www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Fri, 8 Feb 2019 03:59:39 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/08 03:59:37

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-amazon.it.po malware-apple.it.po 
                         malware-microsoft.it.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-back-doors.it.po 
                         proprietary-censorship.it.po 
                         proprietary-drm.it.po 
                         proprietary-insecurity.it.po 
                         proprietary-sabotage.it.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary-tyrants.it.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.370&r2=1.371
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.242&r2=1.243
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.463&r2=1.464
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.23&r2=1.24

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- de.po       7 Feb 2019 10:59:49 -0000       1.23
+++ de.po       8 Feb 2019 08:59:35 -0000       1.24
@@ -7145,6 +7145,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- es.po       7 Feb 2019 11:31:42 -0000       1.29
+++ es.po       8 Feb 2019 08:59:35 -0000       1.30
@@ -5059,6 +5059,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- fr.po       7 Feb 2019 13:27:55 -0000       1.43
+++ fr.po       8 Feb 2019 08:59:35 -0000       1.44
@@ -5627,6 +5627,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- it.po       7 Feb 2019 10:59:49 -0000       1.23
+++ it.po       8 Feb 2019 08:59:35 -0000       1.24
@@ -75,13 +75,24 @@
 "sviluppatori, consapevoli dell'impossibilità da parte degli utenti di "
 "riparare eventuali funzionalità malevole, sono tentati ad imporne."
 
+# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -6718,6 +6729,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- ja.po       7 Feb 2019 10:59:49 -0000       1.23
+++ ja.po       8 Feb 2019 08:59:35 -0000       1.24
@@ -5706,6 +5706,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-amazon.it.po        14 Jan 2019 07:59:32 -0000      1.24
+++ malware-amazon.it.po        8 Feb 2019 08:59:35 -0000       1.25
@@ -57,12 +57,23 @@
 "riparare eventuali funzionalità malevole, sono tentati ad imporne."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <p>
 msgid ""

Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-apple.it.po 6 Jan 2019 09:59:17 -0000       1.118
+++ malware-apple.it.po 8 Feb 2019 08:59:35 -0000       1.119
@@ -70,12 +70,23 @@
 "riparare eventuali funzionalità malevole, sono tentati ad imporne."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <div><h3>
 msgid "Type&nbsp;of malware"

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- malware-microsoft.it.po     3 Feb 2019 15:59:41 -0000       1.136
+++ malware-microsoft.it.po     8 Feb 2019 08:59:35 -0000       1.137
@@ -67,12 +67,23 @@
 "riparare eventuali funzionalità malevole, sono tentati ad imporne."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <div><h3>
 msgid "Type&nbsp;of malware"

