home</a>]</td></tr>
+<tr id="ocrad"><td>* <a
+href="https://www.gnu.org/software/ocrad/manual/ocrad_manual.html";>Ocrad</a></td>
+    <td>Reconhecimento ótico de caracteres baseado na extração de recursos. 
 [<a
+href="/software/ocrad/">página&nbsp;do&nbsp;ocrad</a>]</td></tr>
 
 <tr id="orgadoc"><td>* <a 
href="/software/orgadoc/orgadoc.html">OrgaDoc</a></td>
-    <td>Eiffel program to maintain and query documents across machines.
-       [<a href="/software/orgadoc/">orgadoc&nbsp;home</a>]</td></tr>
+    <td>Programa Eiffel para manter e consultar documentos entre máquinas.  
[<a
+href="/software/orgadoc/">página&nbsp;do&nbsp;orgadoc</a>]</td></tr>
 
 <tr id="reftex"><td>* <a 
href="/software/auctex/manual/reftex.index.html">Reftex</a></td>
-    <td>Emacs support for LaTeX cross-references of all kinds.
-       [<a href="/software/reftex/">reftex&nbsp;home</a>]</td></tr>
+    <td>Suporte ao Emacs para referências cruzadas em LaTeX de todos os 
tipos.  [<a
+href="/software/reftex/">página&nbsp;do&nbsp;reftex</a>]</td></tr>
 
 <tr id="sed"><td>* <a href="/software/sed/manual/">Sed</a></td>
-    <td>Stream editor.
-       [<a href="/software/sed/">sed&nbsp;home</a>]</td></tr>
+    <td>Editor de fluxo.  [<a 
href="/software/sed/">página&nbsp;do&nbsp;sed</a>]</td></tr>
 
 <tr id="spell"><td>* <a href="/software/spell/">Spell</a></td>
-    <td>Spell checking.
-       [<a href="/software/spell/">spell&nbsp;home</a>]</td></tr>
+    <td>Verificação ortográfica.  [<a
+href="/software/spell/">página&nbsp;do&nbsp;spell</a>]</td></tr>
 
-<tr id="src-highlite"><td>* <a 
href="https://www.gnu.org/software/src-highlite/source-highlight.html";>Src-highlite</a></td>
-    <td>Produce a document with syntax highlighting from a source file.
-       [<a href="/software/src-highlite/">src-highlite&nbsp;home</a>]</td></tr>
+<tr id="src-highlite"><td>* <a
+href="https://www.gnu.org/software/src-highlite/source-highlight.html";>Src-highlite</a></td>
+    <td>Produz um documento com realce de sintaxe a partir de um arquivo 
fonte.  [<a
+href="/software/src-highlite/">página&nbsp;do&nbsp;src-highlite</a>]</td></tr>
 
 <tr id="teximpatient"><td>* <a href="/software/teximpatient/">TeX for the 
Impatient</a></td>
-    <td>Book on TeX, plain TeX, and Eplain.
-       [<a href="/software/teximpatient/">teximpatient&nbsp;home</a>]</td></tr>
+    <td>Livro em Tex, Tex simples e Eplain.  [<a
+href="/software/teximpatient/">página&nbsp;do&nbsp;teximpatient</a>]</td></tr>
 
-<tr id="texinfo"><td>* <a href="/software/texinfo/manual/">Texinfo</a>
-<small>(<a 
href="https://www.gnu.org/software/texinfo/manual/info-stnd/html_node/";>info-stnd</a>
-  <a 
href="https://www.gnu.org/software/texinfo/manual/texinfo/html_node/";>texinfo<!--
 again --></a>)</small>
+<tr id="texinfo"><td><!-- again -->
+* <a href="/software/texinfo/manual/">Texinfo</a> <small>(<a
+href="https://www.gnu.org/software/texinfo/manual/info-stnd/html_node/";>info-stnd</a>
+<a
+href="https://www.gnu.org/software/texinfo/manual/texinfo/html_node/";>texinfo</a>)</small>
 </td>
-    <td>The GNU documentation format.
-       [<a href="/software/texinfo/">texinfo&nbsp;home</a>]</td></tr>
+    <td>O formato de documentação do GNU.  [<a
+href="/software/texinfo/">página&nbsp;do&nbsp;texinfo</a>]</td></tr>
 
 <tr id="texmacs"><td>* <a href="/software/texmacs/">TeXmacs</a></td>
-    <td>Editing platform with special features for scientists.
-       [<a href="/software/texmacs/">texmacs&nbsp;home</a>]</td></tr>
+    <td>Plataforma de edição com recursos especiais para cientistas.  [<a
+href="/software/texmacs/">página&nbsp;do&nbsp;texmacs</a>]</td></tr>
 
 <tr id="unrtf"><td>* <a href="/software/unrtf/">UnRTF</a></td>
-    <td>Convert Rich Text Format documents to other formats.
-       [<a href="/software/unrtf/">unrtf&nbsp;home</a>]</td></tr>
+    <td>Converte documentos Rich Text Format para outros formatos.  [<a
+href="/software/unrtf/">página&nbsp;do&nbsp;unrtf</a>]</td></tr>
 
 <tr id="wdiff"><td>* <a href="/software/wdiff/manual/">Wdiff</a></td>
-    <td>Word difference finder.
-       [<a href="/software/wdiff/">wdiff&nbsp;home</a>]</td></tr>
+    <td>Localizador de diferença entre palavras.  [<a
+href="/software/wdiff/">página&nbsp;do&nbsp;wdiff</a>]</td></tr>
 
 
 <tr>
-<td id="Version" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/vc/";><big><b>Version 
control</b></big></a></td></tr>
+<td id="Version" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/vc/";><big><b>Controle de
+versão</b></big></a></td></tr>
 
 <tr id="bazaar"><td>* <a 
href="http://doc.bazaar.canonical.com/en/";>Bazaar</a></td>
-    <td>Version control system supporting both distributed and centralized 
workflows.
-       [<a href="/software/bazaar/">bazaar&nbsp;home</a>]</td></tr>
+    <td>Sistema de controle de versão com suporte a fluxos de trabalho 
distribuído e
+centralizado.  [<a 
href="/software/bazaar/">página&nbsp;do&nbsp;bazaar</a>]</td></tr>
 
 <tr id="cssc"><td>* <a 
href="https://www.gnu.org/software/cssc/manual/";>CSSC</a></td>
-    <td>File-based version control like SCCS.
-       [<a href="/software/cssc/">cssc&nbsp;home</a>]</td></tr>
+    <td>Controle de versão baseado em arquivos, como SCCS.  [<a
+href="/software/cssc/">página&nbsp;do&nbsp;cssc</a>]</td></tr>
 
 <tr id="rcs"><td>* <a href="/software/rcs/manual/">RCS</a></td>
-    <td>Per-file local revision control system.
-       [<a href="/software/rcs/">rcs&nbsp;home</a>]</td></tr>
+    <td>Sistema de controle de revisão local por arquivo.  [<a
+href="/software/rcs/">página&nbsp;do&nbsp;rcs</a>]</td></tr>
 
 <tr id="vc-dwim"><td>* <a href="/software/vc-dwim/manual/">Vc-dwim</a></td>
-    <td>Version-control-agnostic ChangeLog diff and commit tool.
-       [<a href="/software/vc-dwim/">vc-dwim&nbsp;home</a>]</td></tr>
+    <td>Ferramenta de commit e diff de ChangeLog agnóstico a controle de 
versão.
+[<a href="/software/vc-dwim/">página&nbsp;do&nbsp;vc-dwim</a>]</td></tr>
 
 
 <tr>
-<td id="Video" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/video/";><big><b>Video</b></big></a></td></tr>
+<td id="Video" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/video/";><big><b>Vídeo</b></big></a></td></tr>
 
 <tr id="vcdimager"><td>* <a href="/software/vcdimager/">VCDImager</a></td>
-    <td>Authoring, disassembling and analyzing (super and) video CDs.
-       [<a href="/software/vcdimager/">vcdimager&nbsp;home</a>]</td></tr>
+    <td>Criação, desmontagem e análise de Super CDs e CDs de vídeo.  [<a
+href="/software/vcdimager/">página&nbsp;do&nbsp;vcdimager</a>]</td></tr>
 
 
 <tr>
-<td id="Web" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/web/";><big><b>Web 
authoring</b></big></a></td></tr>
+<td id="Web" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/web/";><big><b>Criação
+web</b></big></a></td></tr>
 
 <tr id="easejs"><td>* <a 
href="http://www.gnu.org/software/easejs/manual.html";>Easejs</a></td>
-    <td>Classical object-oriented framework for JavaScript.
-       [<a href="/software/easejs/">easejs&nbsp;home</a>]</td></tr>
+    <td>Framework orientado a objeto clássico para JavaScript.  [<a
+href="/software/easejs/">plágina&nbsp;do&nbsp;easejs</a>]</td></tr>
 
 <tr id="emacs-muse"><td>* <a 
href="/software/emacs-muse/manual/">Emacs-muse</a></td>
-    <td>Authoring and publishing environment for Emacs.
-       [<a href="/software/emacs-muse/">emacs-muse&nbsp;home</a>]</td></tr>
+    <td>Ambiente de criação e publicação para o Emacs.  [<a
+href="/software/emacs-muse/">página&nbsp;do&nbsp;emacs-muse</a>]</td></tr>
 
 <tr id="gnowsys"><td>* <a href="/software/gnowsys/">GNOWSYS</a></td>
-    <td>Distributed network-based memory and knowledge management.
-       [<a href="/software/gnowsys/">gnowsys&nbsp;home</a>]</td></tr>
+    <td>Gerenciamento de conhecimento e memória baseado em rede distribuída. 
 [<a
+href="/software/gnowsys/">página&nbsp;do&nbsp;gnowsys</a>]</td></tr>
 
 <tr id="grabcomics"><td>* <a 
href="http://server.phpgrabcomics.org/docs/";>phpGrabComics</a></td>
-    <td>Saves comic strips from the web.
-       [<a href="/software/grabcomics/">grabcomics&nbsp;home</a>]</td></tr>
+    <td>Salva tiras de revistas em quadrinhos da web.  [<a
+href="/software/grabcomics/">página&nbsp;do&nbsp;grabcomics</a>]</td></tr>
 
 <tr id="metahtml"><td>* <a 
href="http://metahtml.sourceforge.net/documentation/";>Metahtml</a></td>
-    <td>Combining HTML and Lisp, specifically designed for Web servers.
-       [<a href="/software/metahtml/">metahtml&nbsp;home</a>]</td></tr>
+    <td>Combinação de HTML e Lisp, especificamente projetados para 
servidores web.
+[<a href="/software/metahtml/">página&nbsp;do&nbsp;metahtml</a>]</td></tr>
 
 <tr id="xmlat"><td>* <a href="/software/xmlat/">Xmlat</a></td>
-    <td>Simple XML for defining and implementing markup languages.
-       [<a href="/software/xmlat/">xmlat&nbsp;home</a>]</td></tr>
+    <td>XML simples para definição e implementação de linguages de 
marcação.  [<a
+href="/software/xmlat/">página&nbsp;do&nbsp;xmlat</a>]</td></tr>
 </table>
 <p>
-<a href="#Archiving">Archiving</a> -
-<a href="#Audio">Audio</a> -
-<a href="#Business">Business&nbsp;and&nbsp;productivity</a> -
-<a href="#Database">Database</a> -
-<a href="#Dictionaries">Dictionaries</a> -
-<a href="#Translation">Documentation&nbsp;translation</a> -
-<a href="#Editors">Editors</a> -
-<a href="#Education">Education</a> -
-<a href="#Email">Email</a> -
-<a href="#Fonts">Fonts</a> -
-<a href="#gnuorg">GNU&nbsp;organization</a> -
-<a href="#Games">Games</a> -
-<a href="#Graphics">Graphics</a> -
-<a href="#Health">Health</a> -
-<a href="#Interface">Interface</a> -
-<a href="#Internet">Internet&nbsp;applications</a> -
-<a href="#Live">Live&nbsp;communications</a> -
-<a href="#Localization">Localization</a> -
-<a href="#Mathematics">Mathematics</a> -
-<a href="#Music">Music</a> -
-<a href="#Printing">Printing</a> -
-<a href="#Science">Science</a> -
-<a href="#Security">Security</a> -
-<a href="#Software">Software&nbsp;development</a> -
-<a href="#Libraries">Software&nbsp;libraries</a> -
-<a href="#Spreadsheets">Spreadsheets</a> -
-<a href="#Sysadmin">System&nbsp;administration</a> -
-<a href="#Telephony">Telephony</a> -
-<a href="#Text">Text&nbsp;creation&nbsp;and&nbsp;manipulation</a> -
-<a href="#Version">Version&nbsp;control</a> -
-<a href="#Video">Video</a> -
-<a href="#Web">Web&nbsp;authoring</a> -
+<a href="#Archiving">Arquivamento</a> - <a href="#Audio">Áudio</a> - <a
+href="#Business">Negócios&nbsp;e&nbsp;produtividade</a> - <a
+href="#Database">Banco de dados</a> - <a
+href="#Dictionaries">Dicionários</a> - <a
+href="#Translation">Tradução&nbsp;da&nbsp;documentação</a> - <a
+href="#Editors">Editores</a> - <a href="#Education">Educação</a> - <a
+href="#Email">E-mail</a> - <a href="#Fonts">Fontes</a> - <a
+href="#gnuorg">Organização&nbsp;do&nbsp;GNU</a> - <a href="#Games">Jogos</a>
+- <a href="#Graphics">Gráficos</a> - <a href="#Health">Saúde</a> - <a
+href="#Interface">Interface</a> - <a
+href="#Internet">Aplicativos&nbsp;de&nbsp;Internet</a> - <a
+href="#Live">Comunicações&nbsp;ao&nbsp;vivo</a> - <a
+href="#Localization">Localização</a> - <a href="#Mathematics">Matemática</a>
+- <a href="#Music">Música</a> - <a href="#Printing">Impressão</a> - <a
+href="#Science">Ciência</a> - <a href="#Security">Segurança</a> - <a
+href="#Software">Desenvolvimento&nbsp;de&nbsp;software</a> - <a
+href="#Libraries">Bibliotecas&nbsp;de&nbsp;software</a> - <a
+href="#Spreadsheets">Planilhas</a> - <a
+href="#Sysadmin">Administração&nbsp;de&nbsp;sistema</a> - <a
+href="#Telephony">Telefonia</a> - <a
+href="#Text">Criação&nbsp;e&nbsp;manipulação&nbsp;de&nbsp;texto</a> - <a
+href="#Version">Controle&nbsp;de&nbsp;versão</a> - <a
+href="#Video">Vídeo</a> - <a href="#Web">Autoria&nbsp;web</a> -
 </p>
 
 <!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->

Index: manual/po/allgnupkgs.pt-br.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- manual/po/allgnupkgs.pt-br.po       2 Feb 2019 13:16:11 -0000       1.1
+++ manual/po/allgnupkgs.pt-br.po       2 Feb 2019 13:31:26 -0000       1.2
@@ -3747,21 +3747,21 @@
 
 #. type: Content of: <table><tr><td>
 msgid ""
-"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> "
-"<small>(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-";
-"scheme-imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/";
-"mit-scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href="
-"\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/";
-"\">sos</a> <a href=\"https://www.gnu.org/software/mit-scheme/documentation/";
-"mit-scheme-user/\">mit-scheme-user</a>)</small>"
-msgstr ""
-"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> "
-"<small>(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-";
-"scheme-imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/";
-"mit-scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href="
-"\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/";
-"\">sos</a> <a href=\"https://www.gnu.org/software/mit-scheme/documentation/";
-"mit-scheme-user/\">mit-scheme-user</a>)</small>"
+"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> <small>"
+"(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-";
+"imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/mit-";
+"scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href=\"https://";
+"www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/\">sos</a> <a "
+"href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/";
+"\">mit-scheme-user</a>)</small>"
+msgstr ""
+"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> <small>"
+"(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-";
+"imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/mit-";
+"scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href=\"https://";
+"www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/\">sos</a> <a "
+"href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/";
+"\">mit-scheme-user</a>)</small>"
 
 #. type: Content of: <table><tr><td>
 msgid ""
@@ -3956,17 +3956,17 @@
 #.  again 
 #. type: Content of: <table><tr><td>
 msgid ""
-"* <a href=\"http://smalltalk.gnu.org/documentation\";>Smalltalk</a> "
-"<small>(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/";
-"html_node/\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/";
-"smalltalk/manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www.";
-"gnu.org/software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
-msgstr ""
-"* <a href=\"http://smalltalk.gnu.org/documentation\";>Smalltalk</a> "
-"<small>(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/";
-"html_node/\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/";
-"smalltalk/manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www.";
-"gnu.org/software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
+"* <a href=\"http://smalltalk.gnu.org/documentation\";>Smalltalk</a> <small>"
+"(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/html_node/";
+"\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/smalltalk/";
+"manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www.gnu.org/";
+"software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
+msgstr ""
+"* <a href=\"http://smalltalk.gnu.org/documentation\";>Smalltalk</a> <small>"
+"(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/html_node/";
+"\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/smalltalk/";
+"manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www.gnu.org/";
+"software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
 
 #. type: Content of: <table><tr><td>
 msgid ""

Index: manual/po/manual.pt-br.po
===================================================================
RCS file: /web/www/www/manual/po/manual.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- manual/po/manual.pt-br.po   2 Feb 2019 13:16:04 -0000       1.1
+++ manual/po/manual.pt-br.po   2 Feb 2019 13:31:26 -0000       1.2
@@ -89,7 +89,6 @@
 "sugestões podem ser enviadas para <a href=\"mailto:address@hidden";>&lt;"
 "address@hidden&gt;</a>."
 
