www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www planetfeeds.ru.html po/planetfeeds.ru.po pr...


From: GNUN
Subject: www planetfeeds.ru.html po/planetfeeds.ru.po pr...
Date: Mon, 4 Feb 2019 02:31:26 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/04 02:31:24

Modified files:
        .              : planetfeeds.ru.html 
        po             : planetfeeds.ru.po 
        proprietary    : malware-amazon.es.html malware-amazon.fr.html 
                         malware-amazon.ru.html malware-apple.es.html 
                         malware-apple.fr.html malware-apple.ru.html 
                         malware-appliances.fr.html 
                         malware-appliances.ru.html malware-cars.fr.html 
                         malware-cars.ru.html malware-microsoft.fr.html 
                         malware-microsoft.ru.html 
                         malware-mobiles.fr.html malware-mobiles.ru.html 
                         malware-webpages.fr.html 
                         malware-webpages.ru.html 
                         proprietary-back-doors.fr.html 
                         proprietary-back-doors.ru.html 
                         proprietary-drm.fr.html proprietary-drm.ru.html 
                         proprietary-insecurity.fr.html 
                         proprietary-insecurity.ru.html 
                         proprietary-sabotage.fr.html 
                         proprietary-sabotage.ru.html 
                         proprietary-subscriptions.fr.html 
                         proprietary-subscriptions.ru.html 
                         proprietary-surveillance.fr.html 
                         proprietary-surveillance.ru.html 
                         proprietary-tethers.fr.html 
                         proprietary-tethers.ru.html 
        proprietary/po : malware-amazon.de-diff.html 
                         malware-amazon.es-en.html 
                         malware-amazon.fr-en.html 
                         malware-amazon.it-diff.html 
                         malware-amazon.ja-diff.html 
                         malware-amazon.ru-en.html 
                         malware-apple.de-diff.html 
                         malware-apple.es-en.html 
                         malware-apple.fr-en.html 
                         malware-apple.it-diff.html 
                         malware-apple.ja-diff.html 
                         malware-apple.nl-diff.html 
                         malware-apple.ru-en.html 
                         malware-appliances.de-diff.html 
                         malware-appliances.fr-en.html 
                         malware-appliances.ru-en.html 
                         malware-cars.de-diff.html 
                         malware-cars.fr-en.html malware-cars.ru-en.html 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.fr-en.html 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ru-en.html 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.fr-en.html 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ru-en.html 
                         malware-webpages.de-diff.html 
                         malware-webpages.fr-en.html 
                         malware-webpages.ru-en.html 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ru-en.html 
                         proprietary-drm.de-diff.html 
                         proprietary-drm.fr-en.html 
                         proprietary-drm.it-diff.html 
                         proprietary-drm.ja-diff.html 
                         proprietary-drm.ru-en.html 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.fr-en.html 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ru-en.html 
                         proprietary-sabotage.de-diff.html 
                         proprietary-sabotage.fr-en.html 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ru-en.html 
                         proprietary-subscriptions.de-diff.html 
                         proprietary-subscriptions.fr-en.html 
                         proprietary-subscriptions.ja-diff.html 
                         proprietary-subscriptions.ru-en.html 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.fr-en.html 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ru-en.html 
                         proprietary-tethers.de-diff.html 
                         proprietary-tethers.fr-en.html 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ru-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.ru.html?cvsroot=www&r1=1.861&r2=1.862
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.ru.po?cvsroot=www&r1=1.1278&r2=1.1279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.fr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.ru.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.ru.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ru.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ru.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.ru.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru-en.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru-en.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru-en.html?cvsroot=www&r1=1.23&r2=1.24

Patches:
Index: planetfeeds.ru.html
===================================================================
RCS file: /web/www/www/planetfeeds.ru.html,v
retrieving revision 1.861
retrieving revision 1.862
diff -u -b -r1.861 -r1.862
--- planetfeeds.ru.html 4 Feb 2019 05:59:01 -0000       1.861
+++ planetfeeds.ru.html 4 Feb 2019 07:31:19 -0000       1.862
@@ -6,12 +6,11 @@
 value="<a href='http://dustycloud.org/blog/samsung-stack-zero-grant/'>" -->
 <!--#echo
 encoding="none" var="link" -->
-I&#39;ve been awarded the Samsung Stack Zero Grant<!--#echo encoding="none"
+Мне присудили премию Samsung Stack Zero<!--#echo 
encoding="none"
 var="a_close" -->
 <!-- TRANSLATORS: 
 http://dustycloud.org/blog/samsung-stack-zero-grant/ -->
-: Good news everyone! I&#39;ve been awarded the Samsung Stack Zero Grant.
-But why not quote them? Christopher Lemmer Webber is the co-editor...
+: Хорошая новость! Мне присудили премию 
Samsung Stack Zero...
 </p>
 <p>
 <!--#set var="link"

Index: po/planetfeeds.ru.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.ru.po,v
retrieving revision 1.1278
retrieving revision 1.1279
diff -u -b -r1.1278 -r1.1279
--- po/planetfeeds.ru.po        4 Feb 2019 07:06:46 -0000       1.1278
+++ po/planetfeeds.ru.po        4 Feb 2019 07:31:21 -0000       1.1279
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-02-04 05:57+0000\n"
 
 #. type: Content of: <p>
 msgid "I&#39;ve been awarded the Samsung Stack Zero Grant"
@@ -26,8 +25,7 @@
 msgid ""
 ": Good news everyone! I&#39;ve been awarded the Samsung Stack Zero Grant.  "
 "But why not quote them? Christopher Lemmer Webber is the co-editor..."
-msgstr ""
-": Хорошая новость! Мне присудили премию 
Samsung Stack Zero..."
+msgstr ": Хорошая новость! Мне присудили 
премию Samsung Stack Zero..."
 
 #. type: Content of: <p>
 msgid ""

Index: proprietary/malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/malware-amazon.es.html  18 Jan 2019 13:01:09 -0000      1.16
+++ proprietary/malware-amazon.es.html  4 Feb 2019 07:31:21 -0000       1.17
@@ -72,7 +72,7 @@
 habían sido desbloqueados. </p>
   </li>
 
-  <li id="M201210221">
+  <li id="M201210220.1">
     <p>El Kindle-Swindle de Amazon tiene una puerta trasera que ha sido usada 
para
 <a
 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
@@ -97,7 +97,7 @@
 <h4 id="surveillance">Vigilancia</h4>
 
 <ul class="blurbs">
-  <li id="M201212031">
+  <li id="M201212030.1">
     <p>La <cite>Electronic Frontier Foundation</cite> ha examinado y 
encontrado <a
 href="https://www.eff.org/pages/reader-privacy-chart-2012";>diversos tipos de
 vigilancia en el Swindle y otros lectores de libros electrónicos</a>.</p>
@@ -108,7 +108,7 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-  <li id="M201704131">
+  <li id="M201704130.1">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> El 
Kindle
 de Amazon tiene DRM</a>. Ese artículo es erróneo, ya que no trata el DRM
 como una cuestión ética; da por hecho que todo lo que Amazon podría hacer a
@@ -255,7 +255,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-amazon.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.fr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/malware-amazon.fr.html  14 Jan 2019 07:59:32 -0000      1.21
+++ proprietary/malware-amazon.fr.html  4 Feb 2019 07:31:21 -0000       1.22
@@ -70,7 +70,7 @@
 complètement de fonctionner.</p>
   </li>
 
-  <li id="M201210221">
+  <li id="M201210220.1">
     <p>Le Kindle-Swindle d'Amazon a une porte dérobée qui a servi à <a
 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>effacer
 des livres à distance</a>. Un de ces livres était <cite>1984</cite>, de
@@ -95,7 +95,7 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-  <li id="M201212031">
+  <li id="M201212030.1">
     <p>L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a
 href="https://www.eff.org/pages/reader-privacy-chart-2012";>différents
 mécanismes de surveillance dans le Swindle et autres liseuses</a>.</p>
@@ -106,7 +106,7 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-  <li id="M201704131">
+  <li id="M201704130.1">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>Le 
Kindle
 d'Amazon a des menottes numériques</a>. Cet article a un défaut : il 
néglige
 la dimension éthique des DRM ; il prend pour acquis que tout ce qu'Amazon
@@ -252,7 +252,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-amazon.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.ru.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/malware-amazon.ru.html  14 Jan 2019 07:59:32 -0000      1.19
+++ proprietary/malware-amazon.ru.html  4 Feb 2019 07:31:21 -0000       1.20
@@ -70,7 +70,7 @@
 функционировать вообще.</p>
   </li>
 
-  <li id="M201210221">
+  <li id="M201210220.1">
     <p>В Amazon Kindle есть черный ход, которым 
пользовались, чтобы <a
 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
 удаленно стирать книги</a>. Одной из таких 
книг был роман Джорджа Оруэлла
@@ -94,7 +94,7 @@
 <h4 id="surveillance">Слежка</h4>
 
 <ul class="blurbs">
-  <li id="M201212031">
+  <li id="M201212030.1">
     <p>Фонд электронных рубежей обследовал и 
нашел <a
 href="https://www.eff.org/pages/reader-privacy-chart-2012";> разного 
рода
 слежку в Swindle и других устройствах чтения 
электронных книг</a>.</p>
@@ -105,7 +105,7 @@
 <h4 id="drm">Цифровое управление 
ограничениями</h4>
 
 <ul class="blurbs">
-  <li id="M201704131">
+  <li id="M201704130.1">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";> В 
Amazon
 Kindle есть цифровое управление 
ограничениями</a>. Недостаток этой
 статьи&nbsp;&mdash; в том, что цифровое 
управление ограничениями не
@@ -253,7 +253,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/malware-apple.es.html   18 Jan 2019 13:01:09 -0000      1.64
+++ proprietary/malware-apple.es.html   4 Feb 2019 07:31:21 -0000       1.65
@@ -138,7 +138,7 @@
 <h3 id="drm">Gestión digital de restricciones en Apple</h3>
 
 <ul class="blurbs">
-  <li id="M201704071">
+  <li id="M201704070.1">
     <p>El DRM hace que el iPhone 7 sea prácticamente <a
 href="#iphone7-sabotage">irreparable</a> por nadie que no sea Apple.</p>
   </li>
@@ -640,7 +640,7 @@
 técnica</a>.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>La
 herramienta de búsqueda <cite>Spotlight</cite></a> envía a Apple los
@@ -779,7 +779,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/malware-apple.fr.html   6 Jan 2019 09:59:17 -0000       1.74
+++ proprietary/malware-apple.fr.html   4 Feb 2019 07:31:21 -0000       1.75
@@ -137,7 +137,7 @@
 <h3 id="drm">DRM</h3>
 