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-mobiles.de-diff.html        4 Feb 2019 07:31:22 -0000       1.37
+++ malware-mobiles.de-diff.html        8 Feb 2019 08:59:35 -0000       1.38
@@ -456,6 +456,25 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
@@ -785,66 +804,67 @@
                &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
     &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
                how much access</strong></del></span> <span 
class="inserted"><ins><em>watching&lt;/a&gt;. In addition,</em></ins></span>
-    it <span class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="removed"><del><strong>personal 
data in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
-    advertisements.&lt;/p&gt;</em></ins></span>
+    it <span class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs of Android apps</strong></del></span>
+  &lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of</em></ins></span> data in the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+ &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not 
only</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal data
-       to servers.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;
+  &lt;p&gt;Pairs of Android apps</strong></del></span> <span 
class="inserted"><ins><em>phone, and in server accounts,
+    it</em></ins></span> can <span class="removed"><del><strong>collude to 
transmit users' personal data
+       to servers.</strong></del></span> <span class="inserted"><ins><em>alter 
them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>include &lt;a
-    
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
     are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;</em></ins></span>
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201601110"&gt;
+    &lt;p&gt;The natural extension</em></ins></span> of <span 
class="removed"><del><strong>pairs that 
collude.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>monitoring
+    people through &ldquo;their&rdquo; phones is &lt;a
+    
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+    proprietary software to make sure they can't &ldquo;fool&rdquo;
+    the monitoring&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201601110"&gt;
-    &lt;p&gt;The natural extension of monitoring
-    people through &ldquo;their&rdquo; phones is</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-    proprietary software to make sure they can't 
&ldquo;fool&rdquo;</em></ins></span>
-    the <span class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span 
class="inserted"><ins><em>monitoring&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511190"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of users is not enough
-to legitimize actions like this.  At this point,</strong></del></span> <span 
class="inserted"><ins><em>500</em></ins></span> most <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    unrelated to the app's functionality, was</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in</em></ins></span> the <span class="removed"><del><strong>personal 
details of users</strong></del></span> <span class="inserted"><ins><em>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>described these apps as
+    &lt;p&gt;The article should not have described these apps as
     &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
     to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is</em></ins></span> that <span 
class="removed"><del><strong>spell out</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
-    analyze</em></ins></span> what <span 
class="removed"><del><strong>they</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+    &lt;p&gt;The article takes for granted</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>usual analytics 
tools are
+    legitimate, but</em></ins></span> is <span 
class="removed"><del><strong>not enough</strong></del></span> <span 
class="inserted"><ins><em>that valid? Software developers have no 
right</em></ins></span> to <span class="removed"><del><strong>legitimize 
actions like this.  At this point, most</strong></del></span>
+    <span class="inserted"><ins><em>analyze what</em></ins></span> users <span 
class="removed"><del><strong>have
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>are doing or how.  &ldquo;Analytics&rdquo; 
tools</em></ins></span>
+    that <span class="removed"><del><strong>spell out
+what they</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
 and honestly identify the information it collects on users, instead
 of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
 &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>doing or how.  
&ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any</em></ins></span> other <span 
class="removed"><del><strong>companies from getting this personal information 
in the first
+and</strong></del></span> <span class="inserted"><ins><em>just as wrong as 
any</em></ins></span> other <span class="removed"><del><strong>companies from 
getting this personal information in the first
 place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1205,7 +1225,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/02/08 08:59:35 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.de.po       3 Feb 2019 15:59:41 -0000       1.94
+++ malware-mobiles.de.po       8 Feb 2019 08:59:35 -0000       1.95
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -759,6 +759,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.es.po       7 Feb 2019 10:57:04 -0000       1.94
+++ malware-mobiles.es.po       8 Feb 2019 08:59:35 -0000       1.95
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -633,6 +634,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- malware-mobiles.fr.po       3 Feb 2019 19:44:25 -0000       1.116
+++ malware-mobiles.fr.po       8 Feb 2019 08:59:35 -0000       1.117
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2019-02-03 20:27+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -634,6 +635,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-mobiles.it-diff.html        4 Feb 2019 07:31:23 -0000       1.42
+++ malware-mobiles.it-diff.html        8 Feb 2019 08:59:36 -0000       1.43
@@ -462,6 +462,25 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
@@ -758,7 +777,7 @@
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it <span 
class="removed"><del><strong>stores detailed logs
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed <span 
class="removed"><del><strong>logs
       and may turn them over to the UK government if
       requested.&lt;/dd&gt;
 
@@ -812,7 +831,7 @@
 
 &lt;li&gt;
 &lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
 <span class="inserted"><ins><em>logs and
       may turn them over to</em></ins></span> the <span 
class="removed"><del><strong>personal details of users that 
install</strong></del></span> <span class="inserted"><ins><em>UK government if 
requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
@@ -1241,7 +1260,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- malware-mobiles.it.po       3 Feb 2019 15:59:41 -0000       1.94
+++ malware-mobiles.it.po       8 Feb 2019 08:59:36 -0000       1.95
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -81,12 +81,23 @@
 msgstr ""
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -717,6 +728,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-mobiles.ja-diff.html        4 Feb 2019 07:31:23 -0000       1.56
+++ malware-mobiles.ja-diff.html        8 Feb 2019 08:59:36 -0000       1.57
@@ -456,6 +456,25 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901050"&gt;
     &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
@@ -1081,7 +1100,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-mobiles.ja.po       3 Feb 2019 15:59:41 -0000       1.82
+++ malware-mobiles.ja.po       8 Feb 2019 08:59:36 -0000       1.83
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -598,6 +598,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- malware-mobiles.pot 3 Feb 2019 15:59:41 -0000       1.60
+++ malware-mobiles.pot 8 Feb 2019 08:59:36 -0000       1.61
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -431,6 +431,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\";> 25% fail "
+"to protect their users’ privacy</a> due to DNS leaks. In addition, 85% "
+"feature intrusive permissions or functions in their source code&mdash;often "
+"used for invasive advertising&mdash;that could potentially also be used to "
+"spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-app-investigation/\";>half of the "
+"top 10 gratis VPN apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a "
+"href=\"/philosophy/free-sw.html\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a "
 