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -140,4 +139,4 @@
 #.  timestamp start 
 #. type: Content of: <div><p>
 msgid "Updated:"
-msgstr "Última atualização:"
+msgstr "Última atualização: "

Index: manual/po/manual.translist
===================================================================
RCS file: /web/www/www/manual/po/manual.translist,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- manual/po/manual.translist  10 Nov 2015 08:29:12 -0000      1.9
+++ manual/po/manual.translist  2 Feb 2019 13:31:26 -0000       1.10
@@ -6,6 +6,7 @@
 <span dir="ltr"><a lang="de" hreflang="de" 
href="/manual/manual.de.html">Deutsch</a>&nbsp;[de]</span> &nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/manual/manual.fr.html">français</a>&nbsp;[fr]</span> &nbsp;
 <span dir="ltr"><a lang="ja" hreflang="ja" 
href="/manual/manual.ja.html">日本語</a>&nbsp;[ja]</span> &nbsp;
+<span dir="ltr"><a lang="pt-br" hreflang="pt-br" 
href="/manual/manual.pt-br.html">português&nbsp;do&nbsp;Brasil</a>&nbsp;[pt-br]</span>
 &nbsp;
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" href="/manual/manual.html" 
hreflang="x-default" />
@@ -13,4 +14,5 @@
 <link rel="alternate" type="text/html" lang="de" hreflang="de" 
href="/manual/manual.de.html" title="Deutsch" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/manual/manual.fr.html" title="français" />
 <link rel="alternate" type="text/html" lang="ja" hreflang="ja" 
href="/manual/manual.ja.html" title="日本語" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/manual/manual.pt-br.html" title="português do Brasil" />
 <!-- end translist file -->

Index: philosophy/po/phone-anonymous-payment.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/phone-anonymous-payment.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/phone-anonymous-payment.pt-br.po      2 Feb 2019 13:16:00 
-0000       1.1
+++ philosophy/po/phone-anonymous-payment.pt-br.po      2 Feb 2019 13:31:27 
-0000       1.2
@@ -91,7 +91,6 @@
 "sugestões podem ser enviadas para <a href=\"mailto:address@hidden";>&lt;"
 "address@hidden&gt;</a>."
 
-#
 #.  TRANSLATORS: Ignore the original text in this paragraph,
 #.         replace it with the translation of these two:
 #.         We work hard and do our best to provide accurate, good quality
@@ -143,4 +142,4 @@
 #.  timestamp start 
 #. type: Content of: <div><p>
 msgid "Updated:"
-msgstr "Última atualização:"
+msgstr "Última atualização: "

Index: philosophy/po/phone-anonymous-payment.translist
===================================================================
RCS file: /web/www/www/philosophy/po/phone-anonymous-payment.translist,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/phone-anonymous-payment.translist     20 Dec 2018 09:59:13 
-0000      1.2
+++ philosophy/po/phone-anonymous-payment.translist     2 Feb 2019 13:31:27 
-0000       1.3
@@ -4,9 +4,11 @@
 <p>
 <span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/philosophy/phone-anonymous-payment.en.html">English</a>&nbsp;[en]</span> 
&nbsp;
 <span dir="ltr"><a lang="fr" hreflang="fr" 
href="/philosophy/phone-anonymous-payment.fr.html">français</a>&nbsp;[fr]</span>
 &nbsp;
+<span dir="ltr"><a lang="pt-br" hreflang="pt-br" 
href="/philosophy/phone-anonymous-payment.pt-br.html">português&nbsp;do&nbsp;Brasil</a>&nbsp;[pt-br]</span>
 &nbsp;
 </p>
 </div>' -->
 <link rel="alternate" type="text/html" 
href="/philosophy/phone-anonymous-payment.html" hreflang="x-default" />
 <link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/philosophy/phone-anonymous-payment.en.html" title="English" />
 <link rel="alternate" type="text/html" lang="fr" hreflang="fr" 
href="/philosophy/phone-anonymous-payment.fr.html" title="français" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br" 
href="/philosophy/phone-anonymous-payment.pt-br.html" title="português do 
Brasil" />
 <!-- end translist file -->

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/de.po        28 Jan 2019 23:59:19 -0000      1.18
+++ proprietary/po/de.po        2 Feb 2019 13:31:27 -0000       1.19
@@ -7126,6 +7126,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -10079,10 +10100,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
@@ -10424,6 +10458,14 @@
 msgstr "<a href=\"#SpywareInMobileApps\">… in Anwendungssoftware</a>"
 
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">… in Anwendungssoftware</a>"
+
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
 #. type: Content of: <div><div><ul><li><ul><li>
 #, fuzzy
@@ -10865,6 +10907,23 @@
 msgstr " "
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr " "
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -11171,6 +11230,14 @@
 "em> oder <em>proprietär</em> zu nennen</a>, aber nichtsdestotrotz ist die "
 "Überwachung ein Missbrauch."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/es.po        29 Jan 2019 12:00:18 -0000      1.23
+++ proprietary/po/es.po        2 Feb 2019 13:31:27 -0000       1.24
@@ -5026,6 +5026,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -7252,28 +7273,26 @@
 msgid "Latest additions"
 msgstr "Añadidos recientes"
 
-# | Until 2015, any tweet that listed a geographical tag <a
-# | 
[-href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\";>-]
-# | 
{+href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\";>+}
-# | sent the precise GPS location to Twitter's server</a>. It still contains
-# | these GPS locations.
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Until 2015, any tweet that listed a geographical tag <a href=\"https://";
-#| "www.wired.com/story/twitter-location-data-gps-privacy/\"> sent the "
-#| "precise GPS location to Twitter's server</a>. It still contains these GPS "
-#| "locations."
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
-"Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a href="
-"\"https://www.wired.com/story/twitter-location-data-gps-privacy/\";>enviaba "
-"la localización GPS precisa al servidor de Twitter</a>. Este conserva aún "
-"esas localizaciones GPS."
 
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
@@ -7538,6 +7557,12 @@
 #. type: Content of: <div><div><ul><li><ul><li>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móviles</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móviles</a>"
 
@@ -7834,6 +7859,16 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
 #, fuzzy
 #| msgid "Mobile Jails"
 msgid "Mobile Apps"
@@ -8065,6 +8100,29 @@
 "proprietary&rdquo;</a>, but the surveillance is an abuse all the same."
 msgstr ""
 
+# | Until 2015, any tweet that listed a geographical tag <a
+# | 
[-href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\";>-]
+# | 
{+href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\";>+}
+# | sent the precise GPS location to Twitter's server</a>. It still contains
+# | these GPS locations.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Until 2015, any tweet that listed a geographical tag <a href=\"https://";
+#| "www.wired.com/story/twitter-location-data-gps-privacy/\"> sent the "
+#| "precise GPS location to Twitter's server</a>. It still contains these GPS "
+#| "locations."
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a href="
+"\"https://www.wired.com/story/twitter-location-data-gps-privacy/\";>enviaba "
+"la localización GPS precisa al servidor de Twitter</a>. Este conserva aún "
+"esas localizaciones GPS."
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/fr.po        29 Jan 2019 08:56:31 -0000      1.35
+++ proprietary/po/fr.po        2 Feb 2019 13:31:27 -0000       1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: fr.po\n"
-"POT-Creation-Date: 2019-01-28 23:56+0000\n"
+"POT-Creation-Date: 2019-01-05 11:26+0000\n"
 "PO-Revision-Date: 2019-01-29 09:53+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -5595,6 +5595,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -8023,15 +8044,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
-"Jusqu'en 2015, les tweets géolocalisés <a 
href=\"http://web-old.archive.org/";
-"web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-";
-"privacy/\">envoyaient les coordonnées GPS précises au serveur de Twitter</"
-"a>. Ils contiennent toujours ces coordonnées."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -8312,6 +8342,14 @@
 msgid "<a href=\"#SpywareInApplications\">Spyware in Applications</a>"
 msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
 
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
+
 #. type: Content of: <div><div><ul><li><ul><li>
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
@@ -8653,6 +8691,25 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr "Applications mobiles"
 
@@ -8958,6 +9015,18 @@
 "« privateurs » (propriétaires)</a>, mais ce flicage constitue malgré 
tout un "
 "abus."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"Jusqu'en 2015, les tweets géolocalisés <a 
href=\"http://web-old.archive.org/";
+"web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-";
+"privacy/\">envoyaient les coordonnées GPS précises au serveur de Twitter</"
+"a>. Ils contiennent toujours ces coordonnées."
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr "JavaScript"

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/it.po        28 Jan 2019 23:59:19 -0000      1.18
+++ proprietary/po/it.po        2 Feb 2019 13:31:27 -0000       1.19
@@ -6688,6 +6688,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -9363,10 +9384,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
@@ -9689,6 +9723,14 @@
 msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
 
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
 #. type: Content of: <div><div><ul><li><ul><li>
 #, fuzzy
@@ -10141,6 +10183,25 @@
 "\">#SpywareIniThings</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -10447,6 +10508,14 @@
 "nonfree.html\">non ha senso chiamarli &ldquo;liberi&rdquo; o &ldquo;"
 "proprietari&rdquo;</a>, ma la sorveglianza rimane comunque un abuso."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/ja.po        28 Jan 2019 23:59:19 -0000      1.18
+++ proprietary/po/ja.po        2 Feb 2019 13:31:27 -0000       1.19
@@ -5678,6 +5678,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -7927,10 +7948,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -8226,6 +8260,12 @@
 #. type: Content of: <div><div><ul><li><ul><li>
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a 
href=\"#SpywareInMobileApps\">モバイル・アプリのスパイウェア</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a 
href=\"#SpywareInMobileApps\">モバイル・アプリのスパイウェア</a>"
 
@@ -8614,6 +8654,22 @@
 "\">#SpywareIniThings</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -8900,6 +8956,14 @@
 
"nonfree.html\">それを「自由」あるいは「プロプライエタリ」と呼ぶことには意味が"
 
"ありません</a>が、監視が乱用であると言うのはまったく同じです。"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-mobiles.de-diff.html 28 Jan 2019 09:29:56 -0000      
1.33
+++ proprietary/po/malware-mobiles.de-diff.html 2 Feb 2019 13:31:28 -0000       
1.34
@@ -469,6 +469,21 @@
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
@@ -1186,7 +1201,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:56 $
+$Date: 2019/02/02 13:31:28 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/malware-mobiles.de.po        28 Jan 2019 09:29:57 -0000      
1.91
+++ proprietary/po/malware-mobiles.de.po        2 Feb 2019 13:31:29 -0000       
1.92
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -774,6 +774,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/malware-mobiles.es.po        29 Jan 2019 11:32:40 -0000      
1.90
+++ proprietary/po/malware-mobiles.es.po        2 Feb 2019 13:31:29 -0000       
1.91
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -656,6 +657,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary/po/malware-mobiles.fr.po        28 Jan 2019 13:53:33 -0000      
1.111
+++ proprietary/po/malware-mobiles.fr.po        2 Feb 2019 13:31:29 -0000       
1.112
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2019-01-28 14:33+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -658,6 +659,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/malware-mobiles.it-diff.html 28 Jan 2019 09:29:57 -0000      
1.38
+++ proprietary/po/malware-mobiles.it-diff.html 2 Feb 2019 13:31:29 -0000       
1.39
@@ -475,6 +475,21 @@
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
@@ -739,7 +754,7 @@
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, <span 
class="removed"><del><strong>it stores detailed logs
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it <span 
class="removed"><del><strong>stores detailed logs
       and may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
@@ -793,7 +808,7 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>it stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>stores detailed logs and
       may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -1222,7 +1237,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:29 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/malware-mobiles.it.po        28 Jan 2019 09:29:57 -0000      
1.91
+++ proprietary/po/malware-mobiles.it.po        2 Feb 2019 13:31:31 -0000       
1.92
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -732,6 +732,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/malware-mobiles.ja-diff.html 28 Jan 2019 09:29:57 -0000      
1.52
+++ proprietary/po/malware-mobiles.ja-diff.html 2 Feb 2019 13:31:31 -0000       
1.53
@@ -469,6 +469,21 @@
     tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
@@ -1062,7 +1077,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/malware-mobiles.ja.po        28 Jan 2019 09:29:57 -0000      
1.79
+++ proprietary/po/malware-mobiles.ja.po        2 Feb 2019 13:31:31 -0000       
1.80
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -613,6 +613,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-mobiles.pot  28 Jan 2019 09:29:57 -0000      1.57
+++ proprietary/po/malware-mobiles.pot  2 Feb 2019 13:31:31 -0000       1.58
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -447,6 +447,26 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a "
+"href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\";>
 "
+"report on the user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various "
+"apps. Some of them send Facebook detailed information about the user's "
+"activities in the app; others only say that the user is using that app, but "
+"that alone is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "This spying occurs regardless of whether the user has a Facebook 
account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a "
 
"href=\"https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent\";>
 "
 "upload call logs automatically from Android phones</a> while disguising what "

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/malware-mobiles.ru.po        28 Jan 2019 10:30:14 -0000      
1.141
+++ proprietary/po/malware-mobiles.ru.po        2 Feb 2019 13:31:31 -0000       
1.142
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -646,6 +647,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/nl.po        28 Jan 2019 23:59:19 -0000      1.18
+++ proprietary/po/nl.po        2 Feb 2019 13:31:31 -0000       1.19
@@ -4443,6 +4443,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -6379,10 +6400,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 # | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
@@ -6639,6 +6673,18 @@
 #| msgid ""
 #| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
 #| "a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+"<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele apparaten</"
+"a>"
+
+# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"/proprietary/malware-mobiles.html\">Mobiles</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr ""
 "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele apparaten</"
@@ -6955,6 +7001,16 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -7184,6 +7240,14 @@
 "proprietary&rdquo;</a>, but the surveillance is an abuse all the same."
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/pl.po        28 Jan 2019 23:59:19 -0000      1.18
+++ proprietary/po/pl.po        2 Feb 2019 13:31:31 -0000       1.19
@@ -3913,6 +3913,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5916,10 +5937,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 # | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
@@ -6170,6 +6204,17 @@
 #, fuzzy
 #| msgid ""
 #| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+"<a href=\"/philosophy/malware-mobiles.html\">Malware w&nbsp;urządzeniach "
+"mobilnych</a>"
+
+# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"/proprietary/malware-mobiles.html\">Mobiles</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</a>"
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr ""
 "<a href=\"/philosophy/malware-mobiles.html\">Malware w&nbsp;urządzeniach "
@@ -6484,6 +6529,16 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -6713,6 +6768,14 @@
 "proprietary&rdquo;</a>, but the surveillance is an abuse all the same."
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/pot  28 Jan 2019 23:59:20 -0000      1.18
+++ proprietary/po/pot  2 Feb 2019 13:31:31 -0000       1.19
@@ -3736,6 +3736,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5413,10 +5434,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -5631,6 +5665,10 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><ul><li>
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li>
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr ""
 
@@ -5907,6 +5945,16 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -6136,6 +6184,14 @@
 "proprietary&rdquo;</a>, but the surveillance is an abuse all the same."
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-sabotage.de-diff.html    5 Jan 2019 11:31:35 
-0000       1.26
+++ proprietary/po/proprietary-sabotage.de-diff.html    2 Feb 2019 13:31:31 
-0000       1.27
@@ -48,12 +48,26 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>injustice 
of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;p&gt;Here</strong></del></span> <span 
class="inserted"><ins><em>performance of older phones to force users to buy 
their newer
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -123,13 +137,21 @@
     requires users to talk with them through some specialized 
service.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Tesla used software to limit customers to using 
just</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201710044"&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
-    
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
-    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;part
 of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
+    changes</em></ins></span> the <span class="removed"><del><strong>battery 
of some
+    cars&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Sonos
+    &lt;a 
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    told all its customers, &ldquo;Agree&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+</em></ins></span>  to <span 
class="removed"><del><strong>snooping</strong></del></span> <span 
class="inserted"><ins><em>APFS&lt;/a&gt;, which cannot be
+    accessed from GNU/Linux, Windows</em></ins></span> or <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710041"&gt;
@@ -146,63 +168,57 @@
     a temptation to commit sabotage.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709090"&gt;</em></ins></span>
+  &lt;li id="M201709090"&gt;
     &lt;p&gt;Tesla used software to limit customers to using just &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;part
     of the battery of some cars&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708230"&gt;</em></ins></span>
+  &lt;li id="M201708230"&gt;
     &lt;p&gt;Sonos &lt;a
     
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
     told all its customers, &ldquo;Agree&rdquo;
-    to snooping or the product will stop working&lt;/a&gt;.  &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321"&gt;Another</strong></del></span>
+    to snooping or the</em></ins></span> product will stop working&lt;/a&gt;.  
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321"&gt;Another</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
     Another</em></ins></span> article&lt;/a&gt; says they won't forcibly 
change the software, but
     people won't be able to get any upgrades and eventually it will
     stop <span class="removed"><del><strong>working.
-    &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>working.&lt;/p&gt;</em></ins></span>
+    &lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;Revolv is an IoT device which managed &ldquo;smart home&rdquo;
-      operations: switching</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;
-    &lt;p&gt;Apple will stop &lt;a
-    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
-    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's</em></ins></span> the <span class="removed"><del><strong>lights, 
operate motion sensors, regulating
+      operations: switching the lights, operate motion sensors, regulating
       temperature, etc. On May 15th, 2016, Google said it would shut down the
       service linked to the device, making it unusable.&lt;/p&gt;
     &lt;p&gt;Although you may own the device, its functioning depended on the 
server
-      that never belonged to you. So you never really had 
control</strong></del></span> <span 
class="inserted"><ins><em>nature</em></ins></span> of <span 
class="removed"><del><strong>it. This
+      that never belonged to you. So you never really had control of it. This
       unjust design is called
       &lt;a href="/philosophy/network-services-arent-free-or-nonfree.html"&gt;
-      Service as</strong></del></span> <span 
class="inserted"><ins><em>proprietary software.&lt;/p&gt;
+      Service as a Software Substitute (SaaSS)&lt;/a&gt;. That is what gave the
+      company the power to convert it into a $300 out-of-warranty brick, for
+      your &ldquo;dumb home&rdquo;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>working.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201705180"&gt;
-    &lt;p&gt;Bird and rabbit pets were implemented for Second
-    Life by</em></ins></span> a <span class="removed"><del><strong>Software 
Substitute (SaaSS)&lt;/a&gt;. That is what gave the</strong></del></span> 
company <span class="removed"><del><strong>the power</strong></del></span> 
<span class="inserted"><ins><em>that tethered their food</em></ins></span> to 
<span class="removed"><del><strong>convert it into</strong></del></span> a 
<span class="removed"><del><strong>$300 out-of-warranty brick, for
-      your &ldquo;dumb home&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;Apple will stop</strong></del></span> <span 
class="inserted"><ins><em>server.</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
-    model iThings&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201706060"&gt;</em></ins></span>
+    &lt;p&gt;Apple will stop &lt;a
+    
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
+    bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
-    that's</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down</em></ins></span> the <span 
class="removed"><del><strong>nature of proprietary 
software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server and the pets more or less 
died&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    that's the nature of proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
Microsoft</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201704194"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201705180"&gt;
+    &lt;p&gt;Bird and rabbit pets were implemented for Second
+    Life by a company that tethered their food to a server.  &lt;a
+    
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
+    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201704194"&gt;
     &lt;p&gt;Microsoft has made Windows 7
     and 8 cease to function on certain new computers, &lt;a
     