 <ul class="blurbs">
-  <li id="M201704071">
+  <li id="M201704070.1">
     <p>Un DRM rend l'iPhone7 presque <a 
href="#iphone7-sabotage">irréparable</a>
 par quelqu'un d'autre qu'Apple.</p>
   </li>
@@ -643,7 +643,7 @@
 technique</a>.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>Le
 moteur de recherche de fichiers <cite>Spotlight</cite></a> envoie à Apple
@@ -783,7 +783,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/malware-apple.ru.html   29 Jan 2019 09:01:20 -0000      1.68
+++ proprietary/malware-apple.ru.html   4 Feb 2019 07:31:21 -0000       1.69
@@ -133,7 +133,7 @@
 <h3 id="drm">Цифровое управление 
ограничениями</h3>
 
 <ul class="blurbs">
-  <li id="M201704071">
+  <li id="M201704070.1">
     <p>Цифровое управление ограничение 
делает iPhone&nbsp;7 почти <a
 href="#iphone7-sabotage">неремонтопригодным</a> для 
всех, кроме Apple.</p>
   </li>
@@ -633,7 +633,7 @@
 технический доклад</a>.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>средство
 поиска Spotlight</a> высылает запросы 
пользователя в Apple.</p>
@@ -771,7 +771,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/29 09:01:20 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/malware-appliances.fr.html      3 Feb 2019 19:59:05 -0000       
1.59
+++ proprietary/malware-appliances.fr.html      4 Feb 2019 07:31:21 -0000       
1.60
@@ -374,7 +374,7 @@
 pouvoir.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>Les jouets « intelligents » <cite>Mon amie Cayla</cite> et
 <cite>i-Que</cite> peuvent être <a
 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>contrôlés
@@ -648,7 +648,7 @@
 données concernant l'utilisateur</a>.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>a
 désactivé des fonctionnalités réseau</a> sur des téléviseurs
@@ -868,7 +868,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/02/03 19:59:05 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/malware-appliances.ru.html      13 Jan 2019 11:30:09 -0000      
1.52
+++ proprietary/malware-appliances.ru.html      4 Feb 2019 07:31:21 -0000       
1.53
@@ -371,7 +371,7 @@
 такая власть.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>&ldquo;Умные&rdquo; игрушки &ldquo;Мой друг 
Кейла&rdquo; и i-Que <a
 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>можно
 контролировать по сотовому телефону</a>; 
физический доступ для этого не
@@ -635,7 +635,7 @@
 данных о пользователе</a>.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
 отключала сетевые функции</a> в <em>купленных 
до этого</em>
@@ -856,7 +856,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/13 11:30:09 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-cars.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/malware-cars.fr.html    5 Jan 2019 11:31:31 -0000       1.18
+++ proprietary/malware-cars.fr.html    4 Feb 2019 07:31:21 -0000       1.19
@@ -97,7 +97,7 @@
 à distance des airbags</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Dans certaines voitures, Tesla a limité la fraction de batterie 
utilisable
 par ses clients au moyen d'un logiciel et a levé temporairement cette
 limitation au moyen d'une <a
@@ -323,7 +323,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/05 11:31:31 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-cars.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.ru.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/malware-cars.ru.html    5 Jan 2019 11:31:31 -0000       1.16
+++ proprietary/malware-cars.ru.html    4 Feb 2019 07:31:21 -0000       1.17
@@ -96,7 +96,7 @@
 задействовать подушки безопасности по 
сети</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Компания Tesla программы, чтобы 
ограничить емкость аккумуляторов, которую
 могли использовать клиенты в некоторых 
моделях, и <a
 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
@@ -319,7 +319,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/05 11:31:31 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/malware-microsoft.fr.html       3 Feb 2019 17:29:05 -0000       
1.74
+++ proprietary/malware-microsoft.fr.html       4 Feb 2019 07:31:21 -0000       
1.75
@@ -77,7 +77,7 @@
 <h3 id="back-doors">Portes dérobées</h3>
 
 <ul class="blurbs">
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft Windows a une porte dérobée universelle 
qui permet <a
 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>d'imposer
 un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -117,7 +117,7 @@
 respectés en sécurité.</p>
   </li>
 
-  <li id="M201112081">
+  <li id="M201112080.1">
     <p><a
 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>WindowsÂ
 8
 a aussi une porte dérobée pour supprimer des applications à 
distance</a>.</p>
@@ -134,7 +134,7 @@
 <h3 id="drm">DRM</h3>
 
 <ul class="blurbs">
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>Un DRM 
dans
 Windows</a>, introduit pour répondre aux besoins des disques <a
 href="/proprietary/proprietary-drm.html#bluray">Blu-ray</a>. (L'article
@@ -408,7 +408,7 @@
 distribue à une autre société.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>Afin d'élargir la base installée de Windows 10, Microsoft <a
 class="not-a-duplicate"
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>manifeste
@@ -647,7 +647,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/02/03 17:29:05 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ru.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/malware-microsoft.ru.html       3 Feb 2019 16:30:30 -0000       
1.67
+++ proprietary/malware-microsoft.ru.html       4 Feb 2019 07:31:21 -0000       
1.68
@@ -75,7 +75,7 @@
 <h3 id="back-doors">Лазейки</h3>
 
 <ul class="blurbs">
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">В Microsoft Windows есть 
универсальный черный ход, по которому <a
 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
 пользователям можно навязывать какие 
угодно изменения</a>.</p>
@@ -115,7 +115,7 @@
 безопасности.</p>
   </li>
 
-  <li id="M201112081">
+  <li id="M201112080.1">
     <p>В Windows 8 есть также лазейка для <a
 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
 удаления программ по сети</a>.</p>
@@ -132,7 +132,7 @@
 <h3 id="drm">Цифровое управление 
ограничениями</h3>
 
 <ul class="blurbs">
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>Цифровое
 управление ограничениями в Windows</a> введено 
в угоду дискам <a
 href="/proprietary/proprietary-drm.html#bluray"> Bluray</a> (в статье
@@ -402,7 +402,7 @@
 время Microsoft передает их другой компании.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>В целях наращивания пользовательской 
базы Windows 10 Microsoft <a
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
 допускает вопиющие нарушения выбора 
пользователей и их приватности</a>.</p>
@@ -641,7 +641,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/malware-mobiles.fr.html 3 Feb 2019 19:59:05 -0000       1.62
+++ proprietary/malware-mobiles.fr.html 4 Feb 2019 07:31:21 -0000       1.63
@@ -83,7 +83,7 @@
 données de localisation pendant des mois ou des années.</p>
   </li>
 
-  <li id="M201311121">
+  <li id="M201311120.1">
     <p id="universal-back-door">
     Le processeur de communication de chaque téléphone a une porte dérobée
 universelle qui est <a
@@ -821,7 +821,7 @@
 de Samsung</a> permet l'accès à n'importe quel fichier du système.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>Le clavier Simeji est une version pour smartphone de l'<a
 href="/proprietary/proprietary-surveillance.html#baidu-ime">éditeur espion
 de méthodes de saisie</a> de Baidu.</p>
@@ -970,7 +970,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/02/03 19:59:05 $
+$Date: 2019/02/04 07:31:21 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/malware-mobiles.ru.html 3 Feb 2019 16:30:30 -0000       1.55
+++ proprietary/malware-mobiles.ru.html 4 Feb 2019 07:31:22 -0000       1.56
@@ -80,7 +80,7 @@
 местоположении в течение месяцев или 
лет.</p>
   </li>
 
-  <li id="M201311121">
+  <li id="M201311120.1">
     <p id="universal-back-door">
     В коммуникационном процессоре почти 
любого телефона есть универсальный
 черный ход, который <a
@@ -806,7 +806,7 @@
 Samsung</a> предоставляет доступ к любому файлу 
в системе.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>Клавиатура Simeji&nbsp;&mdash; смартфонная 
версия <a
 
href="/proprietary/proprietary-surveillance.html#baidu-ime">шпионящего
 метода ввода</a> Baidu.</p>
@@ -957,7 +957,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/malware-webpages.fr.html        5 Jan 2019 16:29:31 -0000       
1.19
+++ proprietary/malware-webpages.fr.html        4 Feb 2019 07:31:22 -0000       
1.20
@@ -139,7 +139,7 @@
 interactions avec les serveurs, mais le logiciel privateur joue un rôle.</p>
   </li>
 
-  <li id="M201611161">
+  <li id="M201611160.1">
     <p>Un <a
 
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>article
 de recherche</a> a étudié 283 applis VPN pour Android du point de vue de la
@@ -294,7 +294,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/malware-webpages.ru.html        5 Jan 2019 11:31:31 -0000       
1.17
+++ proprietary/malware-webpages.ru.html        4 Feb 2019 07:31:22 -0000       
1.18
@@ -137,7 +137,7 @@
 несвободные программы вносят свой вклад.</p>
   </li>
 
-  <li id="M201611161">
+  <li id="M201611160.1">
     <p>В статье с исследованием приватности и 
защищенности 283 приложений Android
 для VPN сделан вывод, что &ldquo;несмотря на 
обещания приватности,
 защищенности и анонимности, которое дают 
большинство приложений для VPN, <a
@@ -292,7 +292,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/05 11:31:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/proprietary-back-doors.fr.html  19 Jan 2019 10:30:55 -0000      
1.64
+++ proprietary/proprietary-back-doors.fr.html  4 Feb 2019 07:31:22 -0000       
1.65
@@ -61,7 +61,7 @@
 <h3 id='spy'>Espionner</h3>
 
 <ul class="blurbs">
-  <li id="M201706202">
+  <li id="M201706200.2">
     <p id="InternetCameraBackDoor">De nombreux modèles de caméras 
connectées contiennent une porte dérobée
 caractérisée. Elles ont des comptes utilisateurs avec des mots de passe
 codés en dur, non modifiables, et qui <a
@@ -179,7 +179,7 @@
 le même tactique.</p>
   </li>
 
-  <li id="M201403121">
+  <li id="M201403120.1">
     <p id="samsung"><a
 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>Les
 Galaxy de Samsung qui tournent sous des versions privatrices d'Android sont
@@ -351,7 +351,7 @@
 abonnement obligatoire</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Dans certaines voitures, Tesla a limité la fraction de batterie 
utilisable
 par ses clients au moyen d'un logiciel et a levé temporairement cette
 limitation au moyen d'une <a
@@ -365,7 +365,7 @@
 ou même de conduire son passager vers une prison de torture.</p>
   </li>
 