"href=\"https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\";>
 "
 "stored users' locations to the company's server</a>. The company is being "

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- malware-mobiles.ru.po       3 Feb 2019 16:30:30 -0000       1.148
+++ malware-mobiles.ru.po       8 Feb 2019 08:59:36 -0000       1.149
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -624,6 +625,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- nl.po       7 Feb 2019 10:59:49 -0000       1.23
+++ nl.po       8 Feb 2019 08:59:36 -0000       1.24
@@ -4488,6 +4488,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- pl.po       7 Feb 2019 10:59:49 -0000       1.23
+++ pl.po       8 Feb 2019 08:59:36 -0000       1.24
@@ -3934,6 +3934,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- pot 7 Feb 2019 10:59:49 -0000       1.23
+++ pot 8 Feb 2019 08:59:36 -0000       1.24
@@ -3757,6 +3757,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary-back-doors.it.po        19 Jan 2019 09:30:12 -0000      1.112
+++ proprietary-back-doors.it.po        8 Feb 2019 08:59:36 -0000       1.113
@@ -66,12 +66,23 @@
 msgstr ""
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <p>
 msgid ""

Index: proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-censorship.it.po        5 Jan 2019 11:31:34 -0000       1.52
+++ proprietary-censorship.it.po        8 Feb 2019 08:59:36 -0000       1.53
@@ -64,12 +64,23 @@
 "censurare dovrebbe essere illegale, ma non lo è."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <h3>
 msgid "Apple"

Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-drm.it.po       5 Jan 2019 11:31:34 -0000       1.50
+++ proprietary-drm.it.po       8 Feb 2019 08:59:36 -0000       1.51
@@ -79,12 +79,23 @@
 "\">abolire il DRM</a>."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary-insecurity.it.po        5 Jan 2019 11:31:34 -0000       1.141
+++ proprietary-insecurity.it.po        8 Feb 2019 08:59:36 -0000       1.142
@@ -112,12 +112,23 @@
 "nota."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary-sabotage.it.po  2 Feb 2019 13:31:31 -0000       1.103
+++ proprietary-sabotage.it.po  8 Feb 2019 08:59:36 -0000       1.104
@@ -59,12 +59,23 @@
 "di una backdoor."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-surveillance.de-diff.html       7 Feb 2019 10:59:49 -0000       
1.40
+++ proprietary-surveillance.de-diff.html       8 Feb 2019 08:59:36 -0000       
1.41
@@ -1032,36 +1032,60 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the
-      <span class="removed"><del><strong>obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth the
+      obvious way</strong></del></span> <span class="inserted"><ins><em>150 
most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail</em></ins></span> to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way to use</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
-      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>will do
-    with</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal</strong></del></span> <span 
class="inserted"><ins><em>about a side issue. What the company does
-    with the</em></ins></span> data <span class="removed"><del><strong>to 
Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
 <span class="inserted"><ins><em>is</em></ins></span> a <span 
class="removed"><del><strong>server every phone number</strong></del></span> 
<span class="inserted"><ins><em>secondary issue. The principal wrong here 
is</em></ins></span> that
-    the <span class="removed"><del><strong>user types into it&lt;/a&gt;; the 
server records these numbers for</strong></del></span> <span 
class="inserted"><ins><em>company gets that data</em></ins></span> at <span 
class="removed"><del><strong>least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
+      &mdash; which would mean no way</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; 
due</em></ins></span> to <span class="removed"><del><strong>use it without 
having your fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used</em></ins></span> to <span 
class="removed"><del><strong>tell whether the phone is 
snooping</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on
+      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>personal data to Apple's 
servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding</em></ins></span> that <span 
class="inserted"><ins><em>it notify</em></ins></span> the <span 
class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>users of 
what it will do
+    with</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>valid email address and 
receiving</strong></del></span> <span class="inserted"><ins><em>side issue. 
What</em></ins></span> the <span class="removed"><del><strong>code Apple
+      sends to it.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with the data is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1069,242 +1093,248 @@
     tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around 
47%</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of</em></ins></span> gratis <span 
class="removed"><del><strong>apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>code 
Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span class="removed"><del><strong>it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some</em></ins></span> of <span 
class="inserted"><ins><em>them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>most popular 
iOS</strong></del></span> <span class="inserted"><ins><em>user's activities in 
the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
-
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android</em></ins></span> apps &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>the most popular iOS</strong></del></span> <span 
class="inserted"><ins><em>gratis Android</em></ins></span> apps &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
         href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral and location information&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third 
parties.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that 
have deleted them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+       behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on</em></ins></span> the <span class="removed"><del><strong>photos 
and
+      videos</strong></del></span> <span class="inserted"><ins><em>user's 
actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>photos and
-      videos they make.&lt;/p&gt;
+    &lt;p&gt;Often</em></ins></span> they <span 
class="removed"><del><strong>make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
       iCloud Photo Library stores every photo and video you take,
       and keeps them up to date on all your devices.
-      Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
+      Any edits you make are automatically updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
       information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>other ways to turn 
off</em></ins></span> the
-      <span class="removed"><del><strong>startup</strong></del></span> <span 
class="inserted"><ins><em>other kinds</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>send</em></ins></span> 
the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
       &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>location
-    tracking,</em></ins></span> but <span class="removed"><del><strong>it's 
active</strong></del></span> <span class="inserted"><ins><em>most users will be 
tricked</em></ins></span> by <span class="removed"><del><strong>default so it 
still counts as a
+      deactivate iCloud&lt;/a&gt;, but it's active by 
default</strong></del></span> <span class="inserted"><ins><em>machine's 
&ldquo;advertising ID,&rdquo;</em></ins></span> so <span 
class="removed"><del><strong>it still counts as a
       surveillance functionality.&lt;/p&gt;
 