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that"&gt;effectively
@@ -279,7 +295,10 @@
     ink cartridges&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+
+    &lt;p&gt;Once Microsoft has tricked a user into accepting installation
+      of</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201606270"&gt;
     &lt;p id="windows10-forcing"&gt;In its efforts to trick users of Windows
@@ -305,9 +324,9 @@
     while refusing to fix them itself.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201606010"&gt;</em></ins></span>
+  &lt;li id="M201606010"&gt;
     &lt;p&gt;Once Microsoft has tricked a user
-    into accepting installation of Windows 10, &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</strong></del></span>
+    into accepting installation of</em></ins></span> Windows 10, &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they</em></ins></span>
     find that they are denied the option to cancel or even postpone the
     imposed date of installation&lt;/a&gt;.&lt;/p&gt;
@@ -317,10 +336,7 @@
     to get screwed sooner or later.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Apple Music client
-      program &lt;a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
-      the</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201605150"&gt;
     &lt;p&gt;Revolv is an IoT device which managed &ldquo;smart home&rdquo;
@@ -337,10 +353,10 @@
     for your &ldquo;dumb home&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201605040"&gt;
-    &lt;p&gt;The Apple Music client program &lt;a
-    
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans
-    the</em></ins></span> user's file system for music files, copies them to 
an Apple server,
+  &lt;li id="M201605040"&gt;</em></ins></span>
+    &lt;p&gt;The Apple Music client program &lt;a <span 
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/"&gt;scans</em></ins></span>
+    the user's file system for music files, copies them to an Apple server,
     and deletes them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -398,7 +414,10 @@
     &lt;p&gt;Microsoft
     is &lt;a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146"&gt;
     forcibly
-    pushing&lt;/a&gt; &lt;a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;Windows
+    pushing&lt;/a&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511244"&gt;
+    &lt;p&gt;Google has long had</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;Windows
     update to its version 10&lt;/a&gt;, ignoring the flag on Windows 7 or 8
     that you could set to not upgrade.  This reaffirms the presence of
     a &lt;a href="/proprietary/proprietary-back-doors.html"&gt;universal
@@ -409,12 +428,11 @@
       
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/"&gt;
       delete applications&lt;/a&gt; without asking permission.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511244"&gt;
-    &lt;p&gt;Google</em></ins></span> has long had &lt;a
+  &lt;li&gt;&lt;p&gt;Google has long had &lt;a
     
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
-    back door to remotely unlock an Android device&lt;/a&gt;, unless its disk
+      back door</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
+    back door</em></ins></span> to remotely unlock an Android 
device&lt;/a&gt;, unless its disk
     is encrypted (possible since Android 5.0 Lollipop, but still not
     quite the <span class="removed"><del><strong>default).&lt;/p&gt;&lt;/li&gt;
 &lt;li&gt;&lt;p&gt;
@@ -738,7 +756,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/02 13:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/po/proprietary-sabotage.de.po   5 Jan 2019 11:31:35 -0000       
1.109
+++ proprietary/po/proprietary-sabotage.de.po   2 Feb 2019 13:31:31 -0000       
1.110
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:40+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -85,6 +85,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."

Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary/po/proprietary-sabotage.fr.po   17 Jan 2019 07:52:57 -0000      
1.125
+++ proprietary/po/proprietary-sabotage.fr.po   2 Feb 2019 13:31:31 -0000       
1.126
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2019-01-16 21:50+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -73,6 +74,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."

Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary-sabotage.it-diff.html    5 Jan 2019 11:31:35 
-0000       1.36
+++ proprietary/po/proprietary-sabotage.it-diff.html    2 Feb 2019 13:31:31 
-0000       1.37
@@ -51,6 +51,20 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
@@ -705,7 +719,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/02 13:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/proprietary-sabotage.it.po   5 Jan 2019 11:31:35 -0000       
1.102
+++ proprietary/po/proprietary-sabotage.it.po   2 Feb 2019 13:31:31 -0000       
1.103
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -68,6 +68,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."

Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-sabotage.ja-diff.html    5 Jan 2019 11:31:35 
-0000       1.39
+++ proprietary/po/proprietary-sabotage.ja-diff.html    2 Feb 2019 13:31:31 
-0000       1.40
@@ -52,6 +52,20 @@
 &lt;div class="column-limit" id="proprietary-sabotage"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running 
it&lt;/a&gt;.</em></ins></span> The <span class="inserted"><ins><em>result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
@@ -82,7 +96,7 @@
 
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
-    MacOS was tethered to a server.</em></ins></span>  The <span 
class="inserted"><ins><em>company &lt;a
+    MacOS was tethered to a server.  The company &lt;a
     
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
     shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -685,7 +699,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/02 13:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary/po/proprietary-sabotage.ja.po   5 Jan 2019 11:31:35 -0000       
1.94
+++ proprietary/po/proprietary-sabotage.ja.po   2 Feb 2019 13:31:31 -0000       
1.95
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -67,6 +67,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."

Index: proprietary/po/proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary-sabotage.pot     5 Jan 2019 11:31:35 -0000       
1.61
+++ proprietary/po/proprietary-sabotage.pot     2 Feb 2019 13:31:31 -0000       
1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a "
+"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\";>
 "
+"reports information to identify who is running it</a>. The result is often a "
+"legal threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a "
 
"href=\"https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\";>degrade
 "
 "the performance of older phones to force users to buy their newer "

Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/po/proprietary-sabotage.ru.po   17 Jan 2019 06:30:31 -0000      
1.163
+++ proprietary/po/proprietary-sabotage.ru.po   2 Feb 2019 13:31:31 -0000       
1.164
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-12-10 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -70,6 +71,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Apple and Samsung deliberately <a href=\"https://www.theguardian.com/";
 "technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
 "the performance of older phones to force users to buy their newer phones</a>."

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary-surveillance.de-diff.html        23 Jan 2019 
16:59:17 -0000      1.36
+++ proprietary/po/proprietary-surveillance.de-diff.html        2 Feb 2019 
13:31:31 -0000       1.37
@@ -118,10 +118,11 @@
     &lt;ul&gt;
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
-    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;Spyware at Work&lt;/a&gt;
-      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;/ul&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;Spyware on the 
Road&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;</em></ins></span>
@@ -324,7 +325,9 @@
 
     &lt;p&gt;To use proprietary software is to invite such treatment.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;
+  Windows 10 &lt;a 
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+  ships with default settings that show no regard</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508180"&gt;
     &lt;p&gt;&lt;a
@@ -335,16 +338,16 @@
 
   &lt;li id="M201508130"&gt;
     &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;</em></ins></span>
-    Windows 10 <span class="inserted"><ins><em>sends identifiable information 
to Microsoft&lt;/a&gt;, even if
+    
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"&gt;
+    Windows 10 sends identifiable information to Microsoft&lt;/a&gt;, even if
     a user turns off its Bing search and Cortana features, and activates
     the privacy-protection settings.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507300"&gt;
-    &lt;p&gt;Windows 10</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;</em></ins></span>
-    ships with default settings that show no regard for the privacy of
+    &lt;p&gt;Windows 10 &lt;a
+    
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"&gt;
+    ships with default settings that show no regard</em></ins></span> for the 
privacy of
     its users&lt;/a&gt;, giving Microsoft the &ldquo;right&rdquo; to snoop on
     the users' files, text input, voice input, location info, contacts,
     calendar records and web browsing history, as well as automatically
@@ -526,24 +529,12 @@
     Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Google did not intend to make these apps spy;</strong></del></span> 
<span class="inserted"><ins><em>spyware via
-    BIOS&lt;/a&gt;</em></ins></span> on <span 
class="inserted"><ins><em>Windows installs.  Note that</em></ins></span> the 
<span class="removed"><del><strong>contrary, it
-    worked in various ways to prevent that, and deleted these apps
-    after discovering what they did. So we cannot blame Google
-    specifically for the snooping of these apps.&lt;/p&gt;
-
-  &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares</strong></del></span> <span 
class="inserted"><ins><em>specific
-    sabotage method Lenovo used did not affect GNU/Linux; also, a
+  &lt;p&gt;Google</strong></del></span> <span 
class="inserted"><ins><em>spyware via
+    BIOS&lt;/a&gt; on Windows installs.  Note that the specific
+    sabotage method Lenovo used</em></ins></span> did not <span 
class="removed"><del><strong>intend</strong></del></span> <span 
class="inserted"><ins><em>affect GNU/Linux; also, a
     &ldquo;clean&rdquo; Windows install is not really clean since &lt;a
-    href="/proprietary/malware-microsoft.html"&gt;Microsoft 
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility 
for the injustice of their
-    being nonfree. It also distributes</strong></del></span> its
-    own <span class="removed"><del><strong>nonfree apps, such as
-    Google
-    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-      are malicious&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>malware&lt;/a&gt;.&lt;/p&gt;
+    href="/proprietary/malware-microsoft.html"&gt;Microsoft puts in its
+    own malware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -562,42 +553,27 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>preventing apps from
-    cheating?  There</strong></del></span> <span 
class="inserted"><ins><em>monitoring
-    people through &ldquo;their&rdquo; phones</em></ins></span> is <span 
class="removed"><del><strong>no systematic way for Google, or Android
-    users, to inspect executable</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;</em></ins></span>
-    proprietary <span class="removed"><del><strong>apps</strong></del></span> 
<span class="inserted"><ins><em>software</em></ins></span> to <span 
class="removed"><del><strong>see what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> they
-    <span class="removed"><del><strong>do.&lt;/p&gt;
-
-  &lt;p&gt;Google could demand the source code for these apps, and 
study</strong></del></span> <span class="inserted"><ins><em>can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the
-    <span class="removed"><del><strong>source code 
somehow</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The natural extension of monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software</em></ins></span> to make <span 
class="removed"><del><strong>these apps spy; on</strong></del></span> <span 
class="inserted"><ins><em>sure they can't &ldquo;fool&rdquo;</em></ins></span>
+    the <span class="removed"><del><strong>contrary, it
+    worked in various ways</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough</strong></del></span> <span class="inserted"><ins><em>Edward 
Snowden, &lt;a
+    &lt;p&gt;According</em></ins></span> to <span 
class="removed"><del><strong>prevent that,</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
     href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
-    them</em></ins></span> to <span 
class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
+    them to turn the phones on</em></ins></span> and <span 
class="removed"><del><strong>deleted these apps
+    after discovering what they did. So we cannot blame Google
+    specifically for</strong></del></span> <span 
class="inserted"><ins><em>off, listen to</em></ins></span> the <span 
class="removed"><del><strong>snooping of these apps.&lt;/p&gt;
 
-  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>phones on and off, 
listen</em></ins></span> to the
-    <span class="removed"><del><strong>public, so we can depend on each 
other.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;A
-    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-      research paper&lt;/a&gt; that investigated</strong></del></span> <span 
class="inserted"><ins><em>microphone,
-    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>GPS, take photographs, read
-    text messages, read call, location</em></ins></span> and <span 
class="removed"><del><strong>security
-    of 283 Android VPN apps concluded that &ldquo;in spite of the
-    promises for privacy, security,</strong></del></span> <span 
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span 
class="removed"><del><strong>anonymity given by</strong></del></span>
-    <span class="inserted"><ins><em>read</em></ins></span> the
-    <span class="removed"><del><strong>majority of VPN apps&mdash;millions of 
users may be unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is 
designed</em></ins></span> to <span class="removed"><del><strong>poor security 
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
+  &lt;p&gt;On</strong></del></span> <span class="inserted"><ins><em>microphone,
+    retrieve geo-location data from</em></ins></span> the <span 
class="removed"><del><strong>other hand, Google redistributes nonfree Android 
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take 
photographs, read
+    text messages, read call, location</em></ins></span> and
+    <span class="removed"><del><strong>therefore shares 
in</strong></del></span> <span class="inserted"><ins><em>web browsing history, 
and
+    read</em></ins></span> the <span 
class="removed"><del><strong>responsibility for</strong></del></span> <span 
class="inserted"><ins><em>contact list. This malware is designed to disguise 
itself
     from investigation.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -605,37 +581,34 @@
     &lt;p&gt;&lt;a
     
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
     The NSA can tap data in smart phones, including iPhones,
-    Android,</em></ins></span> and <span class="removed"><del><strong>abusive 
practices inflicted by
-    VPN apps.&rdquo;&lt;/p&gt;
+    Android, and BlackBerry&lt;/a&gt;.  While there is not much
+    detail here, it seems that this does not operate via</em></ins></span>
+    the <span class="removed"><del><strong>injustice of their
+    being nonfree.</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
+    phones have.</em></ins></span> It <span class="removed"><del><strong>also 
distributes its own nonfree apps, such as
+    Google
+    Play, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which</strong></del></span>
 <span class="inserted"><ins><em>may involve exploiting various bugs.  
There</em></ins></span> are <span 
class="removed"><del><strong>malicious&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>BlackBerry&lt;/a&gt;.  While there</em></ins></span> 
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN 
apps from
-    the research paper</strong></del></span> <span 
class="inserted"><ins><em>not much
-    detail here, it seems</em></ins></span> that <span 
class="removed"><del><strong>tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>this does not operate via</em></ins></span>
-    the <span class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>universal back door that we know nearly all portable
-    phones have. It may involve exploiting various bugs.  There are &lt;a
+  &lt;p&gt;Could Google have done a better job</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots</em></ins></span> of
-    <span class="removed"><del><strong>users:&lt;/p&gt;
-
-  &lt;dl&gt;
-    &lt;dt&gt;SurfEasy&lt;/dt&gt;
-    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted ads.&lt;/dd&gt;
+    lots</em></ins></span> of <span class="removed"><del><strong>preventing 
apps from
+    cheating?  There is no systematic way for Google, or Android
+    users, to inspect executable proprietary apps to see what they
+    do.&lt;/p&gt;
 
-    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_SMS&lt;/code&gt;</strong></del></span>
 <span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Google could demand</strong></del></span> <span 
class="inserted"><ins><em>bugs in</em></ins></span> the <span 
class="removed"><del><strong>source code for these apps,</strong></del></span> 
<span class="inserted"><ins><em>phones' radio software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307000"&gt;
     &lt;p&gt;Portable phones with GPS &lt;a
     
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</strong></del></span> <span 
class="inserted"><ins><em>users cannot stop
-    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>has full access</strong></del></span> <span 
class="inserted"><ins><em>will eventually require all new portable 
phones</em></ins></span>
-    to
-      <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
-
-    &lt;dt&gt;DroidVPN</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
+    will send their GPS location on remote command,</em></ins></span> and 
<span class="removed"><del><strong>study the
+    source code somehow to determine whether they 
mistreat</strong></del></span> users <span class="removed"><del><strong>in
+    various ways. If it did a good job of this,</strong></del></span> <span 
class="inserted"><ins><em>cannot stop
+    them&lt;/a&gt;. (The US says</em></ins></span> it <span 
class="removed"><del><strong>could more or less
+    prevent such snooping, except when the app developers are clever
+    enough</strong></del></span> <span class="inserted"><ins><em>will 
eventually require all new portable phones</em></ins></span>
+    to <span class="removed"><del><strong>outsmart</strong></del></span> <span 
class="inserted"><ins><em>have GPS.)&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -647,134 +620,204 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
-      for other apps and also core system logs. TigerVPN developers
-      have confirmed this.&lt;/dd&gt;
+    &lt;p&gt;The DMCA and</em></ins></span> the <span 
class="removed"><del><strong>checking.&lt;/p&gt;
 
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it 
<span class="removed"><del><strong>stores detailed logs
-      and may turn them over</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google to protect us. We must demand release of source 
code</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS 
cr&hellip;apps spy on users&lt;/a&gt;, because
-    this would require circumventing</em></ins></span> the <span 
class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>iOS 
DRM.&lt;/p&gt;
+    illegal</em></ins></span> to <span class="removed"><del><strong>the
+    public, so we can depend</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy</em></ins></span> on 
<span class="removed"><del><strong>each other.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users&lt;/a&gt;, because
+    this would require circumventing the iOS DRM.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A
+    &lt;a 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+      research paper&lt;/a&gt; that investigated</strong></del></span>
 