-  <li id="M201702061">
+  <li id="M201702060.1">
     <p>Les téléviseurs « intelligents » Vizio <a
 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>ont
 une porte dérobée universelle</a>.</p>
@@ -382,7 +382,7 @@
 existe dans le processeur du modem.</p>
   </li>
 
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft Windows a une porte dérobée universelle 
qui permet <a
 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>d'imposer
 un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -434,7 +434,7 @@
 des <abbr title="Contrat de Licence d'Utilisateur Final">CLUF</abbr></a>.</p>
   </li>
 
-  <li id="M200700001">
+  <li id="M200700000.1">
     <p>En plus de son <a href="#swindle-eraser">effaceur de livre</a>, le
 Kindle-Swindle a une <a
 
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>porte
@@ -603,7 +603,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/19 10:30:55 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/proprietary-back-doors.ru.html  19 Jan 2019 10:00:16 -0000      
1.58
+++ proprietary/proprietary-back-doors.ru.html  4 Feb 2019 07:31:22 -0000       
1.59
@@ -59,7 +59,7 @@
 <h3 id='spy'>Шпионаж</h3>
 
 <ul class="blurbs">
-  <li id="M201706202">
+  <li id="M201706200.2">
     <p id="InternetCameraBackDoor">Во многих моделях 
видеокамер с подключением к Интернету есть 
чудовищная
 лазейка&nbsp;&mdash; у них есть учетная запись с 
неизменяемым паролем, и <a
 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/";>
@@ -172,7 +172,7 @@
 в платных играх.</p>
   </li>
 
-  <li id="M201403121">
+  <li id="M201403120.1">
     <p id="samsung"><a
 
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
 Устройства Samsung Galaxy под управлением 
несвободных версий Android
@@ -340,7 +340,7 @@
 подписки</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Компания Tesla программы, чтобы 
ограничить емкость аккумуляторов, которую
 могли использовать клиенты в некоторых 
моделях, и <a
 
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
@@ -354,7 +354,7 @@
 вообще. Или, скажем, довезти пассажира до 
камеры пыток.</p>
   </li>
 
-  <li id="M201702061">
+  <li id="M201702060.1">
     <p>В &ldquo;умных&rdquo; <a
 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>телевизораÑ
…
 Vizio есть универсальный черный ход</a>.</p>
@@ -370,7 +370,7 @@
 местная телефонная компания</a>.</p>
   </li>
 
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">В Microsoft Windows есть 
универсальный черный ход, по которому <a
 
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
 пользователям можно навязывать какие 
угодно изменения</a>.</p>
@@ -422,7 +422,7 @@
 разделе 4 лицензионного договора 
конечного пользователя</a>.</p>
   </li>
 
-  <li id="M200700001">
+  <li id="M200700000.1">
     <p>В дополнение к <a 
href="#swindle-eraser">уничтожителю книг</a>, в Kindle
 есть <a
 href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
@@ -590,7 +590,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/19 10:00:16 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/proprietary-drm.fr.html 5 Jan 2019 16:29:31 -0000       1.35
+++ proprietary/proprietary-drm.fr.html 4 Feb 2019 07:31:22 -0000       1.36
@@ -199,7 +199,7 @@
 imposées par les studios de cinéma.</p>
   </li>
 
-  <li id="M201410081">
+  <li id="M201410080.1">
     <p>Adobe a fait en sorte que « Digital Editions » (la liseuse 
utilisée par la
 plupart des bibliothèques aux États-Unis), espionne l'utilisateur <a
 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>au
@@ -283,7 +283,7 @@
 DRM du lecteur Flash</a>.</p>
   </li>
 
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>Un DRM 
dans
 Windows</a>, introduit pour répondre aux besoins des disques <a
 href="/proprietary/proprietary-drm.html#bluray">Blu-ray</a>. (L'article
@@ -378,7 +378,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary-drm.ru.html 17 Jan 2019 06:30:30 -0000      1.31
+++ proprietary/proprietary-drm.ru.html 4 Feb 2019 07:31:22 -0000       1.32
@@ -202,7 +202,7 @@
 которые диктуются киностудиями.</p>
   </li>
 
-  <li id="M201410081">
+  <li id="M201410080.1">
     <p>Компания Adobe сделала так, чтобы 
&ldquo;Цифровая редакция&rdquo;, программа
 чтения, применяемая в большинстве 
библиотек США, <a
 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
@@ -289,7 +289,7 @@
 Цифровое управление ограничениями в Flash 
Player</a>.</p>
   </li>
 
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>Цифровое
 управление ограничениями в Windows</a> введено 
в угоду дискам <a
 href="/proprietary/proprietary-drm.html#bluray">Bluray</a> (В статье
@@ -386,7 +386,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/17 06:30:30 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/proprietary-insecurity.fr.html  5 Jan 2019 16:29:31 -0000       
1.81
+++ proprietary/proprietary-insecurity.fr.html  4 Feb 2019 07:31:22 -0000       
1.82
@@ -149,7 +149,7 @@
 href="/philosophy/words-to-avoid.html#Monetize">monétiser</a> ».</p>
   </li>
 
-  <li id="M201706201">
+  <li id="M201706200.1">
     <p>De nombreux modèles de caméras connectées <a
 href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">ont
 des portes dérobées</a>.</p>
@@ -264,7 +264,7 @@
 programme n'est pas libre, nous ne pouvons pas le vérifier en l'étudiant.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>Les jouets « intelligents » <cite>Mon amie Cayla</cite> et
 <cite>i-Que</cite> peuvent être <a
 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>contrôlés
@@ -672,7 +672,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/proprietary-insecurity.ru.html  17 Jan 2019 06:30:30 -0000      
1.68
+++ proprietary/proprietary-insecurity.ru.html  4 Feb 2019 07:31:22 -0000       
1.69
@@ -150,7 +150,7 @@
 &ldquo;монетизировать&rdquo;</a>.</p>
   </li>
 
-  <li id="M201706201">
+  <li id="M201706200.1">
     <p>Во многих моделях <a
 href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
 подключенных к Интернету камер есть 
лазейки</a>.</p>
@@ -259,7 +259,7 @@
 черный ход? Раз программа несвободна, мы не 
можем проверить это, изучив ее.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>&ldquo;Умные&rdquo; игрушки &ldquo;Мой друг 
Кейла&rdquo; и i-Que <a
 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>можно
 контролировать по сотовому телефону</a>; 
физический доступ для этого не
@@ -657,7 +657,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/17 06:30:30 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/proprietary-sabotage.fr.html    3 Feb 2019 17:29:05 -0000       
1.68
+++ proprietary/proprietary-sabotage.fr.html    4 Feb 2019 07:31:22 -0000       
1.69
@@ -128,7 +128,7 @@
 Windows, ni même les anciennes versions de MacOS ne peuvent accéder.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>Le fabricant de Canary, un système domotique de vidéosurveillance, l'a
 saboté en <a
 
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>inactivant
@@ -420,7 +420,7 @@
 l'injustice est la seule raison possible pour imposer un CLUF.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>a
 désactivé des fonctionnalités réseau</a> sur des téléviseurs
@@ -587,7 +587,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/02/03 17:29:05 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ru.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/proprietary-sabotage.ru.html    2 Feb 2019 14:29:26 -0000       
1.57
+++ proprietary/proprietary-sabotage.ru.html    4 Feb 2019 07:31:22 -0000       
1.58
@@ -129,7 +129,7 @@
 GNU/Linux, Windows или даже старыми версиями MacOS.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>Камера домашнего наблюдения Canary 
саботирована ее изготовителем, <a
 
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
 выключающим многие функции, если только 
пользователь не станет платить за
@@ -413,7 +413,7 @@
 причиной навязывания лицензии.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
 отключала сетевые функции</a> в <em>купленных 
до этого</em>
@@ -581,7 +581,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/02/02 14:29:26 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/proprietary-subscriptions.fr.html       5 Jan 2019 16:29:31 
-0000       1.20
+++ proprietary/proprietary-subscriptions.fr.html       4 Feb 2019 07:31:22 
-0000       1.21
@@ -54,7 +54,7 @@
 abonnement obligatoire</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>Le fabricant de Canary, un système domotique de vidéosurveillance, l'a
 saboté en <a
 
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>inactivant
@@ -167,7 +167,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-subscriptions.ru.html       17 Jan 2019 06:30:31 
-0000      1.17
+++ proprietary/proprietary-subscriptions.ru.html       4 Feb 2019 07:31:22 
-0000       1.18
@@ -53,7 +53,7 @@
 подписки</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>Камера домашнего наблюдения Canary 
саботирована ее изготовителем, <a
 
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
 выключающим многие функции, если только 
пользователь не станет платить за
@@ -167,7 +167,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary/proprietary-surveillance.fr.html        3 Feb 2019 19:59:05 
-0000       1.158
+++ proprietary/proprietary-surveillance.fr.html        4 Feb 2019 07:31:22 
-0000       1.159
@@ -234,7 +234,7 @@
 distribue à une autre société.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>Afin d'élargir la base installée de Windows 10, Microsoft <a
 class="not-a-duplicate"
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>manifeste
@@ -410,7 +410,7 @@
 dernier MacOS</a> envoient des rapports aux serveurs d'Apple.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>Le
 moteur de recherche de fichiers <cite>Spotlight</cite></a> envoie à Apple
@@ -1212,7 +1212,7 @@
 aussi mal que ce que font les autres.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>Le clavier Simeji est une version pour smartphone de l'<a
 href="/proprietary/proprietary-surveillance.html#baidu-ime">éditeur espion
 de méthodes de saisie</a> de Baidu.</p>
@@ -2174,7 +2174,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/02/03 19:59:05 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/proprietary-surveillance.ru.html        3 Feb 2019 12:59:20 
-0000       1.165
+++ proprietary/proprietary-surveillance.ru.html        4 Feb 2019 07:31:22 
-0000       1.166
@@ -236,7 +236,7 @@
 время Microsoft передает их другой компании.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>В целях наращивания пользовательской 
базы Windows 10 Microsoft <a
 
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
 допускает вопиющие нарушения выбора 
пользователей и их приватности</a>.</p>
@@ -410,7 +410,7 @@
 последняя версия MacOS высылает отчеты 
серверам Apple</a>.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>Средство
 поиска Spotlight</a> высылает запросы 
пользователя в Apple.</p>
@@ -1205,7 +1205,7 @@
 то, что делают другие.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>Клавиатура Simeji&nbsp;&mdash; смартфонная 
версия <a
 
href="/proprietary/proprietary-surveillance.html#baidu-ime">шпионящего
 метода ввода</a> Baidu.</p>
@@ -2152,7 +2152,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/02/03 12:59:20 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary-tethers.fr.html     5 Jan 2019 16:29:31 -0000       
1.31
+++ proprietary/proprietary-tethers.fr.html     4 Feb 2019 07:31:22 -0000       
1.32
@@ -98,7 +98,7 @@
 abonnement obligatoire</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>Le fabricant de Canary, un système domotique de vidéosurveillance, l'a
 saboté en <a
 