     &lt;p&gt;Unknown people apparently took advantage of this to
       &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
       nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA can access any of them through
+      security to get at them, but NSA</strong></del></span> <span 
class="inserted"><ins><em>that
+    Facebook</em></ins></span> can <span class="removed"><del><strong>access 
any</strong></del></span> <span class="inserted"><ins><em>correlate the data it 
obtains from the same machine via
+    various apps. Some</em></ins></span> of them <span 
class="removed"><del><strong>through
       &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:</strong></del></span> the <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>send Facebook detailed information about
+    the user's activities</em></ins></span> in <span 
class="removed"><del><strong>iThings:</strong></del></span> the <span 
class="removed"><del><strong>&lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>app; others only 
say that</em></ins></span> the <span class="removed"><del><strong>iThing is,
+      and get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>iThing is,</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 
6,</strong></del></span>
+    <span class="inserted"><ins><em>using that app,</em></ins></span> but 
<span class="removed"><del><strong>it
+      is still true in iOS 7.)&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> that <span class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>alone is often quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>all</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>data in an 
iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular Android apps is pervasive and
+      sometimes very clever. Some trackers can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a</strong></del></span> user's <span 
class="removed"><del><strong>movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Android tracks</strong></del></span> location <span 
class="removed"><del><strong>for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;</strong></del></span>
 even when <span class="inserted"><ins><em>users disable</em></ins></span> 
&ldquo;location <span 
class="removed"><del><strong>services&rdquo;</strong></del></span>
+    <span class="inserted"><ins><em>tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;There</em></ins></span> are <span 
class="removed"><del><strong>turned off, even
+      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them</strong></del></span> 
<span class="inserted"><ins><em>other ways</em></ins></span> to turn <span 
class="inserted"><ins><em>off</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on and off, listen to</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
+    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>microphone, retrieve geo-location data 
from</strong></del></span> <span class="inserted"><ins><em>misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware</strong></del></span> 
<span class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>no way to save</em></ins></span>
-    a <span class="removed"><del><strong>feature for web 
sites</strong></del></span> <span class="inserted"><ins><em>recording. But I 
can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks</strong></del></span> 
<span class="inserted"><ins><em>care much less</em></ins></span> about <span 
class="removed"><del><strong>iOS 6, but it
-      is still true</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span 
class="removed"><del><strong>iOS 7.)&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one 
more.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied</em></ins></span> by <span 
class="removed"><del><strong>default, though that can be
-      turned off.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users</strong></del></span> <span class="inserted"><ins><em>save
+    a recording. But I</em></ins></span> can't <span 
class="removed"><del><strong>delete&lt;/a&gt;,
+      and they send so</strong></del></span> <span 
class="inserted"><ins><em>be sure from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn to care</em></ins></span> much <span 
class="removed"><del><strong>data that their transmission</strong></del></span> 
<span class="inserted"><ins><em>less about sports, you will benefit in
+    many ways. This</em></ins></span> is <span class="removed"><del><strong>a
+      substantial expense for users.  Said transmission, not wanted or
+      requested by the user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can,</strong></del></span> <span 
class="inserted"><ins><em>researchers were found to snoop</em></ins></span>
-    and <span class="removed"><del><strong>regularly does,
-      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>NSA 
snoop</strong></del></span> <span class="inserted"><ins><em>apps were
-    found to insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>all the data</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>an iThing,
-      or it</strong></del></span> <span class="inserted"><ins><em>these 
proprietary apps whose
+  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>5,855</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>apps studied</em></ins></span> by <span 
class="removed"><del><strong>a paywall)