-  &lt;li id="M201709210"&gt;
-    &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201709210"&gt;
+    &lt;p&gt;In</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>latest iThings system,
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>security
+    of 283 Android VPN apps concluded that &ldquo;in spite 
of</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth</em></ins></span> the
+    <span class="removed"><del><strong>promises</strong></del></span> <span 
class="inserted"><ins><em>obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
-    them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    them off&mdash;only until 5am.  That's Apple</em></ins></span> for <span 
class="removed"><del><strong>privacy, security, and anonymity given by the
+    majority of VPN apps&mdash;millions of users may</strong></del></span> 
<span class="inserted"><ins><em>you&mdash;&ldquo;We
+    know you want to</em></ins></span> be <span 
class="removed"><del><strong>unawarely subject</strong></del></span> <span 
class="inserted"><ins><em>spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
-    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
-    no way</em></ins></span> to <span class="inserted"><ins><em>tell 
whether</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span class="inserted"><ins><em>phone is snooping 
on them.&lt;/p&gt;
+    fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no 
way</em></ins></span>
+    to <span class="removed"><del><strong>poor security guarantees and abusive 
practices inflicted by
+    VPN apps.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Following is a non-exhaustive list of proprietary VPN apps from
+    the research paper that tracks and infringes</strong></del></span> <span 
class="inserted"><ins><em>use it without having your fingerprints taken. Users 
would have
+    no way to tell whether</em></ins></span> the <span 
class="removed"><del><strong>privacy</strong></del></span> <span 
class="inserted"><ins><em>phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611170"&gt;
     &lt;p&gt;iPhones &lt;a
     
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/"&gt;send
-    lots</em></ins></span> of <span class="inserted"><ins><em>personal data to 
Apple's servers&lt;/a&gt;.  Big Brother can get
-    them from there.&lt;/p&gt;
+    lots</em></ins></span> of
+    <span class="removed"><del><strong>users:&lt;/p&gt;
+
+  &lt;dl&gt;
+    &lt;dt&gt;SurfEasy&lt;/dt&gt;
+    &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant</strong></del></span> <span class="inserted"><ins><em>personal 
data</em></ins></span> to <span class="removed"><del><strong>track users and 
show</strong></del></span> <span class="inserted"><ins><em>Apple's 
servers&lt;/a&gt;.  Big Brother can get</em></ins></span>
+    them <span class="removed"><del><strong>targeted ads.&lt;/dd&gt;
+
+    &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full 
access</strong></del></span> <span class="inserted"><ins><em>from 
there.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the <span class="removed"><del><strong>JS 
injection</strong></del></span> <span class="inserted"><ins><em>photos
-    and videos they make.&lt;/p&gt;
+    &lt;p&gt;iThings automatically upload</em></ins></span> to
+      <span class="removed"><del><strong>users' text messages.&lt;/dd&gt;
+
+    &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>Apple's servers all</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      for other apps</strong></del></span> <span 
class="inserted"><ins><em>photos</em></ins></span>
+    and <span class="removed"><del><strong>also core system logs. TigerVPN 
developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic to LinkedIn. Also, it</strong></del></span> <span 
class="inserted"><ins><em>videos they make.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library</em></ins></span> stores 
<span class="removed"><del><strong>detailed logs</strong></del></span> <span 
class="inserted"><ins><em>every photo</em></ins></span> and <span 
class="removed"><del><strong>may turn</strong></del></span> <span 
class="inserted"><ins><em>video you
+    take, and keeps</em></ins></span> them <span 
class="removed"><del><strong>over to the UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> to <span 
class="removed"><del><strong>the
+      users.</strong></del></span> <span class="inserted"><ins><em>date on all 
your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-    information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    information&lt;/a&gt; as accessed on 24 Sep 2015.)</em></ins></span> The 
<span class="removed"><del><strong>stated purpose of</strong></del></span> 
<span class="inserted"><ins><em>iCloud feature is
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>JS 
injection</strong></del></span>
+    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There</em></ins></span> is <span class="inserted"><ins><em>a 
way</em></ins></span> to <span class="removed"><del><strong>display
       ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
     <span class="inserted"><ins><em>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt; deactivate
     iCloud&lt;/a&gt;, but it's active by default so</em></ins></span> it <span 
class="removed"><del><strong>redirects the
-      user's traffic</strong></del></span> <span 
class="inserted"><ins><em>still counts as a
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
+
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that the non-premium version</strong></del></span> <span 
class="inserted"><ins><em>still counts as a
     surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of this to &lt;a
+    &lt;p&gt;Unknown people apparently took advantage</em></ins></span> of 
<span class="removed"><del><strong>the app does
+      JavaScript injection for tracking and display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>this to &lt;a
     
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-    nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-    security to get at them, but NSA can access any of them</em></ins></span> 
through <span class="removed"><del><strong>valueclick.com (an advertising
-      website).&lt;/dd&gt;
+    nude photos</em></ins></span> of <span class="removed"><del><strong>the 
top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. For 
+  the paid proprietary apps, it was only 60%.&lt;/p&gt;
 
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;The article confusingly describes gratis apps as 
&ldquo;free&rdquo;,</strong></del></span> <span class="inserted"><ins><em>many 
celebrities&lt;/a&gt;. They needed to break Apple's
+    security to get at them,</em></ins></span> but <span 
class="removed"><del><strong>most</strong></del></span> <span 
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span 
class="removed"><del><strong>are not in fact</strong></del></span> <span 
class="inserted"><ins><em>through</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201409220"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201409220"&gt;
     &lt;p&gt;Apple can, and regularly does, &lt;a
     
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-    remotely extract some data from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+    remotely extract some data from iPhones</em></ins></span> for <span 
class="removed"><del><strong>BART</strong></del></span> <span 
class="inserted"><ins><em>the state&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This may have improved with &lt;a
-    
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-    iOS 8 security improvements&lt;/a&gt;; but &lt;a
-    href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This may have improved with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they don't.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+    iOS 8 security improvements&lt;/a&gt;; but</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+    not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201407230"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo; of iOS seem to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  Here is the 
&lt;a
-    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Android apps can collude to transmit users' 
personal
+       data</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>exist
+    for no possible purpose other than surveillance&lt;/a&gt;.  Here is 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401100"&gt;
-    &lt;p&gt;The &lt;a class="not-a-duplicate"
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100"&gt;
+    &lt;p&gt;The</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where the iThing is, and
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either Apple helps the NSA snoop on all the data in an iThing, or it
-    is totally incompetent&lt;/a&gt;.&lt;/p&gt;
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing, 
or it</em></ins></span>
+    is <span class="removed"><del><strong>not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
     &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though that can be
+    tells Apple its geolocation&lt;/a&gt; by default, though</em></ins></span> 
that <span class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on</strong></del></span> 
<span class="inserted"><ins><em>can be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There is also a feature for web sites to track users, which is 
&lt;a
+    &lt;p&gt;There is also a feature for web sites to track</em></ins></span> 
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is &lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it is
-    still true in iOS 7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it <span class="inserted"><ins><em>is
+    still true</em></ins></span> in <span class="inserted"><ins><em>iOS 
7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
-    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary
-    to install even gratis apps&lt;/a&gt;) without giving a valid
-    email address and receiving the verification</em></ins></span> code <span 
class="removed"><del><strong>into HTML pages,</strong></del></span> <span 
class="inserted"><ins><em>Apple sends
+    &lt;p&gt;Users cannot make</em></ins></span> an <span 
class="removed"><del><strong>obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>Apple 
ID (&lt;a
+    
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>truly protect people's privacy, we 
must prevent Google</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
+    email address</em></ins></span> and <span 
class="removed"><del><strong>other companies</strong></del></span> <span 
class="inserted"><ins><em>receiving the verification code Apple sends
     to it.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -789,8 +832,9 @@
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what the &ldquo;consent&rdquo; was for.&lt;/p&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="removed"><del><strong>getting this personal information 
in</strong></del></span> <span class="inserted"><ins><em>Android 
phones&lt;/a&gt; while disguising
+    what</em></ins></span> the <span class="removed"><del><strong>first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
@@ -803,10 +847,12 @@
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609140"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;</em></ins></span>
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
@@ -818,90 +864,89 @@
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507030"&gt;
-    &lt;p&gt;Samsung phones come with &lt;a
-    
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
-    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed</strong></del></span> <span class="inserted"><ins><em>they 
send so much data</em></ins></span> that <span class="inserted"><ins><em>their
-    transmission is a substantial expense for users.  Said transmission,
-    not wanted or requested by</em></ins></span> the <span 
class="removed"><del><strong>non-premium version</strong></del></span> <span 
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
-    of <span class="removed"><del><strong>the app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>some 
kind.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found that 90% of</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-    Samsung's back door&lt;/a&gt; provides access to any file 
on</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
-  proprietary</strong></del></span> <span 
class="inserted"><ins><em>system.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201507030"&gt;
+    &lt;p&gt;Samsung phones come with</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
+    that users can't delete&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; 
of</strong></del></span> <span class="inserted"><ins><em>they send so much data 
that</em></ins></span> their <span class="removed"><del><strong>users with 
third parties.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>transmission is a substantial expense for 
users.  Said transmission,
+    not wanted or requested by the user, clearly must constitute spying
+    of some kind.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&ldquo;Cryptic 
communication,&rdquo; unrelated</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201403120"&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+    Samsung's back door&lt;/a&gt; provides access</em></ins></span> to <span 
class="inserted"><ins><em>any file on</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found</strong></del></span> <span class="inserted"><ins><em>system.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308010"&gt;
-    &lt;p&gt;Spyware in</em></ins></span> Android <span 
class="removed"><del><strong>apps contained recognizable tracking libraries. 
For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>phones 
(and Windows? laptops): The Wall Street
-    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>confusingly describes gratis apps as 
&ldquo;free&rdquo;,
-  but most of them are not in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always</strong></del></span> 
<span class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="removed"><del><strong>will fit
-  perfectly.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the 500 most popular gratis</strong></del></span> 
Android <span class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apps for BART</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-    the FBI</em></ins></span> can <span class="removed"><del><strong>only hope 
that they don't.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.</strong></del></span> 
<span class="inserted"><ins><em>phones (and Windows? 
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to 
say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;A study found 234</strong></del></span> <span 
class="inserted"><ins><em>remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps that track 
users by</strong></del></span> <span class="inserted"><ins><em>phones
-    and laptops&lt;/a&gt;.  (I suspect this means Windows laptops.)  Here 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;The</strong></del></span> <span class="inserted"><ins><em>Wall 
Street
+    Journal (in an</em></ins></span> article <span 
class="removed"><del><strong>takes for granted</strong></del></span> <span 
class="inserted"><ins><em>blocked from us by a paywall) 
reports</em></ins></span> that <span class="inserted"><ins><em>&lt;a
+    
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong as any other snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis</strong></del></span> <span 
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone 
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not 
&lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>phones</em></ins></span>
+    and <span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>laptops&lt;/a&gt;.  (I suspect this means Windows 
laptops.)  Here is &lt;a
+    href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201307280"&gt;
+    &lt;p&gt;Spyware</em></ins></span> is present in some Android devices when 
they are
+    sold.  Some Motorola <span class="removed"><del><strong>phones 
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when 
this company was owned
+    by Google, use a modified version of</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      <span class="removed"><del><strong>send</strong></del></span>
+    <span class="inserted"><ins><em>sends</em></ins></span> personal data to 
Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201307280"&gt;
-    &lt;p&gt;Spyware is present</em></ins></span> in <span 
class="removed"><del><strong>stores or played</strong></del></span> <span 
class="inserted"><ins><em>some Android devices when they are
-    sold.  Some Motorola phones, made when this company was 
owned</em></ins></span>
-    by <span class="removed"><del><strong>TV programs&lt;/a&gt;.
-       &lt;/p&gt;
-
-&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
 
-&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span> <span class="inserted"><ins><em>Google, 
use a modified version</em></ins></span> of Android <span 
class="removed"><del><strong>apps can collude to transmit 
users'</strong></del></span> <span class="inserted"><ins><em>that &lt;a
-    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends</em></ins></span> personal data to <span 
class="removed"><del><strong>servers.</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
     the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
-    legitimize actions like this.  At this point, most users have stopped
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span class="removed"><del><strong>place new items 
on top under each subsection --&gt;</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects on <span 
class="removed"><del><strong>users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>users, 
instead of
+    honestly identify the information it collects on users, instead of
     hiding it in an obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
@@ -942,17 +987,46 @@
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
     report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 <span class="removed"><del><strong>id="SpywareOnMobiles"&gt;Spyware 
on Mobiles&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInApplications"&gt;Spyware in 
Applications&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareIniThings"&gt;Spyware 
in iThings&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because</strong></del></span> <span class="inserted"><ins><em>identify who is 
running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that</em></ins></span> this
+      <span class="removed"><del><strong>would require 
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for 
repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -961,275 +1035,212 @@
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify the users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets that data at all.&lt;/p&gt;
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the
+      <span class="removed"><del><strong>obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way to use</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
+      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>will do
+    with</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal</strong></del></span> <span 
class="inserted"><ins><em>about a side issue. What the company does
+    with the</em></ins></span> data <span class="removed"><del><strong>to 
Apple's servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
 <span class="inserted"><ins><em>is</em></ins></span> a <span 
class="removed"><del><strong>server every phone number</strong></del></span> 
<span class="inserted"><ins><em>secondary issue. The principal wrong here 
is</em></ins></span> that
+    the <span class="removed"><del><strong>user types into it&lt;/a&gt;; the 
server records these numbers for</strong></del></span> <span 
class="inserted"><ins><em>company gets that data</em></ins></span> at <span 
class="removed"><del><strong>least 30
+        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of</em></ins></span> gratis <span 
class="removed"><del><strong>apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on</em></ins></span> the <span class="removed"><del><strong>code 
Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span class="removed"><del><strong>it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some</em></ins></span> of <span 
class="inserted"><ins><em>them send Facebook detailed information 
about</em></ins></span>
+    the <span class="removed"><del><strong>most popular 
iOS</strong></del></span> <span class="inserted"><ins><em>user's activities in 
the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Some Android</em></ins></span> apps &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that 
have deleted them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201808030"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record</em></ins></span> the <span class="removed"><del><strong>photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
-and</strong></del></span> <span class="inserted"><ins><em>turn off 
the</em></ins></span> other <span class="removed"><del><strong>companies from 
getting this personal information in</strong></del></span> <span 
class="inserted"><ins><em>kinds of location
-    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are other ways to turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>users'</strong></del></span> <span 
class="inserted"><ins><em>user's</em></ins></span> movements <span 
class="removed"><del><strong>without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> and <span 
class="removed"><del><strong>location tracking, you must
-    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is
-    <span class="removed"><del><strong>yet another example of nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>no 
way</em></ins></span> to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
-    a <span class="removed"><del><strong>thing would</strong></del></span> 
<span class="inserted"><ins><em>recording. But I can't</em></ins></span> be 
<span class="removed"><del><strong>almost
-    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sure from the article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More</em></ins></span> than <span 
class="removed"><del><strong>73%</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of the <span class="removed"><del><strong>most 
popular</strong></del></span> <span 
class="inserted"><ins><em>5,855</em></ins></span> Android apps
-  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>studied by 
researchers were found to snoop</em></ins></span>
-    and <span class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods</em></ins></span> of <span 
class="inserted"><ins><em>snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>up</strong></del></span> <span 
class="inserted"><ins><em>act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>date on all your 
devices.
+      Any edits</strong></del></span> <span class="inserted"><ins><em>save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
+
+    &lt;p&gt;If</em></ins></span> you <span class="removed"><del><strong>make 
are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect</em></ins></span> their <span 
class="inserted"><ins><em>privacy and freedom, Android</em></ins></span> users 
<span class="removed"><del><strong>with third parties.&lt;/p&gt;
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>learn to care 
much less about sports, you will benefit in
+    many ways. This</em></ins></span> is <span class="inserted"><ins><em>one 
more.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
-    <span class="inserted"><ins><em>need</em></ins></span> to <span 
class="inserted"><ins><em>get rid of</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span class="removed"><del><strong>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied</em></ins></span> by <span 
class="inserted"><ins><em>researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the
+      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>snooping, in these proprietary apps whose
+    source code they cannot look at.</em></ins></span>  The <span 
class="removed"><del><strong>term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article should not have described these</strong></del></span> 
<span class="inserted"><ins><em>proprietary</em></ins></span> apps <span 
class="removed"><del><strong>as
-  &ldquo;free&rdquo;&mdash;they are not</strong></del></span> <span 
class="inserted"><ins><em>by getting apps from the</em></ins></span> free <span 
class="removed"><del><strong>software.  The clear way to say
-  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &lt;p&gt;There</strong></del></span> <span class="inserted"><ins><em>other 
apps might be snooping
+    in other ways.&lt;/p&gt;
 