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>inactivant
@@ -247,7 +247,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tethers.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.ru.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/proprietary-tethers.ru.html     17 Jan 2019 06:30:31 -0000      
1.23
+++ proprietary/proprietary-tethers.ru.html     4 Feb 2019 07:31:22 -0000       
1.24
@@ -98,7 +98,7 @@
 подписки</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>Камера домашнего наблюдения Canary 
саботирована ее изготовителем, <a
 
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
 выключающим многие функции, если только 
пользователь не станет платить за
@@ -246,7 +246,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:22 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/malware-amazon.de-diff.html  14 Jan 2019 07:59:32 -0000      
1.17
+++ proprietary/po/malware-amazon.de-diff.html  4 Feb 2019 07:31:22 -0000       
1.18
@@ -116,7 +116,7 @@
     rooted would cease to function at all.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201210221"&gt;</em></ins></span>
+  &lt;li id="M201210220.1"&gt;</em></ins></span>
     &lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to 
&lt;a
     
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was <span 
class="removed"><del><strong>1984,</strong></del></span>
@@ -152,7 +152,7 @@
 <span class="inserted"><ins><em>&lt;h4 
id="surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201212031"&gt;
+  &lt;li id="M201212030.1"&gt;
     &lt;p&gt;The</em></ins></span> Electronic Frontier Foundation has examined 
and found &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
     kinds of surveillance in the Swindle and other <span 
class="removed"><del><strong>e-readers&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>e-readers&lt;/a&gt;.&lt;/p&gt;
@@ -167,7 +167,7 @@
 <span class="inserted"><ins><em>&lt;h4 id="drm"&gt;DRM&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201704131"&gt;
+  &lt;li id="M201704130.1"&gt;
     &lt;p&gt;&lt;a</em></ins></span> 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
     The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
     fails to treat DRM as an ethical question; it takes for granted that
@@ -301,7 +301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-amazon.es-en.html    18 Jan 2019 13:01:09 -0000      
1.16
+++ proprietary/po/malware-amazon.es-en.html    4 Feb 2019 07:31:22 -0000       
1.17
@@ -62,7 +62,7 @@
     rooted would cease to function at all.</p>
   </li>
 
-  <li id="M201210221">
+  <li id="M201210220.1">
     <p>The Amazon Kindle-Swindle has a back door that has been used to <a
     
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
     remotely erase books</a>.  One of the books erased was
@@ -87,7 +87,7 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-  <li id="M201212031">
+  <li id="M201212030.1">
     <p>The Electronic Frontier Foundation has examined and found <a
     href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
     kinds of surveillance in the Swindle and other e-readers</a>.</p>
@@ -98,7 +98,7 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-  <li id="M201704131">
+  <li id="M201704130.1">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
     The Amazon Kindle has DRM</a>.  That article is flawed in that it
     fails to treat DRM as an ethical question; it takes for granted that
@@ -224,7 +224,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-amazon.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/malware-amazon.fr-en.html    14 Jan 2019 07:59:32 -0000      
1.18
+++ proprietary/po/malware-amazon.fr-en.html    4 Feb 2019 07:31:22 -0000       
1.19
@@ -62,7 +62,7 @@
     rooted would cease to function at all.</p>
   </li>
 
-  <li id="M201210221">
+  <li id="M201210220.1">
     <p>The Amazon Kindle-Swindle has a back door that has been used to <a
     
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
     remotely erase books</a>.  One of the books erased was
@@ -87,7 +87,7 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-  <li id="M201212031">
+  <li id="M201212030.1">
     <p>The Electronic Frontier Foundation has examined and found <a
     href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
     kinds of surveillance in the Swindle and other e-readers</a>.</p>
@@ -98,7 +98,7 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-  <li id="M201704131">
+  <li id="M201704130.1">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
     The Amazon Kindle has DRM</a>.  That article is flawed in that it
     fails to treat DRM as an ethical question; it takes for granted that
@@ -224,7 +224,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/malware-amazon.it-diff.html  14 Jan 2019 07:59:32 -0000      
1.30
+++ proprietary/po/malware-amazon.it-diff.html  4 Feb 2019 07:31:22 -0000       
1.31
@@ -116,7 +116,7 @@
     rooted would cease to function at all.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201210221"&gt;</em></ins></span>
+  &lt;li id="M201210220.1"&gt;</em></ins></span>
     &lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to 
&lt;a
     
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was <span 
class="removed"><del><strong>1984,</strong></del></span>
@@ -152,7 +152,7 @@
 <span class="inserted"><ins><em>&lt;h4 
id="surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201212031"&gt;
+  &lt;li id="M201212030.1"&gt;
     &lt;p&gt;The</em></ins></span> Electronic Frontier Foundation has examined 
and found &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
     kinds of surveillance in the Swindle and other <span 
class="removed"><del><strong>e-readers&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>e-readers&lt;/a&gt;.&lt;/p&gt;
@@ -167,7 +167,7 @@
 <span class="inserted"><ins><em>&lt;h4 id="drm"&gt;DRM&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201704131"&gt;
+  &lt;li id="M201704130.1"&gt;
     &lt;p&gt;&lt;a</em></ins></span> 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
     The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
     fails to treat DRM as an ethical question; it takes for granted that
@@ -301,7 +301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/malware-amazon.ja-diff.html  14 Jan 2019 07:59:32 -0000      
1.28
+++ proprietary/po/malware-amazon.ja-diff.html  4 Feb 2019 07:31:22 -0000       
1.29
@@ -111,7 +111,7 @@
     rooted would cease to function at all.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201210221"&gt;</em></ins></span>
+  &lt;li id="M201210220.1"&gt;</em></ins></span>
     &lt;p&gt;The Amazon Kindle-Swindle has a back door that has been used to 
&lt;a
     
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
     remotely erase books&lt;/a&gt;.  One of the books erased was <span 
class="removed"><del><strong>1984,</strong></del></span>
@@ -147,7 +147,7 @@
 <span class="inserted"><ins><em>&lt;h4 
id="surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201212031"&gt;
+  &lt;li id="M201212030.1"&gt;
     &lt;p&gt;The</em></ins></span> Electronic Frontier Foundation has examined 
and found &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;various
     kinds of surveillance in the Swindle and other <span 
class="removed"><del><strong>e-readers&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>e-readers&lt;/a&gt;.&lt;/p&gt;
@@ -162,7 +162,7 @@
 <span class="inserted"><ins><em>&lt;h4 id="drm"&gt;DRM&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201704131"&gt;
+  &lt;li id="M201704130.1"&gt;
     &lt;p&gt;&lt;a</em></ins></span> 
href="http://techin.oureverydaylife.com/kindle-drm-17841.html"&gt;
     The Amazon Kindle has DRM&lt;/a&gt;.  That article is flawed in that it
     fails to treat DRM as an ethical question; it takes for granted that
@@ -290,7 +290,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-amazon.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/malware-amazon.ru-en.html    14 Jan 2019 07:59:32 -0000      
1.19
+++ proprietary/po/malware-amazon.ru-en.html    4 Feb 2019 07:31:22 -0000       
1.20
@@ -62,7 +62,7 @@
     rooted would cease to function at all.</p>
   </li>
 
-  <li id="M201210221">
+  <li id="M201210220.1">
     <p>The Amazon Kindle-Swindle has a back door that has been used to <a
     
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
     remotely erase books</a>.  One of the books erased was
@@ -87,7 +87,7 @@
 <h4 id="surveillance">Surveillance</h4>
 
 <ul class="blurbs">
-  <li id="M201212031">
+  <li id="M201212030.1">
     <p>The Electronic Frontier Foundation has examined and found <a
     href="https://www.eff.org/pages/reader-privacy-chart-2012";>various
     kinds of surveillance in the Swindle and other e-readers</a>.</p>
@@ -98,7 +98,7 @@
 <h4 id="drm">DRM</h4>
 
 <ul class="blurbs">
-  <li id="M201704131">
+  <li id="M201704130.1">
     <p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html";>
     The Amazon Kindle has DRM</a>.  That article is flawed in that it
     fails to treat DRM as an ethical question; it takes for granted that
@@ -224,7 +224,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/malware-apple.de-diff.html   6 Jan 2019 09:59:17 -0000       
1.29
+++ proprietary/po/malware-apple.de-diff.html   4 Feb 2019 07:31:22 -0000       
1.30
@@ -172,7 +172,7 @@
 &lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201704071"&gt;
+  &lt;li id="M201704070.1"&gt;
     &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
       app</strong></del></span> <span class="inserted"><ins><em>iPhone 7 
nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
         a malicious web site</strong></del></span>
@@ -999,7 +999,7 @@
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;Apple used this censorship power in 2014</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201401101"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="inserted"><ins><em>Apple.&lt;/p&gt;
@@ -1148,7 +1148,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/malware-apple.es-en.html     18 Jan 2019 13:01:09 -0000      
1.59
+++ proprietary/po/malware-apple.es-en.html     4 Feb 2019 07:31:22 -0000       
1.60
@@ -126,7 +126,7 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-  <li id="M201704071">
+  <li id="M201704070.1">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
   </li>
@@ -623,7 +623,7 @@
     Technical presentation</a>.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     Spotlight search</a> sends users' search terms to Apple.</p>
@@ -743,7 +743,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/po/malware-apple.fr-en.html     6 Jan 2019 09:59:17 -0000       
1.67
+++ proprietary/po/malware-apple.fr-en.html     4 Feb 2019 07:31:22 -0000       
1.68
@@ -126,7 +126,7 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-  <li id="M201704071">
+  <li id="M201704070.1">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
   </li>
@@ -623,7 +623,7 @@
     Technical presentation</a>.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     Spotlight search</a> sends users' search terms to Apple.</p>
@@ -743,7 +743,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-apple.it-diff.html   6 Jan 2019 09:59:17 -0000       
1.36
+++ proprietary/po/malware-apple.it-diff.html   4 Feb 2019 07:31:22 -0000       
1.37
@@ -180,7 +180,7 @@
 &lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201704071"&gt;
+  &lt;li id="M201704070.1"&gt;
     &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
     href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
   &lt;/li&gt;
@@ -862,7 +862,7 @@
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401101"&gt;
+  &lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
@@ -1014,7 +1014,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/malware-apple.ja-diff.html   6 Jan 2019 09:59:17 -0000       
1.48
+++ proprietary/po/malware-apple.ja-diff.html   4 Feb 2019 07:31:22 -0000       
1.49
@@ -204,7 +204,7 @@
     to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201704071"&gt;
+  &lt;li id="M201704070.1"&gt;
     &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
     malacious code from any application which</strong></del></span>
     <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
@@ -826,7 +826,7 @@
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401101"&gt;
+  &lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
@@ -978,7 +978,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-apple.nl-diff.html   6 Jan 2019 09:59:17 -0000       
1.54
+++ proprietary/po/malware-apple.nl-diff.html   4 Feb 2019 07:31:22 -0000       
1.55
@@ -204,7 +204,7 @@
     to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201704071"&gt;
+  &lt;li id="M201704070.1"&gt;
     &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
     malacious code from any application which</strong></del></span>
     <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
@@ -826,7 +826,7 @@
     Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401101"&gt;
+  &lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
@@ -978,7 +978,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/po/malware-apple.ru-en.html     6 Jan 2019 09:59:17 -0000       
1.67
+++ proprietary/po/malware-apple.ru-en.html     4 Feb 2019 07:31:22 -0000       
1.68
@@ -126,7 +126,7 @@
 <h3 id="drm">Apple DRM</h3>
 