+      reports</strong></del></span> <span 
class="inserted"><ins><em>researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>evidence that proprietary apps generally work against
+    &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need to get rid</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software&mdash;both proprietary
-    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="removed"><del><strong>exist for no
-      possible purpose</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns</em></ins></span>
+    the <span class="removed"><del><strong>FBI can remotely 
activate</strong></del></span> <span class="inserted"><ins><em>user if an app 
contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides the information to
+    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to 
each</em></ins></span>
-    other <span class="removed"><del><strong>than surveillance&lt;/a&gt;.  
Here is</strong></del></span> <span class="inserted"><ins><em>but not 
to</em></ins></span> the <span class="inserted"><ins><em>server's 
database.&lt;/p&gt;
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>dis-service
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking</em></ins></span> software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
-    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+  &lt;li id="M201711240"&gt;
+    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="inserted"><ins><em>popular</em></ins></span> Android
+      <span class="removed"><del><strong>phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>apps</em></ins></span>
+    is <span class="inserted"><ins><em>pervasive and sometimes very clever. 
Some trackers can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;
+    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command and users cannot stop them:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when the</strong></del></span>
+    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all</em></ins></span> phone <span class="removed"><del><strong>has 
no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots of data</strong></del></span> <span 
class="inserted"><ins><em>numbers and email addresses&lt;/a&gt; in user's 
address
-    book</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that this article misuses 
the words
+    uploads</em></ins></span> all <span class="removed"><del><strong>new 
portable phones</strong></del></span> <span class="inserted"><ins><em>phone 
numbers and email addresses&lt;/a&gt; in user's address
+    book</em></ins></span> to <span class="inserted"><ins><em>developer's 
server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring</em></ins></span> to <span class="removed"><del><strong>Edward 
Snowden,
-      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
-      by sending hidden</strong></del></span> <span 
class="inserted"><ins><em>zero price.&lt;/p&gt;
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
     &lt;p&gt;20 dishonest Android apps recorded &lt;a
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and</em></ins></span> text messages <span 
class="removed"><del><strong>which enable them</strong></del></span> <span 
class="inserted"><ins><em>and emails</em></ins></span> to <span 
class="removed"><del><strong>turn the phones</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy;</em></ins></span> 
on <span class="removed"><del><strong>and off, listen</strong></del></span> 
<span class="inserted"><ins><em>the contrary, it
-    worked in various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
+    worked in various ways to prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
+    for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>contact list. This malware is designed to
-      disguise itself from investigation.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission is a
-      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>responsibility</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested by</strong></del></span> the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>their being
-    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way</em></ins></span> for <span 
class="removed"><del><strong>voice all the time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>Google, or</em></ins></span> Android <span 
class="removed"><del><strong>phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by a paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate</strong></del></span> <span 
class="inserted"><ins><em>users,
+    cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>GPS</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="removed"><del><strong>microphone</strong></del></span> <span 
class="inserted"><ins><em>study
-    the source code somehow to determine whether they mistreat 
users</em></ins></span> in <span class="removed"><del><strong>Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect</strong></del></span>
-    <span class="inserted"><ins><em>various ways. If it did a good job of 
this, it could more or less
+    &lt;p&gt;Google could demand the source code for these apps, and study
+    the source code somehow to determine whether they mistreat users in
+    various ways. If it did a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
     enough to outsmart the checking.&lt;/p&gt;
 