-  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what</strong></del></span> <span class="inserted"><ins><em>user if 
an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This</em></ins></span> is <span class="removed"><del><strong>a 
way</strong></del></span> <span class="inserted"><ins><em>evidence that 
proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need</em></ins></span> to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>get rid</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>break Apple's
+      security to get at them, but NSA can access any of them 
through</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which</em></ins></span> users are <span class="removed"><del><strong>doing 
or how.  &ldquo;Analytics&rdquo; tools</strong></del></span> <span 
class="inserted"><ins><em>HIV-positive, then provides the information to
+    which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so</em></ins></span> that <span 
class="removed"><del><strong>snoop are
-  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>users communicate such info to each</em></ins></span>
-    other <span class="removed"><del><strong>snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but</strong></del></span> <span 
class="inserted"><ins><em>but</em></ins></span> not <span 
class="removed"><del><strong>&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;)
-      connect</strong></del></span> to <span class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>the server's database.&lt;/p&gt;
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,</strong></del></span> 
<span class="inserted"><ins><em>dis-service
-    spy</em></ins></span> on <span class="removed"><del><strong>the 
average.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
even more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is 
present</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>some</strong></del></span> <span 
class="inserted"><ins><em>popular</em></ins></span> Android <span 
class="removed"><del><strong>devices when they are sold.</strong></del></span> 
<span class="inserted"><ins><em>apps
-    is pervasive and sometimes very clever.</em></ins></span> Some <span 
class="removed"><del><strong>Motorola phones modify Android 
to</strong></del></span> <span class="inserted"><ins><em>trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a
-      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow a user's movements around a physical store by noticing WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make 
it</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that</em></ins></span> this
-      <span class="removed"><del><strong>would require 
circumventing</strong></del></span> <span class="inserted"><ins><em>article 
misuses</em></ins></span> the <span class="removed"><del><strong>iOS 
DRM.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>words
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In the latest iThings 
system, &ldquo;turning off&rdquo; WiFi and Bluetooth the
-      obvious way</strong></del></span>
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent</em></ins></span> them <span 
class="removed"><del><strong>off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>and text messages and emails</em></ins></span> 
to <span class="removed"><del><strong>be spied on&rdquo;.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy; on the 
contrary,</em></ins></span> it <span class="removed"><del><strong>without 
having your fingerprints
-      taken. Users would have no way</strong></del></span>
-    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>phone 
is</strong></del></span> snooping <span class="removed"><del><strong>on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
-
-    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes nonfree Android 
apps, and
-    therefore shares in</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers</strong></del></span> 
<span class="inserted"><ins><em>responsibility</em></ins></span> for <span 
class="removed"><del><strong>at least 30
-        days.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="removed"><del><strong>valid email address</strong></del></span> <span 
class="inserted"><ins><em>better job of preventing apps from
+    &lt;p&gt;Could Google have done a better job of preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand the source code for these 
apps,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
-    the <span class="inserted"><ins><em>source</em></ins></span> code <span 
class="removed"><del><strong>Apple
-      sends</strong></del></span> <span 
class="inserted"><ins><em>somehow</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>determine whether they mistreat users in
-    various ways. If it did a good job</em></ins></span> of <span 
class="inserted"><ins><em>this, it could more or less
-    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>app developers are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers all</strong></del></span> <span 
class="inserted"><ins><em>outsmart</em></ins></span> the <span 
class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
-
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span class="removed"><del><strong>date on all 
your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
-
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-      startup</strong></del></span> <span class="inserted"><ins><em>protect 
us. We must demand release</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by 
default</strong></del></span> <span class="inserted"><ins><em>the
-    public,</em></ins></span> so <span class="removed"><del><strong>it still 
counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> <span class="inserted"><ins><em>we can depend on each 
other.&lt;/p&gt;
+    Google to protect us. We must demand release of source code to the
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one</em></ins></span> can <span 
class="removed"><del><strong>access any of them through</strong></del></span> 
<span class="inserted"><ins><em>only hope that they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
@@ -3079,7 +3090,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/23 16:59:17 $
+$Date: 2019/02/02 13:31:31 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary/po/proprietary-surveillance.de.po       23 Jan 2019 13:28:28 
-0000      1.253
+++ proprietary/po/proprietary-surveillance.de.po       2 Feb 2019 13:31:31 
-0000       1.254
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -211,6 +211,14 @@
 
 #. type: Content of: <div><div><ul><li><ul><li>
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">… in Anwendungssoftware</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -1792,6 +1800,44 @@
 msgstr " "
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr " "
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -1825,6 +1871,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
 "trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
 msgstr ""

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.364
retrieving revision 1.365
diff -u -b -r1.364 -r1.365
--- proprietary/po/proprietary-surveillance.fr.po       23 Jan 2019 13:34:36 
-0000      1.364
+++ proprietary/po/proprietary-surveillance.fr.po       2 Feb 2019 13:31:31 
-0000       1.365
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2019-01-23 14:34+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -162,6 +163,14 @@
 msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
 
 #. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
 
@@ -1347,6 +1356,46 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr "Applications mobiles"
 
@@ -1394,6 +1443,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
 "trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
 msgstr ""

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary-surveillance.it-diff.html        23 Jan 2019 
16:59:17 -0000      1.103
+++ proprietary/po/proprietary-surveillance.it-diff.html        2 Feb 2019 
13:31:32 -0000       1.104
@@ -117,24 +117,25 @@
   &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;Spyware in 
Applications&lt;/a&gt;</em></ins></span>
     &lt;ul&gt;
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;
-    &lt;!--</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInFirmware"&gt;Spyware in 
Firmware&lt;/a&gt;&lt;/li&gt; --&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;
-      &lt;li&gt;&lt;a 
href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;!--</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInFirmware"&gt;Spyware in 
Firmware&lt;/a&gt;&lt;/li&gt; --&gt;
+      &lt;/ul&gt;
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;Spyware at Work&lt;/a&gt;
+      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;/ul&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;Spyware at 
Work&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;</em></ins></span>
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;Spyware on the 
Road&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;</em></ins></span>
     &lt;ul&gt;
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;
-      &lt;/ul&gt;
-    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;TV 
Sets&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;Spyware on the 
Road&lt;/a&gt;
-      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;Cameras&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;Spyware in 
Cameras&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;Toys&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Drones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;Spyware in 
Cameras&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;TV 
Sets&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;Cameras&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
-    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;Other 
Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;Spyware at 
Home&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;Wearables&lt;/a&gt;</em></ins></span>
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;Toys&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;Spyware at 
Home&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Drones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareAtHome"&gt;Other 
Appliances&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareOnWearables"&gt;Wearables&lt;/a&gt;</em></ins></span>
         &lt;ul&gt;
           &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;Spyware in TV 
Sets&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; 
Watches&lt;/a&gt;&lt;/li&gt;</em></ins></span>
         &lt;/ul&gt;
@@ -233,8 +234,8 @@
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201712110"&gt;
-    &lt;p&gt;HP's proprietary operating system</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-42309371"&gt;includes
 a
+    &lt;p&gt;HP's proprietary operating system &lt;a
+    href="http://www.bbc.com/news/technology-42309371"&gt;includes a
     proprietary keyboard driver with a key logger in it&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -251,8 +252,8 @@
     &lt;p&gt;The &lt;a
     
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level"&gt;
     &ldquo;Full&rdquo; telemetry mode&lt;/a&gt; allows Microsoft Windows
-    engineers to access, among other things, registry keys &lt;a
-    href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
+    engineers to access, among other things, registry keys</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users"&gt;can</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://technet.microsoft.com/en-us/library/cc939702.aspx"&gt;which
     can contain sensitive information like administrator's login
     password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -484,7 +485,7 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-      Spotlight search&lt;/a&gt; sends users' search terms 
to</strong></del></span>
+      Spotlight search&lt;/a&gt; sends users' search 
terms</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410200"&gt;
     &lt;p&gt;Various operations in &lt;a
@@ -495,7 +496,7 @@
   &lt;li id="M201401101"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    Spotlight search&lt;/a&gt; sends users' search terms to</em></ins></span> 
Apple.&lt;/p&gt;
+    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1081,9 +1082,13 @@
       &lt;p&gt;If so, none of Facebook users' pictures are private
       anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -1094,40 +1099,55 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
-      2015</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding 
that</em></ins></span> it <span class="removed"><del><strong>&lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span class="inserted"><ins><em>notify 
the</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
-      are starting to realize that</strong></del></span> <span 
class="inserted"><ins><em>of what</em></ins></span> it <span 
class="removed"><del><strong>is nasty.&lt;/p&gt;
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;</em></ins></span>
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span class="removed"><del><strong>&lt;a
+    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as</strong></del></span> 
<span class="inserted"><ins><em>making unauthorized copies of nonfree software
+    is not</em></ins></span> a <span class="removed"><del><strong>way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>lawsuit</em></ins></span> is <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>attitude of the proprietary software industry 
towards
+      whether they want that. This is a typical example 
of</strong></del></span> <span class="inserted"><ins><em>cure 
for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps</strong></del></span> <span class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
+    apps</strong></del></span> the <span class="removed"><del><strong>user has
+    installed.</strong></del></span> <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The 
company</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span>
+    <span class="inserted"><ins><em>being sued, demanding that it notify the 
users of what it will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets</em></ins></span> that <span 
class="inserted"><ins><em>data</em></ins></span> at <span 
class="removed"><del><strong>least is visible</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -1139,72 +1159,55 @@
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="removed"><del><strong>snoop</strong></del></span> on <span 
class="inserted"><ins><em>Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps by 
the OS in the
-      phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>tricked</em></ins></span> by the <span 
class="removed"><del><strong>question of whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>data it obtains 
from</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities</em></ins></span> in the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless</em></ins></span> of whether the 
<span class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user 
has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>asked the user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="inserted"><ins><em>save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending it</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will benefit in
-    many ways.</em></ins></span> This <span class="removed"><del><strong>shows 
the
-      weakness</strong></del></span> <span class="inserted"><ins><em>is one 
more.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track</em></ins></span> the <span class="removed"><del><strong>user to
+      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>surveillance: why 
should a flashlight
-      app send any</strong></del></span> <span class="inserted"><ins><em>snoop
-    and collect</em></ins></span> information <span 
class="removed"><del><strong>to anyone?  A</strong></del></span> <span 
class="inserted"><ins><em>about its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>app 
developer but did not
+      ask about sending it to</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the</em></ins></span> free 
software <span class="removed"><del><strong>flashlight</strong></del></span>
-    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that &lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an</em></ins></span> app <span 
class="removed"><del><strong>would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>ways to turn off</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>other kinds</em></ins></span> of <span 
class="inserted"><ins><em>location
+    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1217,140 +1220,156 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which</em></ins></span> users <span class="removed"><del><strong>identify 
themselves and</strong></del></span> <span class="inserted"><ins><em>are 
HIV-positive,</em></ins></span> then <span class="removed"><del><strong>sends 
personal data about them to
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>to
       nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>provides</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>act as</em></ins></span> spies for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much</em></ins></span> information 
<span class="removed"><del><strong>on
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More</strong></del></span> about <span class="removed"><del><strong>NSA 
app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its users.
-    It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;</em></ins></span>
+      More</strong></del></span> <span class="inserted"><ins><em>care much 
less</em></ins></span> about <span class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>moviepass 
app</em></ins></span> and <span class="removed"><del><strong>i-Que 
transmit</strong></del></span> <span class="inserted"><ins><em>dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> a <span 
class="removed"><del><strong>speech recognition company 
based</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>popular Android 
apps
-    is pervasive and sometimes very clever. Some trackers</em></ins></span> 
can <span class="removed"><del><strong>remotely control the toys 
with</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow</em></ins></span> a <span class="removed"><del><strong>mobile 
phone. This would
-      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>user's movements around</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span class="removed"><del><strong>toys with a 
mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech,</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>even speak
+      into</strong></del></span> <span class="inserted"><ins><em>collect 
information about its users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
+  &lt;li&gt;
     &lt;p&gt;A computerized vibrator
       &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+       was snooping</strong></del></span> <span class="inserted"><ins><em>apps 
were
+    found to insecurely snitch</em></ins></span> on its <span 
class="removed"><del><strong>users through the</strong></del></span> <span 
class="inserted"><ins><em>users.  Furthermore, they could
+    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Sarahah</em></ins></span> app 
<span class="removed"><del><strong>was reporting the temperature of the 
vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android</em></ins></span> by <span class="removed"><del><strong>a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>&lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>changed.&lt;/p&gt;
+      their products, rather than</strong></del></span> free software <span 
class="removed"><del><strong>which users could have
+      checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>words
-    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;
+    &lt;p&gt;The company</strong></del></span>
+    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt;</em></ins></span> that 
<span class="removed"><del><strong>made the vibrator</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects</em></ins></span> information about <span 
class="removed"><del><strong>how
        people used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>information</em></ins></span> to <span 
class="removed"><del><strong>a
+      data broker, the data broker would</strong></del></span>
+    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; 
on</em></ins></span> the <span class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>had sold the data</strong></del></span>
-    <span class="inserted"><ins><em>worked in various ways</em></ins></span> 
to <span class="removed"><del><strong>a
-      data broker,</strong></del></span> <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>data broker 
would have been able to figure out
-      who</strong></del></span> <span class="inserted"><ins><em>snooping of 
these apps.&lt;/p&gt;
+    &lt;p&gt;Grindr should not</em></ins></span> have <span 
class="removed"><del><strong>been able</strong></del></span> <span 
class="inserted"><ins><em>so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who</strong></del></span> the <span class="removed"><del><strong>user 
was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>user 
was.&lt;/p&gt;
+  &lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> a <span 
class="removed"><del><strong>total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps, and
-    therefore shares in</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>responsibility for 
the injustice</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to</strong></del></span> <span class="inserted"><ins><em>their being
-    nonfree. It also distributes</em></ins></span> its <span 
class="removed"><del><strong>customers.&lt;/p&gt;
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span> <span 
class="inserted"><ins><em>own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
 
-    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="inserted"><ins><em>better job of preventing apps from
-    cheating? There is no systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
-    to <span class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="inserted"><ins><em>study</em></ins></span>
-    the <span class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>source code somehow to determine whether they 
mistreat users in
-    various ways. If it did a good job of this, it</em></ins></span> could 
<span class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>more or less
-    prevent such snooping, except when the app developers are clever
-    enough</em></ins></span> to <span class="removed"><del><strong>these 
conversations
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow</em></ins></span> a <span class="removed"><del><strong>way to 
access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user's movements around a physical store by noticing 
WiFi
+    networks&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers</em></ins></span> and <span 
class="inserted"><ins><em>email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article 
misuses</em></ins></span> the <span class="removed"><del><strong>FBI could 
listen</strong></del></span> <span class="inserted"><ins><em>words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring</em></ins></span> to <span class="removed"><del><strong>these 
conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>outsmart the 
checking.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>zero price.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>the
-    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>sent them and text messages and 
emails</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1360,59 +1379,71 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the contrary, it
+    worked</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>various ways to prevent that, and deleted these apps 
after
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
+
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Could Google have done a better job of preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand the source code for these 
apps,</em></ins></span> and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> <span 
class="inserted"><ins><em>study</em></ins></span>
+    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used</strong></del></span> <span class="inserted"><ins><em>source code somehow 
to determine whether they mistreat users in
+    various ways. If it</em></ins></span> did <span 
class="removed"><del><strong>not affect
+GNU/Linux; also,</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean</strong></del></span> <span class="inserted"><ins><em>good job of this, 
it could more or less
+    prevent such snooping, except when the app developers are clever
+    enough to outsmart the checking.&lt;/p&gt;
+
+    &lt;p&gt;But</em></ins></span> since <span 
class="removed"><del><strong>&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google itself develops malicious apps, we cannot trust
+    Google</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release of source code to 
the
+    public, so we can depend on</em></ins></span> each <span 
class="removed"><del><strong>subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
-Note</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>the 
specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop on users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1427,13 +1458,24 @@
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    the app to snoop</em></ins></span> at <span 
class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span 
class="inserted"><ins><em>all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
-    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    to transmit users' personal data to servers.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2873,7 +2915,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/23 16:59:17 $
+$Date: 2019/02/02 13:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary/po/proprietary-surveillance.it.po       23 Jan 2019 13:28:28 
-0000      1.266
+++ proprietary/po/proprietary-surveillance.it.po       2 Feb 2019 13:31:32 
-0000       1.267
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -197,6 +197,14 @@
 
 #. type: Content of: <div><div><ul><li><ul><li>
 # | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
 # | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -1727,6 +1735,46 @@
 "\">#SpywareIniThings</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -1762,6 +1810,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
 "trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
 msgstr ""

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary/po/proprietary-surveillance.ja-diff.html        23 Jan 2019 
16:59:18 -0000      1.113
+++ proprietary/po/proprietary-surveillance.ja-diff.html        2 Feb 2019 
13:31:32 -0000       1.114
@@ -117,24 +117,25 @@
   &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtLowLevel"&gt;Spyware at Low 
Level&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInApplications"&gt;Spyware in 
Applications&lt;/a&gt;</em></ins></span>
     &lt;ul&gt;
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/a&gt;&lt;/li&gt;
-    &lt;!--</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInFirmware"&gt;Spyware in 
Firmware&lt;/a&gt;&lt;/li&gt; --&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;
-      &lt;li&gt;&lt;a 
href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;!--</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDesktopApps"&gt;Desktop 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInFirmware"&gt;Spyware in 
Firmware&lt;/a&gt;&lt;/li&gt; --&gt;
+      &lt;/ul&gt;
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;Mobile 
Apps&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;Spyware at Work&lt;/a&gt;
+      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;Skype&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInGames"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;/ul&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtWork"&gt;Spyware at 
Work&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;</em></ins></span>
+  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;Spyware on the 
Road&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;Spyware in Connected 
Equipment&lt;/a&gt;</em></ins></span>
     &lt;ul&gt;
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;Spyware in 
Skype&lt;/a&gt;&lt;/li&gt;
-      &lt;/ul&gt;
-    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;TV 
Sets&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareOnTheRoad"&gt;Spyware on the 
Road&lt;/a&gt;
-      &lt;ul&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;Cameras&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;Spyware in 
Cameras&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;Toys&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Drones&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInCameras"&gt;Spyware in 
Cameras&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInTVSets"&gt;TV 
Sets&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;Cameras&lt;/a&gt;&lt;/li&gt;</em></ins></span>
       &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/a&gt;&lt;/li&gt;
       &lt;/ul&gt;
-    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;Other 
Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;Spyware at 
Home&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;Wearables&lt;/a&gt;</em></ins></span>
+    &lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;Toys&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+      &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;Spyware at 
Home&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;Drones&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a href="#SpywareAtHome"&gt;Other 
Appliances&lt;/a&gt;&lt;/li&gt;
+      &lt;li&gt;&lt;a 
href="#SpywareOnWearables"&gt;Wearables&lt;/a&gt;</em></ins></span>
         &lt;ul&gt;
           &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;Spyware in TV 
Sets&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; 
Watches&lt;/a&gt;&lt;/li&gt;</em></ins></span>
         &lt;/ul&gt;
@@ -251,7 +252,7 @@
 &lt;li&gt;In order to increase</strong></del></span> Windows <span 
class="removed"><del><strong>10's install base, Microsoft</strong></del></span> 
<span class="inserted"><ins><em>10, called the
     &ldquo;Creators Update,&rdquo; Windows maximized the 
surveillance</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-blatantly disregards user choice</strong></del></span>
+blatantly disregards user</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law"&gt;
     by force setting the telemetry mode to 
&ldquo;Full&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
@@ -281,7 +282,7 @@
   &lt;li id="M201608171"&gt;
     &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-    blatantly disregards user choice</em></ins></span> and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    blatantly disregards user</em></ins></span> choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
@@ -464,9 +465,9 @@
       the latest</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410300"&gt;
-    &lt;p&gt;</em></ins></span> MacOS <span class="removed"><del><strong>send 
reports to Apple&lt;/a&gt; servers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>automatically &lt;a
+    &lt;p&gt;</em></ins></span> MacOS <span class="removed"><del><strong>send 
reports</strong></del></span> <span class="inserted"><ins><em>automatically 
&lt;a
     