 <ul class="blurbs">
-  <li id="M201704071">
+  <li id="M201704070.1">
     <p>DRM makes the iPhone 7 nearly <a
     href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
   </li>
@@ -623,7 +623,7 @@
     Technical presentation</a>.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     Spotlight search</a> sends users' search terms to Apple.</p>
@@ -743,7 +743,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/malware-appliances.de-diff.html      13 Jan 2019 09:29:35 
-0000      1.30
+++ proprietary/po/malware-appliances.de-diff.html      4 Feb 2019 07:31:22 
-0000       1.31
@@ -598,7 +598,7 @@
     power.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201612061"&gt;
+  &lt;li id="M201612060.1"&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
     controlled with a mobile phone&lt;/a&gt;; physical access is not
@@ -938,7 +938,7 @@
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405201"&gt;</em></ins></span>
+  &lt;li id="M201405200.1"&gt;</em></ins></span>
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
@@ -1228,7 +1228,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/13 09:29:35 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/malware-appliances.fr-en.html        13 Jan 2019 09:59:04 
-0000      1.53
+++ proprietary/po/malware-appliances.fr-en.html        4 Feb 2019 07:31:22 
-0000       1.54
@@ -366,7 +366,7 @@
     power.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
     controlled with a mobile phone</a>; physical access is not
@@ -630,7 +630,7 @@
     data about the user</a>.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
     disabled network features</a> on <em>previously purchased</em>
@@ -826,7 +826,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/13 09:59:04 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-appliances.ru-en.html        13 Jan 2019 11:30:09 
-0000      1.54
+++ proprietary/po/malware-appliances.ru-en.html        4 Feb 2019 07:31:22 
-0000       1.55
@@ -366,7 +366,7 @@
     power.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
     controlled with a mobile phone</a>; physical access is not
@@ -630,7 +630,7 @@
     data about the user</a>.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
     disabled network features</a> on <em>previously purchased</em>
@@ -826,7 +826,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/13 11:30:09 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/malware-cars.de-diff.html    5 Jan 2019 11:31:33 -0000       
1.24
+++ proprietary/po/malware-cars.de-diff.html    4 Feb 2019 07:31:22 -0000       
1.25
@@ -107,7 +107,7 @@
     remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709091"&gt;
+  &lt;li id="M201709090.1"&gt;
     &lt;p&gt;Tesla used software to limit the</em></ins></span> part of the 
battery <span class="removed"><del><strong>of</strong></del></span>
     <span class="inserted"><ins><em>that was available to customers 
in</em></ins></span> some <span 
class="removed"><del><strong>cars&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
@@ -372,7 +372,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-cars.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/malware-cars.fr-en.html      5 Jan 2019 11:31:33 -0000       
1.15
+++ proprietary/po/malware-cars.fr-en.html      4 Feb 2019 07:31:22 -0000       
1.16
@@ -88,7 +88,7 @@
     remotely activate the airbags</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Tesla used software to limit the part of the battery
     that was available to customers in some cars, and <a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
@@ -291,7 +291,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-cars.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-cars.ru-en.html      5 Jan 2019 11:31:33 -0000       
1.16
+++ proprietary/po/malware-cars.ru-en.html      4 Feb 2019 07:31:22 -0000       
1.17
@@ -88,7 +88,7 @@
     remotely activate the airbags</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Tesla used software to limit the part of the battery
     that was available to customers in some cars, and <a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
@@ -291,7 +291,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/malware-microsoft.de-diff.html       3 Feb 2019 15:59:41 
-0000       1.34
+++ proprietary/po/malware-microsoft.de-diff.html       4 Feb 2019 07:31:22 
-0000       1.35
@@ -92,7 +92,7 @@
   &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201608172"&gt;
+  &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft</em></ins></span>
     Windows has a universal back door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
@@ -138,7 +138,7 @@
     say respected security experts.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201112081"&gt;
+  &lt;li id="M201112080.1"&gt;
     &lt;p&gt;Windows 8</em></ins></span> also has a back door for <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
@@ -164,7 +164,7 @@
     Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>id="M200708131"&gt;
+    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>id="M200708130.1"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM</em></ins></span>
     in <span class="removed"><del><strong>fact &lt;a 
     
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
@@ -583,7 +583,7 @@
 &lt;li&gt;It</strong></del></span> <span 
class="inserted"><ins><em>company.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608171"&gt;
+  &lt;li id="M201608170.1"&gt;
     &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and privacy&lt;/a&gt;.&lt;/p&gt;
@@ -870,7 +870,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/malware-microsoft.fr-en.html 3 Feb 2019 17:29:06 -0000       
1.69
+++ proprietary/po/malware-microsoft.fr-en.html 4 Feb 2019 07:31:22 -0000       
1.70
@@ -69,7 +69,7 @@
 <h3 id="back-doors">Microsoft Back Doors</h3>
 
 <ul class="blurbs">
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
@@ -110,7 +110,7 @@
     say respected security experts.</p>
   </li>
 
-  <li id="M201112081">
+  <li id="M201112080.1">
     <p>Windows 8 also has a back door for <a
     
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
     remotely deleting apps</a>.</p>
@@ -127,7 +127,7 @@
 <h3 id="drm">Microsoft DRM</h3>
 
 <ul class="blurbs">
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
     href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
@@ -400,7 +400,7 @@
     now distributes them to another company.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>In order to increase Windows 10's install base, Microsoft <a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
     blatantly disregards user choice and privacy</a>.</p>
@@ -616,7 +616,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-microsoft.it-diff.html       3 Feb 2019 15:59:41 
-0000       1.33
+++ proprietary/po/malware-microsoft.it-diff.html       4 Feb 2019 07:31:22 
-0000       1.34
@@ -91,7 +91,7 @@
   &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201608172"&gt;
+  &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft</em></ins></span>
     Windows has a universal back door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
@@ -137,7 +137,7 @@
     say respected security experts.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201112081"&gt;
+  &lt;li id="M201112080.1"&gt;
     &lt;p&gt;Windows 8</em></ins></span> also has a back door for <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
@@ -163,7 +163,7 @@
     Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>id="M200708131"&gt;
+    &lt;p&gt;Microsoft was</strong></del></span> <span 
class="inserted"><ins><em>id="M200708130.1"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM</em></ins></span>
     in <span class="removed"><del><strong>fact &lt;a 
     
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
@@ -573,7 +573,7 @@
 &lt;li&gt;It</strong></del></span> <span 
class="inserted"><ins><em>company.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608171"&gt;
+  &lt;li id="M201608170.1"&gt;
     &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and privacy&lt;/a&gt;.&lt;/p&gt;
@@ -860,7 +860,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/malware-microsoft.ja-diff.html       3 Feb 2019 15:59:41 
-0000       1.43
+++ proprietary/po/malware-microsoft.ja-diff.html       4 Feb 2019 07:31:22 
-0000       1.44
@@ -99,7 +99,7 @@
   &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201608172"&gt;
+  &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft</em></ins></span>
     Windows has a universal back door through which &lt;a <span 
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;</em></ins></span>
@@ -145,7 +145,7 @@
     say respected security experts.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201112081"&gt;
+  &lt;li id="M201112080.1"&gt;
     &lt;p&gt;Windows 8</em></ins></span> also has a back door for <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
@@ -173,7 +173,7 @@
 &lt;h3 id="drm"&gt;Microsoft DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M200708131"&gt;
+  &lt;li id="M200708130.1"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM</em></ins></span>
     in <span class="removed"><del><strong>fact &lt;a 
     
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
@@ -551,7 +551,7 @@
 &lt;li&gt;It</strong></del></span> <span 
class="inserted"><ins><em>company.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608171"&gt;
+  &lt;li id="M201608170.1"&gt;
     &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and privacy&lt;/a&gt;.&lt;/p&gt;
@@ -834,7 +834,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-microsoft.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru-en.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/malware-microsoft.ru-en.html 3 Feb 2019 16:30:30 -0000       
1.68
+++ proprietary/po/malware-microsoft.ru-en.html 4 Feb 2019 07:31:22 -0000       
1.69
@@ -69,7 +69,7 @@
 <h3 id="back-doors">Microsoft Back Doors</h3>
 
 <ul class="blurbs">
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
@@ -110,7 +110,7 @@
     say respected security experts.</p>
   </li>
 
-  <li id="M201112081">
+  <li id="M201112080.1">
     <p>Windows 8 also has a back door for <a
     
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html";>
     remotely deleting apps</a>.</p>
@@ -127,7 +127,7 @@
 <h3 id="drm">Microsoft DRM</h3>
 
 <ul class="blurbs">
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
     href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
@@ -400,7 +400,7 @@
     now distributes them to another company.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>In order to increase Windows 10's install base, Microsoft <a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
     blatantly disregards user choice and privacy</a>.</p>
@@ -616,7 +616,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:22 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-mobiles.de-diff.html 3 Feb 2019 15:59:41 -0000       
1.36
+++ proprietary/po/malware-mobiles.de-diff.html 4 Feb 2019 07:31:22 -0000       
1.37
@@ -90,7 +90,7 @@
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p 
id="universal-back-door"&gt;Almost</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201311121"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201311120.1"&gt;
     &lt;p id="universal-back-door"&gt;
     Almost</em></ins></span> every phone's communication processor has
     a universal back door which is &lt;a
@@ -997,7 +997,7 @@
     Samsung's back door&lt;/a&gt; provides access to</em></ins></span> any 
<span class="inserted"><ins><em>file on the system.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401151"&gt;
+  &lt;li id="M201401150.1"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
@@ -1205,7 +1205,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/malware-mobiles.fr-en.html   3 Feb 2019 17:29:06 -0000       
1.52
+++ proprietary/po/malware-mobiles.fr-en.html   4 Feb 2019 07:31:23 -0000       
1.53
@@ -74,7 +74,7 @@
     these location data for months or years.</p>
   </li>
 