@@ -1344,7 +1374,7 @@
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that</em></ins></span> this <span 
class="removed"><del><strong>means Windows laptops.)  
Here</strong></del></span> <span class="inserted"><ins><em>was done without the 
users' consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
     href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
@@ -1370,8 +1400,8 @@
     
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
     being pre-installed on only one phone&lt;/a&gt;, and the user must
     explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</em></ins></span> is
-    <span class="inserted"><ins><em>still spyware.&lt;/p&gt;
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
@@ -1381,18 +1411,16 @@
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    &lt;p&gt;The Uber app tracks &lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
     movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This example illustrates how &ldquo;getting the user's
     consent&rdquo; for surveillance is inadequate as a protection against
-    massive surveillance.&lt;/p&gt;</em></ins></span>
+    massive surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+  &lt;li id="M201611160"&gt;
     &lt;p&gt;A &lt;a
     
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
     research paper&lt;/a&gt; that investigated the privacy and security of
@@ -1402,21 +1430,17 @@
     guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Following is a non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and 
infringe</em></ins></span> their <span class="removed"><del><strong>GPS 
location on
-      remote command</strong></del></span>
-    <span class="inserted"><ins><em>privacy:&lt;/p&gt;
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
 
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX</em></ins></span> 
and <span class="inserted"><ins><em>Appflood,
-      meant to track</em></ins></span> users <span 
class="removed"><del><strong>cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says</strong></del></span> <span class="inserted"><ins><em>and 
show them targeted ads.&lt;/dd&gt;
+      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
+      meant to track users and show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>has full access to 
users'
+      permissions upon installation, meaning it has full access to users'
       text messages.&lt;/dd&gt;
 
       &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
@@ -1430,7 +1454,7 @@
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
       &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is</em></ins></span> to 
<span class="inserted"><ins><em>display ads. Uses
+      users. The stated purpose of the JS injection is to display ads. Uses
       roughly five tracking libraries. Also, it redirects the user's
       traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
@@ -3107,7 +3131,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:49 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary-surveillance.de.po      7 Feb 2019 10:59:49 -0000       1.256
+++ proprietary-surveillance.de.po      8 Feb 2019 08:59:36 -0000       1.257
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1849,6 +1849,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.370
retrieving revision 1.371
diff -u -b -r1.370 -r1.371
--- proprietary-surveillance.fr.po      7 Feb 2019 13:27:55 -0000       1.370
+++ proprietary-surveillance.fr.po      8 Feb 2019 08:59:36 -0000       1.371
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2019-02-07 14:20+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1407,6 +1408,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary-surveillance.it-diff.html       7 Feb 2019 10:59:49 -0000       
1.107
+++ proprietary-surveillance.it-diff.html       8 Feb 2019 08:59:36 -0000       
1.108
@@ -1121,17 +1121,14 @@
       twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as</strong></del></span> 
<span class="inserted"><ins><em>making unauthorized copies of nonfree software
     is not</em></ins></span> a <span class="removed"><del><strong>way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This is a typical example 
of</strong></del></span> <span class="inserted"><ins><em>cure 
for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      whether they want that. This is a typical example 
of</strong></del></span> <span class="inserted"><ins><em>cure 
for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps</strong></del></span> the <span class="removed"><del><strong>user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
proprietary</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1139,16 +1136,37 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN</em></ins></span> apps <span class="inserted"><ins><em>in 
Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
+    apps</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>user has
+    installed.</strong></del></span> <span class="inserted"><ins><em>top 10 
gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The 
company</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span>
     <span class="inserted"><ins><em>being sued, demanding that it notify the 
users of what it will do
     with the data.&lt;/p&gt;
 