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-    sends to Apple servers unsaved documents being edited&lt;/a&gt;. The
+    sends</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>Apple 
servers unsaved documents being edited&lt;/a&gt;. The
     things you have not decided to save are &lt;a
     
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
     even more sensitive&lt;/a&gt; than the things you have stored in 
files.&lt;/p&gt;</em></ins></span>
@@ -568,10 +569,9 @@
       Some Motorola phones modify Android</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510050"&gt;
-    &lt;p&gt;According</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal</strong></del></span> <span 
class="inserted"><ins><em>Edward Snowden, &lt;a
-    href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take over
+    &lt;p&gt;According</em></ins></span> to <span 
class="inserted"><ins><em>Edward Snowden,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over
     smartphones&lt;/a&gt; by sending hidden text messages which enable
     them to turn the phones on and off, listen to the microphone,
     retrieve geo-location</em></ins></span> data <span 
class="inserted"><ins><em>from the GPS, take photographs, read
@@ -674,10 +674,10 @@
   behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509240"&gt;
-    &lt;p&gt;iThings</em></ins></span> automatically upload to Apple's servers 
all the photos
+    &lt;p&gt;iThings automatically upload to Apple's servers 
all</em></ins></span> the photos
     and videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
@@ -913,7 +913,9 @@
     the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
         &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>personal 
details of users that install</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance is inadequate as a protection against massive
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a 
protection against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -921,9 +923,7 @@
       all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> <span 
class="inserted"><ins><em>not enough to
     legitimize actions like this.  At this point, most users have stopped
     reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="removed"><del><strong>include 
       &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
@@ -982,9 +982,11 @@
       &lt;p&gt;If so, none of Facebook users' pictures are private
       anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
@@ -995,40 +997,56 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInDesktopApps"&gt;Desktop Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDesktopApps"&gt;#SpywareInDesktopApps&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
-      2015</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding 
that</em></ins></span> it <span class="removed"><del><strong>&lt;a
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
+      2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded</strong></del></span> <span class="inserted"><ins><em>notify 
the</em></ins></span> users <span class="removed"><del><strong>submit to 
increased snooping&lt;/a&gt;, and some
-      are starting to realize that</strong></del></span> <span 
class="inserted"><ins><em>of what</em></ins></span> it <span 
class="removed"><del><strong>is nasty.&lt;/p&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and some
+      are starting to realize</strong></del></span> <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
 
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span class="removed"><del><strong>&lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;I think</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
+    &lt;p&gt;This <span class="removed"><del><strong>article shows the &lt;a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>lawsuit</em></ins></span> is <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>side issue. What</em></ins></span> the <span 
class="removed"><del><strong>attitude of the proprietary software industry 
towards
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps</strong></del></span> <span class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>doing this in</strong></del></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
+    apps</strong></del></span> the <span class="removed"><del><strong>user has
+    installed.</strong></del></span> <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The 
company</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span>
+    <span class="inserted"><ins><em>being sued, demanding that it notify the 
users of what it will do
+    with the data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets</em></ins></span> that <span 
class="inserted"><ins><em>data</em></ins></span> at <span 
class="removed"><del><strong>least is visible</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -1040,151 +1058,166 @@
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google</em></ins></span> apps <span 
class="removed"><del><strong>snoop</strong></del></span> on <span 
class="inserted"><ins><em>Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>data it obtains 
from</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities</em></ins></span> in the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps by 
the OS in the
-      phone.&lt;/p&gt;
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>question of</strong></del></span> <span 
class="inserted"><ins><em>user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will</em></ins></span> be <span 
class="removed"><del><strong>distracted</strong></del></span> <span 
class="inserted"><ins><em>tricked</em></ins></span> by the <span 
class="removed"><del><strong>question of whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless of</em></ins></span> whether the 
<span class="removed"><del><strong>app developers get</strong></del></span> 
<span class="inserted"><ins><em>user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of</em></ins></span> users <span 
class="removed"><del><strong>to say &ldquo;I agree&rdquo;. That is no excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal data to the 
app developer but did not
-      ask</strong></del></span> <span class="inserted"><ins><em>care much 
less</em></ins></span> about <span class="removed"><del><strong>sending it to 
other companies.</strong></del></span> <span class="inserted"><ins><em>sports, 
you will benefit in
-    many ways.</em></ins></span> This <span class="removed"><del><strong>shows 
the
-      weakness</strong></del></span> <span class="inserted"><ins><em>is one 
more.&lt;/p&gt;
-  &lt;/li&gt;
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>surveillance: why 
should a flashlight
-      app send any</strong></del></span> <span class="inserted"><ins><em>snoop
-    and collect</em></ins></span> information <span 
class="inserted"><ins><em>about its users&lt;/a&gt;.  40% of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>anyone?  A 
free software flashlight
-      app would not.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending it to</strong></del></span> other <span 
class="removed"><del><strong>companies.  This shows the
+      weakness</strong></del></span> <span 
class="inserted"><ins><em>kinds</em></ins></span> of <span 
class="inserted"><ins><em>location
+    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, they 
could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span> <span 
class="inserted"><ins><em>these</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span> <span 
class="inserted"><ins><em>apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>freedom, Android 
users
-    need</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>get rid of the proprietary software&mdash;both 
proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and the <span class="removed"><del><strong>NSA takes advantage to spy 
through it too&lt;/a&gt;.
-      Here's information on</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps from the free 
software
-    only</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>act as</em></ins></span> spies for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      More</strong></del></span> <span class="inserted"><ins><em>care much 
less</em></ins></span> about <span class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="removed"><del><strong>makes 
internet-controlled vibrators</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots of personal</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects</em></ins></span> information about <span 
class="removed"><del><strong>how
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
+    of <span class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were 
found to snoop
+    and collect</em></ins></span> information about <span 
class="removed"><del><strong>how
     people use it&lt;/a&gt;.&lt;/p&gt;
 
-       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>data may</strong></del></span> <span 
class="inserted"><ins><em>information to
-    companies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could</em></ins></span> be
-        <span class="removed"><del><strong>true,</strong></del></span> <span 
class="inserted"><ins><em>designed so that users communicate such info to each
-    other</em></ins></span> but <span class="removed"><del><strong>it doesn't 
really matter. If it sells the data</strong></del></span> <span 
class="inserted"><ins><em>not</em></ins></span> to <span 
class="removed"><del><strong>a
-        data broker, the data broker can figure out who</strong></del></span> 
the <span class="removed"><del><strong>user is.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>server's database.&lt;/p&gt;</em></ins></span>
+       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span> <span class="inserted"><ins><em>its 
users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>data may be
+        true, but it doesn't really matter. If it sells the 
data</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>a
+        data broker, the data broker can figure out who the user is.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
-        on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>moviepass</em></ins></span> 
app <span class="removed"><del><strong>reports the temperature of the vibrator 
minute by
-      minute (thus, indirectly, whether it is surrounded by a person's
-      body),</strong></del></span> and <span class="removed"><del><strong>the 
vibration frequency.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
 <span class="inserted"><ins><em>insecurely snitch</em></ins></span> on its 
<span class="removed"><del><strong>users through the</strong></del></span> 
<span class="inserted"><ins><em>users.  Furthermore, they could
+    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      &lt;p&gt;The app reports the temperature</strong></del></span> <span 
class="inserted"><ins><em>apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
+
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it is surrounded</strong></del></span> 
<span class="inserted"><ins><em>proprietary software&mdash;both proprietary
+    Android</em></ins></span> by <span class="removed"><del><strong>a person's
+      body),</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and the <span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
-      their products, rather</strong></del></span> <span 
class="inserted"><ins><em>dis-service
-    spy on users even more</em></ins></span> than <span 
class="removed"><del><strong>free software which</strong></del></span> users 
<span class="removed"><del><strong>can check
-      and change.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after</em></ins></span> going to <span 
class="removed"><del><strong>spy on children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a movie&lt;/a&gt;.&lt;/p&gt;
+      their products, rather than</strong></del></span> free software <span 
class="removed"><del><strong>which users can check
+      and change.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that &lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not</em></ins></span> to <span class="inserted"><ins><em>the 
server's database.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  &lt;li id="M201803050"&gt;
+    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
+    spy on <span class="removed"><del><strong>children</strong></del></span> 
<span class="inserted"><ins><em>users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>after going</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1194,45 +1227,40 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>a movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
+  &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
-    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-    follow a user's movements around a physical store by noticing WiFi
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
+    is pervasive</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    follow</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user's 
movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app &lt;a
-    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
-    book to developer's server.</em></ins></span>  Note that <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo 
used</strong></del></span> <span class="inserted"><ins><em>words
-    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded &lt;a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google</em></ins></span> did not <span 
class="removed"><del><strong>affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt;</em></ins></span> 
in <span class="removed"><del><strong>its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>intend</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user's address
+    book</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -1246,91 +1274,107 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>the contrary,</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span>
-    <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these apps after
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that this article 
misuses</em></ins></span> the <span class="inserted"><ins><em>words
+    &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+    referring to zero price.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and</em></ins></span> emails <span 
class="removed"><del><strong>of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>to snoopers&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Google did not intend to make these apps spy; on the 
contrary,</em></ins></span> it <span class="removed"><del><strong>through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="removed"><del><strong>Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>various ways to prevent that, and deleted these apps 
after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice</em></ins></span> 
of <span class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    therefore shares</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what</em></ins></span> they 
<span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
+    cheating? There is no systematic way</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>Google, or Android users,</em></ins></span>
+    to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>inspect executable 
proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat 
users</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP 
phones:</strong></del></span>
-    <span class="inserted"><ins><em>various ways. If it did a good job of 
this, it could more or less
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    &lt;p&gt;Apps for BART &lt;a
+    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+  &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
+    to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
     how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> <span class="inserted"><ins><em>its 
headphones&lt;/a&gt;.  Specifically,
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
-    would that</em></ins></span> make <span 
class="removed"><del><strong>sure</strong></del></span> <span 
class="inserted"><ins><em>it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>design
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1344,10 +1388,8 @@
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;</strong></del></span> <span 
class="inserted"><ins><em>some of its phones. The app will give Verizon the 
same information
+    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
+    on some of its phones. The app will give Verizon the same information
     about the users' searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
@@ -1678,8 +1720,8 @@
 
 
 
-&lt;div class="big-section"&gt;</em></ins></span>
-  &lt;h3 <span 
class="removed"><del><strong>id="SpywareOnTheRoad"&gt;Spyware</strong></del></span>
 <span class="inserted"><ins><em>id="SpywareInEquipment"&gt;Spyware in 
Connected Equipment&lt;/h3&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2727,7 +2769,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/23 16:59:18 $
+$Date: 2019/02/02 13:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary/po/proprietary-surveillance.ja.po       23 Jan 2019 13:28:28 
-0000      1.239
+++ proprietary/po/proprietary-surveillance.ja.po       2 Feb 2019 13:31:32 
-0000       1.240
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -171,6 +171,12 @@
 #. type: Content of: <div><div><ul><li><ul><li>
 #, fuzzy
 #| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a 
href=\"#SpywareInMobileApps\">モバイル・アプリのスパイウェア</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a 
href=\"#SpywareInMobileApps\">モバイル・アプリのスパイウェア</a>"
 
@@ -1436,6 +1442,43 @@
 "\">#SpywareIniThings</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -1471,6 +1514,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
 "trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
 msgstr ""

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary/po/proprietary-surveillance.pot 23 Jan 2019 13:28:28 -0000      
1.187
+++ proprietary/po/proprietary-surveillance.pot 2 Feb 2019 13:31:32 -0000       
1.188
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -133,6 +133,10 @@
 msgstr ""
 
 #. type: Content of: <div><div><ul><li><ul><li>
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li>
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr ""
 
@@ -951,6 +955,37 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a "
+"href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a "
+"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\";>
 "
+"reports information to identify who is running it</a>. The result is often a "
+"legal threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -985,6 +1020,26 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a "
+"href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\";>
 "
+"report on the user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various "
+"apps. Some of them send Facebook detailed information about the user's "
+"activities in the app; others only say that the user is using that app, but "
+"that alone is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "This spying occurs regardless of whether the user has a Facebook 
account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Android apps <a "
 
"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\";> 
"
 "track the phones of users that have deleted them</a>."

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.456
retrieving revision 1.457
diff -u -b -r1.456 -r1.457
--- proprietary/po/proprietary-surveillance.ru.po       23 Jan 2019 17:29:24 
-0000      1.456
+++ proprietary/po/proprietary-surveillance.ru.po       2 Feb 2019 13:31:32 
-0000       1.457
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -158,6 +159,14 @@
 msgstr "<a href=\"#SpywareInMobileApps\">Прикладные 
программы</a>"
 
 #. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Мобильные 
приложения</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a href=\"#SpywareInMobileApps\">Мобильные 
приложения</a>"
 
@@ -1335,6 +1344,46 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr "Мобильные приложения"
 
@@ -1381,6 +1430,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-";
 "trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
 msgstr ""

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary.de-diff.html     28 Jan 2019 09:29:57 -0000      
1.38
+++ proprietary/po/proprietary.de-diff.html     2 Feb 2019 13:31:32 -0000       
1.39
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -183,6 +183,35 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901110"&gt;
     &lt;p&gt;Samsung phones come preloaded with &lt;a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
@@ -197,43 +226,6 @@
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
     are going one step further in their hijacking of users' devices.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
-    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612290"&gt;
-    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
-    a high score. The player gets coins at the end of each game, and can
-    buy more coins with real money.&lt;/p&gt;
-
-    &lt;p&gt;Getting a higher score once leads the player to desire higher
-    score again later. But the higher score resulting from the boost &lt;a
-    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
-    not give the player more coins, and does not help the player get
-    a higher score in subsequent games&lt;/a&gt;. To get that, the player
-    will need a boost frequently, and usually has to pay real money
-    for that. Since boosts are exciting and entertaining, the player is
-    subtly pushed to purchase more coins with real money to get boosts,
-    and it can develop into a costly habit.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612140"&gt;
-    &lt;p&gt;The Microsoft Telemetry Compatibility service &lt;a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
-    drastically reduces the performances of machines running
-    Windows&nbsp;10&lt;/a&gt;, and can't be disabled easily.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt; which save it
-    permanently.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -294,7 +286,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary.de.po    28 Jan 2019 09:29:57 -0000      1.80
+++ proprietary/po/proprietary.de.po    2 Feb 2019 13:31:32 -0000       1.81
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,66 +431,64 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
+"one step further in their hijacking of users' devices."
 msgstr ""
 
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary.es.po    29 Jan 2019 11:32:57 -0000      1.88
+++ proprietary/po/proprietary.es.po    2 Feb 2019 13:31:32 -0000       1.89
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2019-01-29 12:26+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -298,6 +299,48 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
 "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
 "facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -329,77 +372,6 @@
 "facebook\">among others</a>) están dando un paso más en su secuestro de los 
"
 "dispositivos de los usuarios."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a href="
-"\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/";
-"twitter-location-data-gps-privacy/\">enviaba la localización GPS precisa al "
-"servidor de Twitter</a>. Este conserva aún esas localizaciones GPS."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"En el juego Fruit Pop, el jugador compra poderes con monedas para obtener "
-"una puntuación más alta. El jugador consigue monedas al final de cada 
juego, "
-"y puede comprar más monedas con dinero real."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"La obtención en una ocasión de una puntuación más alta lleva al jugador a 
"
-"desear luego una puntuación más alta aún. Pero la puntuación mayor "
-"resultante de los poderes adquiridos <a href=\"https://qz.com/873348/50000-";
-"coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-"
-"understanding-of-basic-economic-ideas/\">no le proporciona al jugador más "
-"monedas, y no le ayuda a obtener puntuaciones más altas en las siguientes "
-"jugadas</a>. Para lograrlo necesitará poderes con frecuencia, y "
-"habitualmente tiene que pagar para ello dinero real. Como los poderes son "
-"excitantes y divertidos, el jugador se ve sutilmente incitado a comprar más "
-"monedas con dinero real para así obtener poderes, con lo cual esto puede "
-"convertirse en costoso hábito."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"El servicio de Compatibilidad de Telemetría de Microsoft  <a href=\"https://";
-"answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
-"telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
-"tab=AllReplies#tabs\">reduce drásticamente el rendimiento de los ordenadores 
"
-"con Windows&nbsp;10</a>, y no puede deshabilitarse con facilidad."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www.";
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
-"\">envían la señal de vídeo que capturan a los servidores de Amazon</a>, 
que "
-"la guardan de forma permanente."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -479,6 +451,75 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a 
href="
+#~ "\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/";
+#~ "story/twitter-location-data-gps-privacy/\">enviaba la localización GPS "
+#~ "precisa al servidor de Twitter</a>. Este conserva aún esas localizaciones 
"
+#~ "GPS."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "En el juego Fruit Pop, el jugador compra poderes con monedas para obtener "
+#~ "una puntuación más alta. El jugador consigue monedas al final de cada "
+#~ "juego, y puede comprar más monedas con dinero real."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz.";
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "La obtención en una ocasión de una puntuación más alta lleva al 
jugador a "
+#~ "desear luego una puntuación más alta aún. Pero la puntuación mayor "
+#~ "resultante de los poderes adquiridos <a href=\"https://qz.";
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">no le proporciona "
+#~ "al jugador más monedas, y no le ayuda a obtener puntuaciones más altas 
en "
+#~ "las siguientes jugadas</a>. Para lograrlo necesitará poderes con "
+#~ "frecuencia, y habitualmente tiene que pagar para ello dinero real. Como "
+#~ "los poderes son excitantes y divertidos, el jugador se ve sutilmente "
+#~ "incitado a comprar más monedas con dinero real para así obtener poderes, 
"
+#~ "con lo cual esto puede convertirse en costoso hábito."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows&nbsp;10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "El servicio de Compatibilidad de Telemetría de Microsoft  <a href="
+#~ "\"https://answers.microsoft.com/en-us/windows/forum/windows_10-";
+#~ "performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-"
+#~ "aef6-2d5f01bb38f2?tab=AllReplies#tabs\">reduce drásticamente el "
+#~ "rendimiento de los ordenadores con Windows&nbsp;10</a>, y no puede "
+#~ "deshabilitarse con facilidad."
+
+#~ msgid ""
+#~ "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www.";
+#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\">envían la señal de vídeo que capturan a los servidores de 
Amazon</a>, "
+#~ "que la guardan de forma permanente."
+
+#~ msgid ""
 #~ "The Weather Channel app <a href=\"https://www.theguardian.com/";
 #~ "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"
 #~ "\"> stored users' locations to the company's server</a>. The company is "