-  <li id="M201311121">
+  <li id="M201311120.1">
     <p id="universal-back-door">
     Almost every phone's communication processor has
     a universal back door which is <a
@@ -786,7 +786,7 @@
     Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>The Simeji keyboard is a smartphone version of Baidu's <a
     href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
     title="Input Method Editor">IME</abbr></a>.</p>
@@ -914,7 +914,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/malware-mobiles.it-diff.html 3 Feb 2019 15:59:41 -0000       
1.41
+++ proprietary/po/malware-mobiles.it-diff.html 4 Feb 2019 07:31:23 -0000       
1.42
@@ -143,7 +143,7 @@
     these location data for months or years.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201311121"&gt;
+  &lt;li id="M201311120.1"&gt;
     &lt;p id="universal-back-door"&gt;
     Almost every phone's communication processor has</em></ins></span>
     a universal back <span class="removed"><del><strong>door. &lt;/p&gt;
@@ -1094,7 +1094,7 @@
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201401151"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li 
id="M201401150.1"&gt;</em></ins></span>
     &lt;p&gt;The <span class="removed"><del><strong>iPhone 7 contains DRM 
specifically designed</strong></del></span> <span 
class="inserted"><ins><em>Simeji keyboard is a smartphone version of Baidu's 
&lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
@@ -1241,7 +1241,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/malware-mobiles.ja-diff.html 3 Feb 2019 15:59:41 -0000       
1.55
+++ proprietary/po/malware-mobiles.ja-diff.html 4 Feb 2019 07:31:23 -0000       
1.56
@@ -123,7 +123,7 @@
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Most mobile phones 
have</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201311121"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201311120.1"&gt;
     &lt;p id="universal-back-door"&gt;
     Almost every phone's communication processor has</em></ins></span>
     a universal back <span 
class="removed"><del><strong>door,</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span> which <span 
class="removed"><del><strong>has been</strong></del></span> <span 
class="inserted"><ins><em>is &lt;a
@@ -904,7 +904,7 @@
     Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401151"&gt;
+  &lt;li id="M201401150.1"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
@@ -1081,7 +1081,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/malware-mobiles.ru-en.html   3 Feb 2019 16:30:30 -0000       
1.55
+++ proprietary/po/malware-mobiles.ru-en.html   4 Feb 2019 07:31:23 -0000       
1.56
@@ -74,7 +74,7 @@
     these location data for months or years.</p>
   </li>
 
-  <li id="M201311121">
+  <li id="M201311120.1">
     <p id="universal-back-door">
     Almost every phone's communication processor has
     a universal back door which is <a
@@ -786,7 +786,7 @@
     Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>The Simeji keyboard is a smartphone version of Baidu's <a
     href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
     title="Input Method Editor">IME</abbr></a>.</p>
@@ -914,7 +914,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-webpages.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/malware-webpages.de-diff.html        5 Jan 2019 11:31:33 
-0000       1.25
+++ proprietary/po/malware-webpages.de-diff.html        4 Feb 2019 07:31:23 
-0000       1.26
@@ -151,7 +151,7 @@
     proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201611161"&gt;</em></ins></span>
+  &lt;li id="M201611160.1"&gt;</em></ins></span>
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -289,7 +289,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-webpages.fr-en.html  5 Jan 2019 16:29:31 -0000       
1.16
+++ proprietary/po/malware-webpages.fr-en.html  4 Feb 2019 07:31:23 -0000       
1.17
@@ -128,7 +128,7 @@
     proprietary software contributes.</p>
   </li>
 
-  <li id="M201611161">
+  <li id="M201611160.1">
     <p>A <a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
     research paper</a> that investigated the privacy and security of
@@ -261,7 +261,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/malware-webpages.ru-en.html  5 Jan 2019 11:31:33 -0000       
1.17
+++ proprietary/po/malware-webpages.ru-en.html  4 Feb 2019 07:31:23 -0000       
1.18
@@ -128,7 +128,7 @@
     proprietary software contributes.</p>
   </li>
 
-  <li id="M201611161">
+  <li id="M201611160.1">
     <p>A <a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf";>
     research paper</a> that investigated the privacy and security of
@@ -261,7 +261,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary-back-doors.de-diff.html  19 Jan 2019 09:30:12 
-0000      1.20
+++ proprietary/po/proprietary-back-doors.de-diff.html  4 Feb 2019 07:31:23 
-0000       1.21
@@ -74,7 +74,7 @@
   &lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id='spy'&gt;Spying&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201706202"&gt;</em></ins></span>
+  &lt;li id="M201706200.2"&gt;</em></ins></span>
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, and &lt;a
@@ -232,7 +232,7 @@
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;&lt;a id="samsung"</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201403121"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
     &lt;p id="samsung"&gt;&lt;a</em></ins></span>
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
     Samsung Galaxy devices running proprietary Android versions come with
@@ -446,7 +446,7 @@
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201709091"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li 
id="M201709090.1"&gt;</em></ins></span>
     &lt;p&gt;Tesla <span class="removed"><del><strong>cars have 
a</strong></del></span> <span class="inserted"><ins><em>used software to limit 
the part of the battery
     that was available to customers in some cars, and</em></ins></span> &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
@@ -462,7 +462,7 @@
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702061"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li 
id="M201702060.1"&gt;</em></ins></span>
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
     have a universal back door&lt;/a&gt;.&lt;/p&gt;
@@ -493,7 +493,7 @@
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;Microsoft</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201608172"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft</em></ins></span>
     Windows has a universal back door through which &lt;a
       <span 
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;</strong></del></span>
@@ -555,7 +555,7 @@
     section 4 of the EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M200700001"&gt;
+  &lt;li id="M200700000.1"&gt;
     &lt;p&gt;In addition to its &lt;a href="#swindle-eraser"&gt;book
     eraser&lt;/a&gt;, the Kindle-Swindle has a &lt;a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
@@ -756,7 +756,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/19 09:30:12 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary-back-doors.fr-en.html    19 Jan 2019 10:30:55 
-0000      1.57
+++ proprietary/po/proprietary-back-doors.fr-en.html    4 Feb 2019 07:31:23 
-0000       1.58
@@ -52,7 +52,7 @@
 <h3 id='spy'>Spying</h3>
 
 <ul class="blurbs">
-  <li id="M201706202">
+  <li id="M201706200.2">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, and <a
@@ -168,7 +168,7 @@
     can use the same tactics.</p>
   </li>
 
-  <li id="M201403121">
+  <li id="M201403120.1">
     <p id="samsung"><a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
     Samsung Galaxy devices running proprietary Android versions come with
@@ -339,7 +339,7 @@
     a subscription</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Tesla used software to limit the part of the battery
     that was available to customers in some cars, and <a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
@@ -353,7 +353,7 @@
     perhaps to drive its passenger to a torture prison.</p>
   </li>
 
-  <li id="M201702061">
+  <li id="M201702060.1">
     <p>Vizio &ldquo;smart&rdquo; TVs <a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
     have a universal back door</a>.</p>
@@ -370,7 +370,7 @@
     company can use</a>.</p>
   </li>
 
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
@@ -422,7 +422,7 @@
     section 4 of the EULA</a>.</p>
   </li>
 
-  <li id="M200700001">
+  <li id="M200700000.1">
     <p>In addition to its <a href="#swindle-eraser">book
     eraser</a>, the Kindle-Swindle has a <a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
@@ -568,7 +568,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/19 10:30:55 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary-back-doors.it-diff.html  19 Jan 2019 09:30:12 
-0000      1.46
+++ proprietary/po/proprietary-back-doors.it-diff.html  4 Feb 2019 07:31:23 
-0000       1.47
@@ -68,7 +68,7 @@
 &lt;h3 id='spy'&gt;Spying&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201706202"&gt;</em></ins></span>
+  &lt;li id="M201706200.2"&gt;</em></ins></span>
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
     cameras contain a glaring <span 
class="removed"><del><strong>backdoor&mdash;they</strong></del></span> <span 
class="inserted"><ins><em>back door&mdash;they</em></ins></span> have login
     accounts with hard-coded passwords, which can't be changed, and &lt;a
@@ -235,7 +235,7 @@
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;Dell computers, shipped</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201403121"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
     &lt;p id="samsung"&gt;&lt;a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
     Samsung Galaxy devices running proprietary Android versions 
come</em></ins></span> with <span class="removed"><del><strong>Windows, 
had</strong></del></span>
@@ -529,7 +529,7 @@
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709091"&gt;
+  &lt;li id="M201709090.1"&gt;
     &lt;p&gt;Tesla used software to limit the part of the battery
     that was available to customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
@@ -543,7 +543,7 @@
     perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201702061"&gt;
+  &lt;li id="M201702060.1"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
     have a universal back door&lt;/a&gt;.&lt;/p&gt;
@@ -560,7 +560,7 @@
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608172"&gt;
+  &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft
     Windows has a universal back door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
@@ -631,7 +631,7 @@
 &lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M200700001"&gt;
+  &lt;li id="M200700000.1"&gt;
     &lt;p&gt;In addition</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it would delete books only
 following orders from the state.  However, that policy didn't last.
 In 2012
@@ -831,7 +831,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/19 09:30:12 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-back-doors.ja-diff.html  19 Jan 2019 09:30:12 
-0000      1.43
+++ proprietary/po/proprietary-back-doors.ja-diff.html  4 Feb 2019 07:31:23 
-0000       1.44
@@ -78,7 +78,7 @@
 &lt;h3 id='spy'&gt;Spying&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201706202"&gt;
+  &lt;li id="M201706200.2"&gt;
     &lt;p id="InternetCameraBackDoor"&gt;Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/"&gt;installed</strong></del></span>
@@ -212,7 +212,7 @@
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;Dell computers, shipped</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201403121"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201403120.1"&gt;
     &lt;p id="samsung"&gt;&lt;a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
     Samsung Galaxy devices running proprietary Android versions 
come</em></ins></span> with <span class="removed"><del><strong>Windows, 
had</strong></del></span>
@@ -487,7 +487,7 @@
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201709091"&gt;
+  &lt;li id="M201709090.1"&gt;
     &lt;p&gt;Tesla used software to limit</em></ins></span> the <span 
class="removed"><del><strong>programs, and you
 should have</strong></del></span> <span class="inserted"><ins><em>part 
of</em></ins></span> the <span class="removed"><del><strong>right to decide who 
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
     that was available</em></ins></span> to <span 
class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>customers in some cars, and &lt;a
@@ -510,7 +510,7 @@
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;In Android,</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702061"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201702060.1"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
 Google has</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
@@ -528,7 +528,7 @@
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608172"&gt;
+  &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft
     Windows has</em></ins></span> a <span class="removed"><del><strong>program
 called GTalkService).
@@ -612,7 +612,7 @@
 &lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M200700001"&gt;
+  &lt;li id="M200700000.1"&gt;
     &lt;p&gt;In addition</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it would delete books only
 following orders from the state.  However, that policy didn't last.
 In 2012
@@ -812,7 +812,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/19 09:30:12 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary-back-doors.ru-en.html    19 Jan 2019 10:00:16 
-0000      1.60
+++ proprietary/po/proprietary-back-doors.ru-en.html    4 Feb 2019 07:31:23 
-0000       1.61
@@ -52,7 +52,7 @@
 <h3 id='spy'>Spying</h3>
 