     &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets</em></ins></span> that <span 
class="inserted"><ins><em>data</em></ins></span> at <span 
class="removed"><del><strong>least is visible</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
+    with the data is a secondary issue. The principal wrong here 
is</em></ins></span> that
+    <span class="inserted"><ins><em>the company gets that 
data</em></ins></span> at <span class="removed"><del><strong>least is 
visible</strong></del></span> <span class="inserted"><ins><em>all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
@@ -1179,32 +1197,31 @@
       &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of whether the 
<span class="removed"><del><strong>app developers get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>user 
has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This spying occurs regardless</em></ins></span> of whether the 
<span class="removed"><del><strong>app developers get</strong></del></span> 
<span class="inserted"><ins><em>user has a Facebook
+    account.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of</em></ins></span> users <span 
class="removed"><del><strong>to say &ldquo;I agree&rdquo;. That is no excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
       sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
       &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the <span class="removed"><del><strong>user to
-      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>phones of users that have deleted 
them&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>app 
developer but did not
-      ask about sending it to</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are</em></ins></span> other <span 
class="removed"><del><strong>companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>ways to turn off</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>other kinds</em></ins></span> of <span 
class="inserted"><ins><em>location
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending it to</strong></del></span> other <span 
class="removed"><del><strong>companies.  This shows the
+      weakness</strong></del></span> <span 
class="inserted"><ins><em>kinds</em></ins></span> of <span 
class="inserted"><ins><em>location
     tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
       &ldquo;solution&rdquo; to surveillance: why should a flashlight
       app send any information to anyone?  A free software flashlight
@@ -1232,143 +1249,105 @@
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>act as</em></ins></span> spies for <span 
class="removed"><del><strong>companies, and the NSA takes advantage to spy 
through</strong></del></span> <span class="inserted"><ins><em>licensing 
enforcement.&lt;/p&gt;
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>act as</em></ins></span> spies for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+      More</strong></del></span> <span class="inserted"><ins><em>care much 
less</em></ins></span> about <span class="removed"><del><strong>NSA app 
spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>implements 
DRM, too&mdash;that there is no way</em></ins></span> to <span 
class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
-    a <span class="removed"><del><strong>speech recognition company based in 
the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span> 
the <span class="removed"><del><strong>toys with a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
-
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span class="removed"><del><strong>on a child's 
speech, and even speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>many ways. This is one 
more.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of the <span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied</em></ins></span> by <span class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span class="removed"><del><strong>U.S.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked</strong></del></span> <span 
class="inserted"><ins><em>researchers were found to snoop</em></ins></span>
-    and <span class="removed"><del><strong>changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company that made the vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal</strong></del></span> <span 
class="inserted"><ins><em>collect</em></ins></span> information about <span 
class="removed"><del><strong>how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-      true, but it doesn't really matter. If it had sold the data to a
-      data broker, the data broker would have been able to figure out
-      who the user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total</strong></del></span> <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40%</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>the apps were
-    found</em></ins></span> to <span class="inserted"><ins><em>insecurely 
snitch on</em></ins></span> its <span 
class="removed"><del><strong>customers.&lt;/p&gt;
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>listen in on a 
child's speech,</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>even speak
+      into</strong></del></span> <span class="inserted"><ins><em>collect 
information about its users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator
+      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span> <span class="inserted"><ins><em>apps 
were
+    found to insecurely snitch</em></ins></span> on its <span 
class="removed"><del><strong>users through the</strong></del></span> <span 
class="inserted"><ins><em>users.  Furthermore, they could
+    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to <span class="inserted"><ins><em>get rid 
of</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
-    and</em></ins></span> the <span class="removed"><del><strong>data&lt;/a&gt;
-      collected</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps</em></ins></span> by <span 
class="inserted"><ins><em>getting apps from</em></ins></span> the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>free 
software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer 
and</strong></del></span> <span class="inserted"><ins><em>user if an app 
contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    need to get rid</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether it was 
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android</em></ins></span> by <span class="removed"><del><strong>a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>&lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than</strong></del></span> free software <span 
class="removed"><del><strong>which users could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span>
+    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt;</em></ins></span> that 
<span class="removed"><del><strong>made the vibrator</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures"&gt; 
prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about &lt;a
+    &lt;p&gt;Grindr collects</em></ins></span> information about <span 
class="removed"><del><strong>how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
-    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>information to
+    which users are HIV-positive, then provides</em></ins></span> the <span 
class="removed"><del><strong>data may</strong></del></span> <span 
class="inserted"><ins><em>information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
-    It</em></ins></span> could <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>be designed so that users communicate such 
info</em></ins></span> to <span class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>each
-    other but not</em></ins></span> to <span class="inserted"><ins><em>the 
server's database.&lt;/p&gt;
+    It could</em></ins></span> be
+      <span class="removed"><del><strong>true,</strong></del></span> <span 
class="inserted"><ins><em>designed so that users communicate such info to each
+    other</em></ins></span> but <span class="removed"><del><strong>it doesn't 
really matter. If it had sold</strong></del></span> <span 
class="inserted"><ins><em>not to</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
-    spy on <span class="removed"><del><strong>children</strong></del></span> 
<span class="inserted"><ins><em>users even more than users expected. It &lt;a
+    &lt;p&gt;The moviepass app and dis-service
+    spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>after going</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>a movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going</em></ins></span> to a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span 
class="inserted"><ins><em>movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
-    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers can &lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1376,131 +1355,149 @@
   &lt;li id="M201708270"&gt;
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
-    book to developer's server.</em></ins></span>  Note that <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo 
used</strong></del></span> <span class="inserted"><ins><em>words
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book</em></ins></span> to <span class="removed"><del><strong>figure out
+      who the user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that</em></ins></span> this 
<span class="removed"><del><strong>lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>article misuses</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;
+    referring</em></ins></span> to <span class="removed"><del><strong>its 
customers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>zero 
price.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded &lt;a
-    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google</em></ins></span> did not <span 
class="removed"><del><strong>affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>intend</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Google did not intend</em></ins></span> to <span 
class="inserted"><ins><em>make these apps spy; on</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>contrary, it
+    worked in various ways to prevent that, and deleted these apps after
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
+    therefore shares in the responsibility for the injustice of their being
+    nonfree. It also distributes its own nonfree apps, such as Google 
Play,</em></ins></span>
+    &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
 