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/proprietary.fr.po    28 Jan 2019 13:53:33 -0000      1.110
+++ proprietary/po/proprietary.fr.po    2 Feb 2019 13:31:32 -0000       1.111
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2019-01-28 14:33+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,48 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
 "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
 "facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -325,75 +368,6 @@
 "facebook\">parmi d'autres</a>) vont encore plus loin dans le piratage des "
 "appareils des utilisateurs."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"Jusqu'en 2015, les tweets géolocalisés <a 
href=\"http://web-old.archive.org/";
-"web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-";
-"privacy/\">envoyaient les coordonnées GPS précises au serveur de Twitter</"
-"a>. Ils contiennent toujours ces coordonnées."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"Dans le jeu Fruit Pop, le joueur achète des améliorations avec des pièces "
-"pour obtenir un meilleur score. Il récupère des pièces à la fin de chaque 
"
-"partie et peut en acheter d'autres avec de l'argent réel."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"Un bon score lors d'une partie pousse le joueur à vouloir faire plus, à se "
-"surpasser. Mais le score plus élevé obtenu grâce à l'amélioration <a 
href="
-"\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-";
-"purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">ne donne "
-"pas plus de pièces et n'aide pas le joueur à obtenir un meilleur score dans 
"
-"les parties suivantes.</a> Pour cela il aura souvent besoin d'une "
-"amélioration qu'il devra généralement payer. Puisque les améliorations 
sont "
-"amusantes et excitantes, il est subtilement poussé à l'achat de pièces 
pour "
-"en obtenir plus, ce qui peut devenir coûteux à la longue."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"Le service <cite>Microsoft Telemetry Compatibility</cite> <a href=\"https://";
-"answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
-"telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
-"tab=AllReplies#tabs\">réduit considérablement les performances des machines 
"
-"sous Windows 10</a> et ne peut pas être désactivé facilement."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
-"leurs enregistrements vidéo aux serveurs d'Amazon</a> qui les sauvegardent "
-"de façon permanente."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -467,3 +441,70 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "Jusqu'en 2015, les tweets géolocalisés <a href=\"http://web-old.archive.";
+#~ "org/web/20190115233002/https://www.wired.com/story/twitter-location-data-";
+#~ "gps-privacy/\">envoyaient les coordonnées GPS précises au serveur de "
+#~ "Twitter</a>. Ils contiennent toujours ces coordonnées."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "Dans le jeu Fruit Pop, le joueur achète des améliorations avec des 
pièces "
+#~ "pour obtenir un meilleur score. Il récupère des pièces à la fin de 
chaque "
+#~ "partie et peut en acheter d'autres avec de l'argent réel."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz.";
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "Un bon score lors d'une partie pousse le joueur à vouloir faire plus, à "
+#~ "se surpasser. Mais le score plus élevé obtenu grâce à l'amélioration 
<a "
+#~ "href=\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-";
+#~ "purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">ne "
+#~ "donne pas plus de pièces et n'aide pas le joueur à obtenir un meilleur "
+#~ "score dans les parties suivantes.</a> Pour cela il aura souvent besoin "
+#~ "d'une amélioration qu'il devra généralement payer. Puisque les "
+#~ "améliorations sont amusantes et excitantes, il est subtilement poussé à 
"
+#~ "l'achat de pièces pour en obtenir plus, ce qui peut devenir coûteux à 
la "
+#~ "longue."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows&nbsp;10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "Le service <cite>Microsoft Telemetry Compatibility</cite> <a href="
+#~ "\"https://answers.microsoft.com/en-us/windows/forum/windows_10-";
+#~ "performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-"
+#~ "aef6-2d5f01bb38f2?tab=AllReplies#tabs\">réduit considérablement les "
+#~ "performances des machines sous Windows 10</a> et ne peut pas être "
+#~ "désactivé facilement."
+
+#~ msgid ""
+#~ "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Les dispositifs de « sécurité » de Ring <a 
href=\"https://www.engadget.";
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\">envoient leurs enregistrements vidéo aux serveurs d'Amazon</a> qui les 
"
+#~ "sauvegardent de façon permanente."

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/proprietary.it-diff.html     28 Jan 2019 09:29:57 -0000      
1.50
+++ proprietary/po/proprietary.it-diff.html     2 Feb 2019 13:31:32 -0000       
1.51
@@ -45,14 +45,14 @@
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -182,6 +182,35 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901110"&gt;
     &lt;p&gt;Samsung phones come preloaded with &lt;a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
@@ -196,43 +225,6 @@
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
     are going one step further in their hijacking of users' devices.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
-    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612290"&gt;
-    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
-    a high score. The player gets coins at the end of each game, and can
-    buy more coins with real money.&lt;/p&gt;
-
-    &lt;p&gt;Getting a higher score once leads the player to desire higher
-    score again later. But the higher score resulting from the boost &lt;a
-    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
-    not give the player more coins, and does not help the player get
-    a higher score in subsequent games&lt;/a&gt;. To get that, the player
-    will need a boost frequently, and usually has to pay real money
-    for that. Since boosts are exciting and entertaining, the player is
-    subtly pushed to purchase more coins with real money to get boosts,
-    and it can develop into a costly habit.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612140"&gt;
-    &lt;p&gt;The Microsoft Telemetry Compatibility service &lt;a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
-    drastically reduces the performances of machines running
-    Windows&nbsp;10&lt;/a&gt;, and can't be disabled easily.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt; which save it
-    permanently.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -293,7 +285,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/po/proprietary.it.po    28 Jan 2019 09:29:57 -0000      1.89
+++ proprietary/po/proprietary.it.po    2 Feb 2019 13:31:32 -0000       1.90
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,66 +435,64 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
+"one step further in their hijacking of users' devices."
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/proprietary.ja-diff.html     28 Jan 2019 09:29:57 -0000      
1.51
+++ proprietary/po/proprietary.ja-diff.html     2 Feb 2019 13:31:32 -0000       
1.52
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -95,16 +95,16 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -155,10 +155,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -179,6 +179,35 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901110"&gt;
     &lt;p&gt;Samsung phones come preloaded with &lt;a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
@@ -193,43 +222,6 @@
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
     are going one step further in their hijacking of users' devices.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
-    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612290"&gt;
-    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
-    a high score. The player gets coins at the end of each game, and can
-    buy more coins with real money.&lt;/p&gt;
-
-    &lt;p&gt;Getting a higher score once leads the player to desire higher
-    score again later. But the higher score resulting from the boost &lt;a
-    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
-    not give the player more coins, and does not help the player get
-    a higher score in subsequent games&lt;/a&gt;. To get that, the player
-    will need a boost frequently, and usually has to pay real money
-    for that. Since boosts are exciting and entertaining, the player is
-    subtly pushed to purchase more coins with real money to get boosts,
-    and it can develop into a costly habit.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612140"&gt;
-    &lt;p&gt;The Microsoft Telemetry Compatibility service &lt;a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
-    drastically reduces the performances of machines running
-    Windows&nbsp;10&lt;/a&gt;, and can't be disabled easily.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt; which save it
-    permanently.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -290,7 +282,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/po/proprietary.ja.po    28 Jan 2019 09:29:57 -0000      1.72
+++ proprietary/po/proprietary.ja.po    2 Feb 2019 13:31:32 -0000       1.73
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,66 +355,64 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
+"one step further in their hijacking of users' devices."
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/proprietary.nl-diff.html     28 Jan 2019 09:29:57 -0000      
1.50
+++ proprietary/po/proprietary.nl-diff.html     2 Feb 2019 13:31:32 -0000       
1.51
@@ -157,10 +157,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -182,6 +182,35 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901110"&gt;
     &lt;p&gt;Samsung phones come preloaded with &lt;a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
@@ -196,43 +225,6 @@
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
     are going one step further in their hijacking of users' devices.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
-    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612290"&gt;
-    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
-    a high score. The player gets coins at the end of each game, and can
-    buy more coins with real money.&lt;/p&gt;
-
-    &lt;p&gt;Getting a higher score once leads the player to desire higher
-    score again later. But the higher score resulting from the boost &lt;a
-    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
-    not give the player more coins, and does not help the player get
-    a higher score in subsequent games&lt;/a&gt;. To get that, the player
-    will need a boost frequently, and usually has to pay real money
-    for that. Since boosts are exciting and entertaining, the player is
-    subtly pushed to purchase more coins with real money to get boosts,
-    and it can develop into a costly habit.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612140"&gt;
-    &lt;p&gt;The Microsoft Telemetry Compatibility service &lt;a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
-    drastically reduces the performances of machines running
-    Windows&nbsp;10&lt;/a&gt;, and can't be disabled easily.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt; which save it
-    permanently.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -293,7 +285,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary.nl.po    28 Jan 2019 09:29:57 -0000      1.61
+++ proprietary/po/proprietary.nl.po    2 Feb 2019 13:31:32 -0000       1.62
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,66 +428,64 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
+"one step further in their hijacking of users' devices."
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/proprietary.pl-diff.html     28 Jan 2019 09:29:57 -0000      
1.68
+++ proprietary/po/proprietary.pl-diff.html     2 Feb 2019 13:31:32 -0000       
1.69
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -124,18 +124,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -156,10 +156,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -180,6 +180,35 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901110"&gt;
     &lt;p&gt;Samsung phones come preloaded with &lt;a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
@@ -194,43 +223,6 @@
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
     are going one step further in their hijacking of users' devices.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
-    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612290"&gt;
-    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
-    a high score. The player gets coins at the end of each game, and can
-    buy more coins with real money.&lt;/p&gt;
-
-    &lt;p&gt;Getting a higher score once leads the player to desire higher
-    score again later. But the higher score resulting from the boost &lt;a
-    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
-    not give the player more coins, and does not help the player get
-    a higher score in subsequent games&lt;/a&gt;. To get that, the player
-    will need a boost frequently, and usually has to pay real money
-    for that. Since boosts are exciting and entertaining, the player is
-    subtly pushed to purchase more coins with real money to get boosts,
-    and it can develop into a costly habit.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612140"&gt;
-    &lt;p&gt;The Microsoft Telemetry Compatibility service &lt;a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
-    drastically reduces the performances of machines running
-    Windows&nbsp;10&lt;/a&gt;, and can't be disabled easily.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt; which save it
-    permanently.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -291,7 +283,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/po/proprietary.pl.po    28 Jan 2019 09:29:57 -0000      1.56
+++ proprietary/po/proprietary.pl.po    2 Feb 2019 13:31:32 -0000       1.57
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,66 +510,64 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
+"one step further in their hijacking of users' devices."
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary.pot      28 Jan 2019 09:29:57 -0000      1.53
+++ proprietary/po/proprietary.pot      2 Feb 2019 13:31:32 -0000       1.54
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,64 +245,63 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Samsung phones come preloaded with <a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\";>
 "
-"a version of the Facebook app that can't be deleted</a>. <a "
-"href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app\";>
 "
-"Facebook claims this is a stub</a> which doesn't do anything, but we have to "
-"take their word for it, and there is the permanent risk that the app will be "
-"activated by an automatic update."
+"Around 40% of gratis Androids apps <a "
+"href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\";>
 "
+"report on the user's actions to Facebook</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\";>among
 "
-"others</a>)  are going one step further in their hijacking of users' "
-"devices."
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various "
+"apps. Some of them send Facebook detailed information about the user's "
+"activities in the app; others only say that the user is using that app, but "
+"that alone is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "This spying occurs regardless of whether the user has a Facebook 
account."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a "
-"href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\";>
 "
-"sent the precise GPS location to Twitter's server</a>. It still contains "
-"these GPS locations."
+"Foundry's graphics software <a "
+"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\";>
 "
+"reports information to identify who is running it</a>. The result is often a "
+"legal threat demanding a lot of money."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a "
-"href=\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/\";>does
 "
-"not give the player more coins, and does not help the player get a higher "
-"score in subsequent games</a>. To get that, the player will need a boost "
-"frequently, and usually has to pay real money for that. Since boosts are "
-"exciting and entertaining, the player is subtly pushed to purchase more "
-"coins with real money to get boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Microsoft Telemetry Compatibility service <a "
-"href=\"https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\";>
 "
-"drastically reduces the performances of machines running "
-"Windows&nbsp;10</a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\";>
 "
+"a version of the Facebook app that can't be deleted</a>. <a "
+"href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app\";>
 "
+"Facebook claims this is a stub</a> which doesn't do anything, but we have to "
+"take their word for it, and there is the permanent risk that the app will be "
+"activated by an automatic update."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a "
-"href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\";>
 "
-"send the video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\";>among
 "
+"others</a>)  are going one step further in their hijacking of users' "
+"devices."
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary.pt-br.po 29 Jan 2019 14:00:44 -0000      1.70
+++ proprietary/po/proprietary.pt-br.po 2 Feb 2019 13:31:33 -0000       1.71
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2019-01-29 10:01-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1)\n"
 "X-Generator: Gtranslator 3.31.0\n"
 