 <ul class="blurbs">
-  <li id="M201706202">
+  <li id="M201706200.2">
     <p id="InternetCameraBackDoor">Many models of Internet-connected
     cameras contain a glaring back door&mdash;they have login
     accounts with hard-coded passwords, which can't be changed, and <a
@@ -168,7 +168,7 @@
     can use the same tactics.</p>
   </li>
 
-  <li id="M201403121">
+  <li id="M201403120.1">
     <p id="samsung"><a
     
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor";>
     Samsung Galaxy devices running proprietary Android versions come with
@@ -339,7 +339,7 @@
     a subscription</a>.</p>
   </li>
 
-  <li id="M201709091">
+  <li id="M201709090.1">
     <p>Tesla used software to limit the part of the battery
     that was available to customers in some cars, and <a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/";>
@@ -353,7 +353,7 @@
     perhaps to drive its passenger to a torture prison.</p>
   </li>
 
-  <li id="M201702061">
+  <li id="M201702060.1">
     <p>Vizio &ldquo;smart&rdquo; TVs <a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen";>
     have a universal back door</a>.</p>
@@ -370,7 +370,7 @@
     company can use</a>.</p>
   </li>
 
-  <li id="M201608172">
+  <li id="M201608171">
     <p id="windows-update">Microsoft
     Windows has a universal back door through which <a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183";>
@@ -422,7 +422,7 @@
     section 4 of the EULA</a>.</p>
   </li>
 
-  <li id="M200700001">
+  <li id="M200700000.1">
     <p>In addition to its <a href="#swindle-eraser">book
     eraser</a>, the Kindle-Swindle has a <a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090";>
@@ -568,7 +568,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/19 10:00:16 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary-drm.de-diff.html 5 Jan 2019 11:31:34 -0000       
1.19
+++ proprietary/po/proprietary-drm.de-diff.html 4 Feb 2019 07:31:23 -0000       
1.20
@@ -272,7 +272,7 @@
     movie studios.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201410081"&gt;
+  &lt;li id="M201410080.1"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, spy on the user &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;for
@@ -373,7 +373,7 @@
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200708131"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li 
id="M200708130.1"&gt;</em></ins></span>
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM
     in Windows&lt;/a&gt;, introduced to cater to &lt;a <span 
class="removed"><del><strong>href="#bluray"&gt;Bluray&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt;</em></ins></span>
 disks. 
@@ -483,7 +483,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-drm.fr-en.html   5 Jan 2019 16:29:32 -0000       
1.31
+++ proprietary/po/proprietary-drm.fr-en.html   4 Feb 2019 07:31:23 -0000       
1.32
@@ -191,7 +191,7 @@
     movie studios.</p>
   </li>
 
-  <li id="M201410081">
+  <li id="M201410080.1">
     <p>Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, spy on the user <a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>for
@@ -273,7 +273,7 @@
     DRM in Flash Player</a>.</p>
   </li>
 
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
     href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
@@ -347,7 +347,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.it-diff.html 5 Jan 2019 11:31:34 -0000       
1.32
+++ proprietary/po/proprietary-drm.it-diff.html 4 Feb 2019 07:31:23 -0000       
1.33
@@ -280,7 +280,7 @@
 
 <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201410081"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201410080.1"&gt;
     &lt;p&gt;Adobe</em></ins></span> made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, spy on the user &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;for
@@ -370,7 +370,7 @@
     DRM in Flash Player&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M200708131"&gt;
+  &lt;li id="M200708130.1"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM
     in Windows&lt;/a&gt;, introduced to cater to &lt;a
     href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt; disks. 
@@ -445,7 +445,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.ja-diff.html 5 Jan 2019 11:31:34 -0000       
1.32
+++ proprietary/po/proprietary-drm.ja-diff.html 4 Feb 2019 07:31:23 -0000       
1.33
@@ -273,7 +273,7 @@
 
 <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201410081"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201410080.1"&gt;
     &lt;p&gt;Adobe</em></ins></span> made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, spy on the user &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;for
@@ -363,7 +363,7 @@
     DRM in Flash Player&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M200708131"&gt;
+  &lt;li id="M200708130.1"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;DRM
     in Windows&lt;/a&gt;, introduced to cater to &lt;a
     href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt; disks. 
@@ -438,7 +438,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.ru-en.html   17 Jan 2019 06:30:31 -0000      
1.32
+++ proprietary/po/proprietary-drm.ru-en.html   4 Feb 2019 07:31:23 -0000       
1.33
@@ -191,7 +191,7 @@
     movie studios.</p>
   </li>
 
-  <li id="M201410081">
+  <li id="M201410080.1">
     <p>Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, spy on the user <a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>for
@@ -273,7 +273,7 @@
     DRM in Flash Player</a>.</p>
   </li>
 
-  <li id="M200708131">
+  <li id="M200708130.1">
     <p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
     in Windows</a>, introduced to cater to <a
     href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks. 
@@ -347,7 +347,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-insecurity.de-diff.html  5 Jan 2019 11:31:34 
-0000       1.21
+++ proprietary/po/proprietary-insecurity.de-diff.html  4 Feb 2019 07:31:23 
-0000       1.22
@@ -183,7 +183,7 @@
       Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
       to watch the people who are watching TV.&lt;/p&gt;
 &lt;/li&gt;
-&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201706201"&gt;</em></ins></span>
+&lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201706200.1"&gt;</em></ins></span>
     &lt;p&gt;Many models of Internet-connected cameras &lt;a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
     have backdoors&lt;/a&gt;.&lt;/p&gt;
@@ -333,7 +333,7 @@
 &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201612061"&gt;</em></ins></span>
+  &lt;li id="M201612060.1"&gt;</em></ins></span>
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
     controlled with a mobile phone&lt;/a&gt;; physical access is not
@@ -933,7 +933,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-insecurity.fr-en.html    5 Jan 2019 16:29:32 
-0000       1.70
+++ proprietary/po/proprietary-insecurity.fr-en.html    4 Feb 2019 07:31:23 
-0000       1.71
@@ -139,7 +139,7 @@
     
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
   </li>
 
-  <li id="M201706201">
+  <li id="M201706200.1">
     <p>Many models of Internet-connected cameras <a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
     have backdoors</a>.</p>
@@ -251,7 +251,7 @@
     studying it.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
     controlled with a mobile phone</a>; physical access is not
@@ -631,7 +631,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/proprietary-insecurity.it-diff.html  5 Jan 2019 11:31:34 
-0000       1.35
+++ proprietary/po/proprietary-insecurity.it-diff.html  4 Feb 2019 07:31:23 
-0000       1.36
@@ -192,7 +192,7 @@
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201706201"&gt;
+  &lt;li id="M201706200.1"&gt;
     &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>Windows computers with ransomware&lt;/a&gt;.
        &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected cameras &lt;a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
@@ -318,7 +318,7 @@
 &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201612061"&gt;</em></ins></span>
+  &lt;li id="M201612060.1"&gt;</em></ins></span>
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
     controlled with a mobile phone&lt;/a&gt;; physical access is not
@@ -923,7 +923,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-insecurity.ja-diff.html  5 Jan 2019 11:31:34 
-0000       1.53
+++ proprietary/po/proprietary-insecurity.ja-diff.html  4 Feb 2019 07:31:23 
-0000       1.54
@@ -189,7 +189,7 @@
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201706201"&gt;
+  &lt;li id="M201706200.1"&gt;
     &lt;p&gt;Many models of Internet-connected cameras &lt;a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
     have backdoors&lt;/a&gt;.&lt;/p&gt;
@@ -301,7 +301,7 @@
     studying it.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201612061"&gt;
+  &lt;li id="M201612060.1"&gt;
     &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;remotely
     controlled with a mobile phone&lt;/a&gt;; physical access is not
@@ -867,7 +867,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/proprietary-insecurity.ru-en.html    17 Jan 2019 06:30:31 
-0000      1.69
+++ proprietary/po/proprietary-insecurity.ru-en.html    4 Feb 2019 07:31:23 
-0000       1.70
@@ -139,7 +139,7 @@
     
href="/philosophy/words-to-avoid.html#Monetize">&ldquo;monetize&rdquo;</a>.</p>
   </li>
 
-  <li id="M201706201">
+  <li id="M201706200.1">
     <p>Many models of Internet-connected cameras <a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
     have backdoors</a>.</p>
@@ -251,7 +251,7 @@
     studying it.</p>
   </li>
 
-  <li id="M201612061">
+  <li id="M201612060.1">
     <p>The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que can be <a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws";>remotely
     controlled with a mobile phone</a>; physical access is not
@@ -631,7 +631,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/proprietary-sabotage.de-diff.html    2 Feb 2019 13:31:31 
-0000       1.27
+++ proprietary/po/proprietary-sabotage.de-diff.html    4 Feb 2019 07:31:23 
-0000       1.28
@@ -154,7 +154,7 @@
     accessed from GNU/Linux, Windows</em></ins></span> or <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201710041"&gt;
+  &lt;li id="M201710040.1"&gt;
     &lt;p&gt;The Canary home surveillance
     camera has been sabotaged by its manufacturer, &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -566,7 +566,7 @@
     only motive for imposing an EULA.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405201"&gt;
+  &lt;li id="M201405200.1"&gt;
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
@@ -756,7 +756,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/02 13:31:31 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-sabotage.fr-en.html      3 Feb 2019 17:29:06 
-0000       1.59
+++ proprietary/po/proprietary-sabotage.fr-en.html      4 Feb 2019 07:31:23 
-0000       1.60
@@ -117,7 +117,7 @@
     accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>The Canary home surveillance
     camera has been sabotaged by its manufacturer, <a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
@@ -406,7 +406,7 @@
     only motive for imposing an EULA.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
     disabled network features</a> on <em>previously purchased</em>
@@ -550,7 +550,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-sabotage.it-diff.html    2 Feb 2019 13:31:31 
-0000       1.37
+++ proprietary/po/proprietary-sabotage.it-diff.html    4 Feb 2019 07:31:23 
-0000       1.38
@@ -132,7 +132,7 @@
     accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201710041"&gt;
+  &lt;li id="M201710040.1"&gt;
     &lt;p&gt;The Canary home surveillance
     camera has been sabotaged by its manufacturer, &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -528,7 +528,7 @@
     only motive for imposing an EULA.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405201"&gt;
+  &lt;li id="M201405200.1"&gt;
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
@@ -719,7 +719,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/02 13:31:31 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-sabotage.ja-diff.html    2 Feb 2019 13:31:31 
-0000       1.40
+++ proprietary/po/proprietary-sabotage.ja-diff.html    4 Feb 2019 07:31:23 
-0000       1.41
@@ -133,7 +133,7 @@
     accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201710041"&gt;
+  &lt;li id="M201710040.1"&gt;
     &lt;p&gt;The Canary home surveillance
     camera has been sabotaged by its manufacturer, &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -508,7 +508,7 @@
     only motive for imposing an EULA.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201405201"&gt;
+  &lt;li id="M201405200.1"&gt;
     &lt;p&gt;LG &lt;a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
@@ -699,7 +699,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/02 13:31:31 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru-en.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-sabotage.ru-en.html      2 Feb 2019 14:29:26 
-0000       1.58
+++ proprietary/po/proprietary-sabotage.ru-en.html      4 Feb 2019 07:31:23 
-0000       1.59
@@ -117,7 +117,7 @@
     accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>The Canary home surveillance
     camera has been sabotaged by its manufacturer, <a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
@@ -406,7 +406,7 @@
     only motive for imposing an EULA.</p>
   </li>
 
-  <li id="M201405201">
+  <li id="M201405200.1">
     <p>LG <a
     
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
     disabled network features</a> on <em>previously purchased</em>
@@ -550,7 +550,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/02 14:29:26 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-subscriptions.de-diff.html       5 Jan 2019 
11:31:35 -0000       1.15
+++ proprietary/po/proprietary-subscriptions.de-diff.html       4 Feb 2019 
07:31:23 -0000       1.16
@@ -61,7 +61,7 @@
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="inserted"><ins><em>id="M201710041"&gt;
+  &lt;li <span class="inserted"><ins><em>id="M201710040.1"&gt;
     &lt;p&gt;The Canary home surveillance
     camera has been sabotaged by its manufacturer, &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -156,7 +156,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-subscriptions.fr-en.html 5 Jan 2019 16:29:32 
-0000       1.18
+++ proprietary/po/proprietary-subscriptions.fr-en.html 4 Feb 2019 07:31:23 
-0000       1.19
@@ -48,7 +48,7 @@
     a subscription</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>The Canary home surveillance
     camera has been sabotaged by its manufacturer, <a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
@@ -143,7 +143,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-subscriptions.ja-diff.html       5 Jan 2019 
11:31:35 -0000       1.22
+++ proprietary/po/proprietary-subscriptions.ja-diff.html       4 Feb 2019 
07:31:23 -0000       1.23
@@ -63,7 +63,7 @@
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201710041"&gt;
+  &lt;li id="M201710040.1"&gt;
     &lt;p&gt;The Canary home surveillance
     camera has been sabotaged by its manufacturer, &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -159,7 +159,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-subscriptions.ru-en.html 17 Jan 2019 06:30:31 
-0000      1.17
+++ proprietary/po/proprietary-subscriptions.ru-en.html 4 Feb 2019 07:31:23 
-0000       1.18
@@ -48,7 +48,7 @@
     a subscription</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>The Canary home surveillance
     camera has been sabotaged by its manufacturer, <a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
@@ -143,7 +143,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary-surveillance.de-diff.html        3 Feb 2019 
11:31:32 -0000       1.38
+++ proprietary/po/proprietary-surveillance.de-diff.html        4 Feb 2019 
07:31:23 -0000       1.39
@@ -281,7 +281,7 @@
 &lt;li&gt;In</strong></del></span> <span 
class="inserted"><ins><em>company.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608171"&gt;
+  &lt;li id="M201608170.1"&gt;
     &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span> 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -498,7 +498,7 @@
     the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401101"&gt;
+  &lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a</em></ins></span>
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
@@ -1675,7 +1675,7 @@
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401151"&gt;
+  &lt;li id="M201401150.1"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
@@ -3090,7 +3090,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 11:31:32 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary-surveillance.fr-en.html  3 Feb 2019 17:29:06 
-0000       1.144
+++ proprietary/po/proprietary-surveillance.fr-en.html  4 Feb 2019 07:31:23 
-0000       1.145
@@ -229,7 +229,7 @@
     now distributes them to another company.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>In order to increase Windows 10's install base, Microsoft <a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
     blatantly disregards user choice and privacy</a>.</p>
@@ -398,7 +398,7 @@
     the latest MacOS send reports to Apple</a> servers.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     Spotlight search</a> sends users' search terms to Apple.</p>
@@ -1167,7 +1167,7 @@
     as bad as what the others do.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>The Simeji keyboard is a smartphone version of Baidu's <a
     href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
     title="Input Method Editor">IME</abbr></a>.</p>
@@ -2066,7 +2066,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary/po/proprietary-surveillance.it-diff.html        3 Feb 2019 
11:31:32 -0000       1.105
+++ proprietary/po/proprietary-surveillance.it-diff.html        4 Feb 2019 
07:31:23 -0000       1.106
@@ -280,7 +280,7 @@
 &lt;li&gt;In</strong></del></span> <span 
class="inserted"><ins><em>company.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608171"&gt;
+  &lt;li id="M201608170.1"&gt;
     &lt;p&gt;In</em></ins></span> order to increase Windows 10's install base, 
Microsoft &lt;a <span 
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span> 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -493,7 +493,7 @@
     the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401101"&gt;
+  &lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
Apple.&lt;/p&gt;
@@ -1684,7 +1684,7 @@
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401151"&gt;
+  &lt;li id="M201401150.1"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
@@ -2916,7 +2916,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 11:31:32 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/proprietary-surveillance.ja-diff.html        3 Feb 2019 
11:31:32 -0000       1.115
+++ proprietary/po/proprietary-surveillance.ja-diff.html        4 Feb 2019 
07:31:23 -0000       1.116
@@ -279,7 +279,7 @@
     now distributes them to another company.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201608171"&gt;
+  &lt;li id="M201608170.1"&gt;
     &lt;p&gt;In order to increase Windows 10's install base, Microsoft &lt;a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
     blatantly disregards user</em></ins></span> choice and <span 
class="removed"><del><strong>privacy&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>privacy&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
@@ -491,7 +491,7 @@
     the latest MacOS send reports to Apple&lt;/a&gt; servers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401101"&gt;
+  &lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a</em></ins></span>
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
     Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
@@ -1588,7 +1588,7 @@
     as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201401151"&gt;
+  &lt;li id="M201401150.1"&gt;
     &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
     href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
     title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
@@ -2762,7 +2762,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/03 11:31:32 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary/po/proprietary-surveillance.ru-en.html  3 Feb 2019 12:59:20 
-0000       1.148
+++ proprietary/po/proprietary-surveillance.ru-en.html  4 Feb 2019 07:31:23 
-0000       1.149
@@ -229,7 +229,7 @@
     now distributes them to another company.</p>
   </li>
 
-  <li id="M201608171">
+  <li id="M201608170.1">
     <p>In order to increase Windows 10's install base, Microsoft <a 
class="not-a-duplicate" 
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
     blatantly disregards user choice and privacy</a>.</p>
@@ -398,7 +398,7 @@
     the latest MacOS send reports to Apple</a> servers.</p>
   </li>
 
-  <li id="M201401101">
+  <li id="M201401100.1">
     <p><a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
     Spotlight search</a> sends users' search terms to Apple.</p>
@@ -1167,7 +1167,7 @@
     as bad as what the others do.</p>
   </li>
 
-  <li id="M201401151">
+  <li id="M201401150.1">
     <p>The Simeji keyboard is a smartphone version of Baidu's <a
     href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
     title="Input Method Editor">IME</abbr></a>.</p>
@@ -2066,7 +2066,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/02/03 12:59:20 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-tethers.de-diff.html     5 Jan 2019 11:31:36 
-0000       1.14
+++ proprietary/po/proprietary-tethers.de-diff.html     4 Feb 2019 07:31:23 
-0000       1.15
@@ -119,7 +119,7 @@
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201710041"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li 
id="M201710040.1"&gt;</em></ins></span>
     &lt;p&gt;The Canary home surveillance
     camera has been sabotaged by its manufacturer, &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -265,7 +265,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:36 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-tethers.fr-en.html       5 Jan 2019 16:29:32 
-0000       1.24
+++ proprietary/po/proprietary-tethers.fr-en.html       4 Feb 2019 07:31:23 
-0000       1.25
@@ -91,7 +91,7 @@
     a subscription</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>The Canary home surveillance
     camera has been sabotaged by its manufacturer, <a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
@@ -220,7 +220,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-tethers.ja-diff.html     5 Jan 2019 11:31:36 
-0000       1.31
+++ proprietary/po/proprietary-tethers.ja-diff.html     4 Feb 2019 07:31:23 
-0000       1.32
@@ -105,7 +105,7 @@
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201710041"&gt;
+  &lt;li id="M201710040.1"&gt;
     &lt;p&gt;The Canary home surveillance
     camera has been sabotaged by its manufacturer, &lt;a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
@@ -249,7 +249,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:36 $
+$Date: 2019/02/04 07:31:23 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tethers.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-tethers.ru-en.html       17 Jan 2019 06:30:32 
-0000      1.23
+++ proprietary/po/proprietary-tethers.ru-en.html       4 Feb 2019 07:31:23 
-0000       1.24
@@ -91,7 +91,7 @@
     a subscription</a>.</p>
   </li>
 
-  <li id="M201710041">
+  <li id="M201710040.1">
     <p>The Canary home surveillance
     camera has been sabotaged by its manufacturer, <a
     
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change";>
@@ -220,7 +220,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/01/17 06:30:32 $
+$Date: 2019/02/04 07:31:23 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]