@@ -293,6 +294,48 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
 "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
 "facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -324,77 +367,6 @@
 "a>) estão indo um passo adiante em seu sequestro de dispositivos dos "
 "usuários."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"Até 2015, qualquer tweet que listasse uma tag geográfica <a href=\"http://";
-"web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> enviou a localização precisa do GPS para o "
-"servidor do Twitter</a>. Ainda contém essas localizações GPS."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"No jogo Fruit Pop, o jogador compra bônus com moedas para obter uma "
-"pontuação alta. O jogador recebe moedas no final de cada jogo e pode 
comprar "
-"mais moedas com dinheiro real."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"Obter uma pontuação mais alta uma vez leva o jogador a desejar maior "
-"pontuação novamente mais tarde. Mas uma pontuação maior resultante do "
-"impulsionador <a href=\"https://qz.com/873348/50000-coins-for-1-99-how-";
-"mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-"
-"economic-ideas/\"> não dá ao jogador mais moedas, e não ajuda o jogador a "
-"obter uma pontuação mais alta nos jogos subsequentes</a>. Para conseguir "
-"isso, o jogador precisará de um impulsionador com frequência e, geralmente, 
"
-"terá que pagar em dinheiro real por isso. Como os impulsionadores são "
-"empolgantes e divertidos, o jogador é sutilmente empurrado para comprar mais 
"
-"moedas com dinheiro real para obter reforços, e isso pode se transformar em "
-"um hábito caro."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"O serviço Microsoft Telemetry Compatibility <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"reduz drasticamente o desempenho de máquinas com Windows&nbsp;10</a> e pode "
-"ser facilmente desabilitado."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"Os dispositivos de “segurança” Amazon Ring <a 
href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
-"vídeo que eles capturam para os servidores da Amazon</a>, os quais 
armazenam-"
-"o permanentemente."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -470,6 +442,73 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "Até 2015, qualquer tweet que listasse uma tag geográfica <a 
href=\"http://";
+#~ "web-old.archive.org/web/20190115233002/https://www.wired.com/story/";
+#~ "twitter-location-data-gps-privacy/\"> enviou a localização precisa do 
GPS "
+#~ "para o servidor do Twitter</a>. Ainda contém essas localizações GPS."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "No jogo Fruit Pop, o jogador compra bônus com moedas para obter uma "
+#~ "pontuação alta. O jogador recebe moedas no final de cada jogo e pode "
+#~ "comprar mais moedas com dinheiro real."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz.";
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "Obter uma pontuação mais alta uma vez leva o jogador a desejar maior "
+#~ "pontuação novamente mais tarde. Mas uma pontuação maior resultante do "
+#~ "impulsionador <a href=\"https://qz.com/873348/50000-coins-for-1-99-how-";
+#~ "mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-"
+#~ "economic-ideas/\"> não dá ao jogador mais moedas, e não ajuda o jogador 
a "
+#~ "obter uma pontuação mais alta nos jogos subsequentes</a>. Para conseguir 
"
+#~ "isso, o jogador precisará de um impulsionador com frequência e, "
+#~ "geralmente, terá que pagar em dinheiro real por isso. Como os "
+#~ "impulsionadores são empolgantes e divertidos, o jogador é sutilmente "
+#~ "empurrado para comprar mais moedas com dinheiro real para obter reforços, 
"
+#~ "e isso pode se transformar em um hábito caro."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows&nbsp;10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "O serviço Microsoft Telemetry Compatibility <a href=\"https://answers.";
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> reduz drasticamente o desempenho de máquinas com "
+#~ "Windows&nbsp;10</a> e pode ser facilmente desabilitado."
+
+#~ msgid ""
+#~ "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Os dispositivos de “segurança” Amazon Ring <a 
href=\"https://www.engadget.";
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam "
+#~ "o vídeo que eles capturam para os servidores da Amazon</a>, os quais "
+#~ "armazenam-o permanentemente."
+
+#~ msgid ""
 #~ "The Weather Channel app <a href=\"https://www.theguardian.com/";
 #~ "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"
 #~ "\"> stored users' locations to the company's server</a>. The company is "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/proprietary.ru.po    28 Jan 2019 10:30:14 -0000      1.136
+++ proprietary/po/proprietary.ru.po    2 Feb 2019 13:31:33 -0000       1.137
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,48 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
 "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
 "facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -329,76 +372,6 @@
 "facebook\">в числе прочих</a>) делают еще один 
шаг к захвату усройств "
 "пользователей."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"До 2015 года любой твит с географическим 
тегом <a href=\"http://web-old.";
-"archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-";
-"data-gps-privacy/\"> отсылал точные координаты на 
сервер Твиттера</a>. Эти "
-"координаты хранятся там до сих пор."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"В игре Fruit Pop игрок покупает силы за монеты, 
чтобы набрать больше очков. "
-"Игрок получает монеты в конце каждой игры 
и может покупать их дополнительно "
-"за настоящие деньги."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"Набрав однажды много очков, игрок 
стремится впоследствии снова получать "
-"много очков. Но высокий счет, полученный в 
результате купленных сил, <a href="
-"\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-";
-"purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">не 
дает "
-"игроку дополнительных монет и не помогает 
игроку получить более высокий счет "
-"в последующих играх</a>. Чтобы получать его, 
игроку нужно часто покупать "
-"силы, и обычно для этого приходится 
тратить настоящие деньги. Поскольку "
-"приобретение сил дает захватывающие 
возможности, игрока тонко побуждают "
-"покупать монеты за настоящие деньги, 
чтобы получать силы, а это может "
-"превратиться в дорогостоящую привычку."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"Служба Telemetry Compatibility Microsoft <a 
href=\"https://answers.microsoft.";
-"com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"радикально снижает быстродействие машин 
под Windows&nbsp;10</a>, а отключить "
-"ее непросто."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"Устройства &ldquo;безопасности&rdquo; Amazon Ring <a 
href=\"https://www.";
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
-"отсылают видеозаписи, которые они 
собирают, на серверы Amazon</a>, где они "
-"сохраняются навсегда."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -478,6 +451,72 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "До 2015 года любой твит с географическим 
тегом <a href=\"http://web-old.";
+#~ "archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+#~ "location-data-gps-privacy/\"> отсылал точные 
координаты на сервер "
+#~ "Твиттера</a>. Эти координаты хранятся там 
до сих пор."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "В игре Fruit Pop игрок покупает силы за 
монеты, чтобы набрать больше "
+#~ "очков. Игрок получает монеты в конце 
каждой игры и может покупать их "
+#~ "дополнительно за настоящие деньги."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz.";
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "Набрав однажды много очков, игрок 
стремится впоследствии снова получать "
+#~ "много очков. Но высокий счет, полученный 
в результате купленных сил, <a "
+#~ "href=\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-";
+#~ "purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">не "
+#~ "дает игроку дополнительных монет и не 
помогает игроку получить более "
+#~ "высокий счет в последующих играх</a>. 
Чтобы получать его, игроку нужно "
+#~ "часто покупать силы, и обычно для этого 
приходится тратить настоящие "
+#~ "деньги. Поскольку приобретение сил дает 
захватывающие возможности, игрока "
+#~ "тонко побуждают покупать монеты за 
настоящие деньги, чтобы получать силы, "
+#~ "а это может превратиться в 
дорогостоящую привычку."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows&nbsp;10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "Служба Telemetry Compatibility Microsoft <a href=\"https://answers.";
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> радикально снижает 
быстродействие машин под "
+#~ "Windows&nbsp;10</a>, а отключить ее непросто."
+
+#~ msgid ""
+#~ "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Устройства &ldquo;безопасности&rdquo; Amazon Ring <a 
href=\"https://www.";
+#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\"> отсылают видеозаписи, которые они 
собирают, на серверы Amazon</a>, "
+#~ "где они сохраняются навсегда."
+
+#~ msgid ""
 #~ "The Weather Channel app <a href=\"https://www.theguardian.com/";
 #~ "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"
 #~ "\"> stored users' locations to the company's server</a>. The company is "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary.zh-tw-diff.html  28 Jan 2019 09:29:57 -0000      
1.28
+++ proprietary/po/proprietary.zh-tw-diff.html  2 Feb 2019 13:31:33 -0000       
1.29
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -183,6 +183,35 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Androids apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201811020"&gt;
+    &lt;p&gt;Foundry's graphics software &lt;a
+    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information to identify who is running it&lt;/a&gt;. The result is
+    often a legal threat demanding a lot of money.&lt;/p&gt;
+
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
+
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901110"&gt;
     &lt;p&gt;Samsung phones come preloaded with &lt;a
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
@@ -197,43 +226,6 @@
     
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
     are going one step further in their hijacking of users' devices.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901101"&gt;
-    &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
-    
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
-    sent the precise GPS location to Twitter's server&lt;/a&gt;. It still
-    contains these GPS locations.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612290"&gt;
-    &lt;p&gt;In the game Fruit Pop, the player buys boosts with coins to get
-    a high score. The player gets coins at the end of each game, and can
-    buy more coins with real money.&lt;/p&gt;
-
-    &lt;p&gt;Getting a higher score once leads the player to desire higher
-    score again later. But the higher score resulting from the boost &lt;a
-    
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/"&gt;does
-    not give the player more coins, and does not help the player get
-    a higher score in subsequent games&lt;/a&gt;. To get that, the player
-    will need a boost frequently, and usually has to pay real money
-    for that. Since boosts are exciting and entertaining, the player is
-    subtly pushed to purchase more coins with real money to get boosts,
-    and it can develop into a costly habit.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612140"&gt;
-    &lt;p&gt;The Microsoft Telemetry Compatibility service &lt;a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
-    drastically reduces the performances of machines running
-    Windows&nbsp;10&lt;/a&gt;, and can't be disabled easily.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt; which save it
-    permanently.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -294,7 +286,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary.zh-tw.po 28 Jan 2019 09:29:57 -0000      1.39
+++ proprietary/po/proprietary.zh-tw.po 2 Feb 2019 13:31:33 -0000       1.40
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,66 +344,64 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz.";
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers.";
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows&nbsp;10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
+"one step further in their hijacking of users' devices."
 msgstr ""
 
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/pt-br.po     29 Jan 2019 14:00:44 -0000      1.26
+++ proprietary/po/pt-br.po     2 Feb 2019 13:31:33 -0000       1.27
@@ -3983,6 +3983,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5833,15 +5854,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
-"Até 2015, qualquer tweet que listasse uma tag geográfica <a href=\"http://";
-"web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> enviou a localização precisa do GPS para o "
-"servidor do Twitter</a>. Ainda contém essas localizações GPS."
 
 #. type: Content of: <div><p>
 #, fuzzy
@@ -6077,6 +6107,12 @@
 #. type: Content of: <div><div><ul><li><ul><li>
 #, fuzzy
 #| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móveis</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móveis</a>"
 
@@ -6363,6 +6399,16 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -6592,6 +6638,18 @@
 "proprietary&rdquo;</a>, but the surveillance is an abuse all the same."
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"Até 2015, qualquer tweet que listasse uma tag geográfica <a href=\"http://";
+"web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> enviou a localização precisa do GPS para o "
+"servidor do Twitter</a>. Ainda contém essas localizações GPS."
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/ru.po        29 Jan 2019 08:54:42 -0000      1.41
+++ proprietary/po/ru.po        2 Feb 2019 13:31:33 -0000       1.42
@@ -5551,6 +5551,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -7986,15 +8007,24 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
-"До 2015 года любой твит с географическим 
тегом <a href=\"http://web-old.";
-"archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-";
-"data-gps-privacy/\"> отсылал точные координаты на 
сервер Твиттера</a>. Эти "
-"координаты хранятся там до сих пор."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -8275,6 +8305,14 @@
 msgid "<a href=\"#SpywareInApplications\">Spyware in Applications</a>"
 msgstr "<a href=\"#SpywareInMobileApps\">Прикладные 
программы</a>"
 
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Мобильные 
приложения</a>"
+
 #. type: Content of: <div><div><ul><li><ul><li>
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a href=\"#SpywareInMobileApps\">Мобильные 
приложения</a>"
@@ -8614,6 +8652,25 @@
 "\">#SpywareInApplications</a>)</span>"
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr "Мобильные приложения"
 
@@ -8914,6 +8971,18 @@
 "nonfree.html\"> понятия &ldquo;свободный&rdquo; и 
&ldquo;несвободный&rdquo; "
 "для них не имеют смысла</a>, но все равно 
слежка является злоупотреблением."
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"До 2015 года любой твит с географическим 
тегом <a href=\"http://web-old.";
+"archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-";
+"data-gps-privacy/\"> отсылал точные координаты на 
сервер Твиттера</a>. Эти "
+"координаты хранятся там до сих пор."
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr "JavaScript"

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/zh-tw.po     28 Jan 2019 23:59:20 -0000      1.18
+++ proprietary/po/zh-tw.po     2 Feb 2019 13:31:33 -0000       1.19
@@ -3865,6 +3865,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational.";
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's &ldquo;advertising ID,&rdquo; so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5692,10 +5713,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-";
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
 msgstr ""
 
 #. type: Content of: <div><p>
@@ -5937,6 +5971,14 @@
 #| msgid ""
 #| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
 #| "a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a 
href=\"/proprietary/malware-mobiles.html\">行動裝置的惡意軟體</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
 msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
 msgstr "<a 
href=\"/proprietary/malware-mobiles.html\">行動裝置的惡意軟體</a>"
 
@@ -6228,6 +6270,16 @@
 msgstr ""
 
 #. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
 msgid "Mobile Apps"
 msgstr ""
 
@@ -6457,6 +6509,14 @@
 "proprietary&rdquo;</a>, but the surveillance is an abuse all the same."
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
 #. type: Content of: <div><h4>
 msgid "JavaScript"
 msgstr ""

Index: manual/manual.pt-br.html
===================================================================
RCS file: manual/manual.pt-br.html
diff -N manual/manual.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ manual/manual.pt-br.html    2 Feb 2019 13:31:26 -0000       1.1
@@ -0,0 +1,120 @@
+<!--#set var="ENGLISH_PAGE" value="/manual/manual.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.86 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Manuais GNU online - Projeto GNU - Free Software Foundation</title>
+
+<!--#include virtual="/manual/po/manual.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<h2>Manuais GNU online</h2>
+
+<p id="topinfo">Esta tabela lista <a href="/software/software.html">pacotes 
GNU oficiais</a>
+com links para a documentação principal, quando disponível. Quando um pacote
+tem vários manuais associados, todos eles são listados. Se um pacote não
+tiver um manual online específico, o link vai para a página inicial do
+pacote (que também está vinculada explicitamente).</p>
+
+<p>Muitos pacotes podem ser listados em qualquer uma das várias categorias, 
mas
+para a tabela aqui apenas um deve ser escolhido, geralmente seguindo o <a
+href="https://directory.fsf.org/";>Diretório de Software Livre</a> .</p>
+
+<p>Relatórios de erros: para qualquer discussão sobre manuais específicos,
+entre em contato com os mantenedores do pacote. Para discussões sobre esta
+página em particular (por exemplo, se você é um mantenedor do GNU e deseja
+corrigir ou discutir sua entrada), entre em contato com <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><a href="/doc/doc.html">Mais documentação do Projeto GNU</a>.</p>
+
+<!-- regenerate this when official list changes, via
+       gm generate manuals html
+     in the womb/gnumaint CVS source directory on savannah.  -->
+<!--#include virtual="/manual/allgnupkgs.pt-br.html" -->
+<p>Veja <a href="#topinfo">informações sobre essa lista no topo</a>.</p>
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF.  Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções acuradas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e o 
envio de
+traduções das páginas desse site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2014, 2018 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/deed.pt_BR";>Creative
+Commons Atribuição-SemDerivações 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+Traduzido por: Rafael Fontenelle <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>,
+2018.Revisado por: Cassiano Reinert Novais dos Santos <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>, 2018.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização: 
+
+$Date: 2019/02/02 13:31:26 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: manual/po/manual.pt-br-en.html
===================================================================
RCS file: manual/po/manual.pt-br-en.html
diff -N manual/po/manual.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ manual/po/manual.pt-br-en.html      2 Feb 2019 13:31:26 -0000       1.1
@@ -0,0 +1,97 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<title>GNU Manuals Online
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/manual/po/manual.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>GNU Manuals Online</h2>
+
+<p id="topinfo">This table lists <a
+href="/software/software.html">official GNU packages</a> with links to
+their primary documentation, where available.  When a package has
+several associated manuals, they are all listed.  If a package has no
+specific manual online, the link just goes to the package's home page
+(which is also linked to explicitly).</p>
+
+<p>Many packages could be listed in any of several categories, but for
+the table here just one has to be chosen, usually following the <a
+href="https://directory.fsf.org/";>Free Software Directory</a>.</p>
+
+<p>Bug reports: for any discussion about specific manuals, please
+contact the package maintainers.  For discussion about this page in
+particular (for example, if you are a GNU maintainer and want to correct
+or discuss your entry), contact <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><a href="/doc/doc.html">More GNU Project documentation</a>.</p>
+
+<!-- regenerate this when official list changes, via
+       gm generate manuals html
+     in the womb/gnumaint CVS source directory on savannah.  -->    
+<!--#include virtual="/manual/allgnupkgs.html" -->
+
+<p>See <a href="#topinfo">info about this list at top</a>.</p>
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2014, 2018 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/02/02 13:31:26 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: philosophy/phone-anonymous-payment.pt-br.html
===================================================================
RCS file: philosophy/phone-anonymous-payment.pt-br.html
diff -N philosophy/phone-anonymous-payment.pt-br.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/phone-anonymous-payment.pt-br.html       2 Feb 2019 13:31:26 
-0000       1.1
@@ -0,0 +1,117 @@
+<!--#set var="ENGLISH_PAGE" 
value="/philosophy/phone-anonymous-payment.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.86 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Pagamento anônimo por telefone - Projeto GNU - Free Software 
Foundation</title>
+
+<!--#include virtual="/philosophy/po/phone-anonymous-payment.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<h2>Pagamento anônimo por telefone</h2>
+
+<p>por Richard Stallman</p>
+
+<p>Aqui está uma ideia para um sistema de pagamento anônimo que seria útil 
para
+alguns aplicativos.</p>
+
+<ul>
+<li>O vendedor configura um número de telefone que cobra N dólares por minuto
+para qualquer chamador.</li>
+
+<li>O cliente escolhe um código, chama esse número (que exige pagar N 
dólares) e
+insere o código. Um sistema de geração de voz fala o código de volta para
+que o cliente possa confirmá-lo.</li>
+
+<li>Esse código representa um pagamento de N dólares. O cliente entra em um 
site
+ou quiosque e constitui um pagamento por qualquer coisa.</li>
+</ul>
+
+<p>Deveria ser possível fazer isso usando um cartão telefônico em um 
telefone
+público ou no telefone de outra pessoa.</p>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF.  Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções acuradas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e o 
envio de
+traduções das páginas desse site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright &copy; 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/deed.pt_BR";>Creative
+Commons Atribuição-SemDerivações 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+Traduzido por: Rafael Fontenelle <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>, 2019.<br/>
+Revisado por: Cassiano Reinert Novais dos Santos <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a>, 2019.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Última atualização: 
+
+$Date: 2019/02/02 13:31:26 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>

Index: philosophy/po/phone-anonymous-payment.pt-br-en.html
===================================================================
RCS file: philosophy/po/phone-anonymous-payment.pt-br-en.html
diff -N philosophy/po/phone-anonymous-payment.pt-br-en.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/phone-anonymous-payment.pt-br-en.html 2 Feb 2019 13:31:27 
-0000       1.1
@@ -0,0 +1,92 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<title>Anonymous Payment by Phone
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/philosophy/po/phone-anonymous-payment.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Anonymous Payment by Phone</h2>
+
+<p>by Richard Stallman</p>
+
+<p>Here is an idea for an anonymous payment system that would be useful
+for some applications.</p>
+
+<ul>
+<li>The seller sets up a phone number that charges N dollars per minute to
+any caller.</li>
+
+<li>The customer chooses a code, calls that number (which requires paying
+N dollars), and enters the code. A voice-generation system speaks the
+code back so the customer can confirm it.</li>
+
+<li>That code represents a payment of N dollars. The customer enters it
+in a web site, or a kiosk, and it constitutes payment for whatever.</li>
+</ul>
+
+<p>It should be possible to do this using a phone card on a payphone
+or anyone else's telephone.</p>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF &amp; GNU inquiries to
+<a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF.  Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to <a href="mailto:address@hidden";>
+        &lt;address@hidden&gt;</a>.</p>
+
+        <p>For information on coordinating and submitting translations of
+        our web pages, see <a
+        href="/server/standards/README.translations.html">Translations
+        README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright &copy; 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/02/02 13:31:27 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]