+    &lt;p&gt;Could Google have done</em></ins></span> a <span 
class="inserted"><ins><em>better job of preventing apps from
+    cheating? There is no systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
+    to <span class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>inspect executable proprietary apps to see what they 
do.&lt;/p&gt;
+
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>source code for these apps,</em></ins></span> and 
<span class="inserted"><ins><em>study</em></ins></span>
+    the <span class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>source code somehow to determine whether they 
mistreat users in
+    various ways. If it did a good job of this, it</em></ins></span> could 
<span class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>more or less
+    prevent such snooping, except when the app developers are clever
+    enough</em></ins></span> to <span class="removed"><del><strong>these 
conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>outsmart the 
checking.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;</strong></del></span>
 <span class="inserted"><ins><em>various ways to prevent that, and deleted 
these apps after
-    discovering what they did. So we cannot blame Google</em></ins></span> 
specifically
-    for <span class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
+    Google</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release of source 
code</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>the
+    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>top under</strong></del></span> each <span 
class="removed"><del><strong>subsection --&gt;
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the snooping of these apps.&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
-    nonfree. It also distributes its own nonfree apps, such as Google Play,
-    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There is no systematic way for Google, or Android users,
-    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+    snoop</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
+Note</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt;</em></ins></span> that <span class="removed"><del><strong>the 
specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>they
     don't snoop.&lt;/p&gt;
 
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed</em></ins></span> in <span 
class="removed"><del><strong>its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
-    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>demands to personal data in</em></ins></span> the 
<span class="removed"><del><strong>emails of members</strong></del></span> 
<span class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
     &lt;p&gt;Users are suing Bose for &lt;a
     
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
     distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
+    the app would record the names</em></ins></span> of <span 
class="removed"><del><strong>Parliament</strong></del></span> <span 
class="inserted"><ins><em>the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    &lt;p&gt;The suit accuses that</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    would that make</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201704074"&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
     &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
@@ -1891,7 +1888,12 @@
     report everything that is viewed on them, and not just broadcasts and
     cable&lt;/a&gt;. Even if the image is coming from the user's own computer,
     the TV reports what it is. The existence of a way to disable the
-    surveillance, even if it were not hidden as it was in these TVs,
+    surveillance, even if it were not hidden as it was</em></ins></span> in 
<span class="removed"><del><strong>Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>these TVs,
     does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1956,21 +1958,30 @@
     other government.&lt;/p&gt;
 
     &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
-    software in your own computer.&lt;/p&gt;
+    software</em></ins></span> in <span 
class="removed"><del><strong>Skype:</strong></del></span> <span 
class="inserted"><ins><em>your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201409290"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
     
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
@@ -2942,7 +2953,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:49 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- proprietary-surveillance.it.po      7 Feb 2019 10:59:49 -0000       1.269
+++ proprietary-surveillance.it.po      8 Feb 2019 08:59:36 -0000       1.270
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -83,12 +83,23 @@
 msgstr ""
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <div><div><a>
 msgid "<a href=\"/graphics/dog.html\">"
@@ -1788,6 +1799,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-surveillance.ja-diff.html       7 Feb 2019 10:59:49 -0000       
1.117
+++ proprietary-surveillance.ja-diff.html       8 Feb 2019 08:59:36 -0000       
1.118
@@ -1020,17 +1020,15 @@
       twisted ways</strong></del></span> <span 
class="inserted"><ins><em>illustrates</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as a way
       to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
       whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>making unauthorized copies of nonfree 
software</em></ins></span>
-    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+    is <span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>mobile 
devices report which other
-    apps</strong></del></span> the <span class="removed"><del><strong>user has
-    installed.</strong></del></span> <span class="inserted"><ins><em>nasty 
thing, but cannot make it less nasty.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile devices report which other
+    apps</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -1038,75 +1036,80 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>user has
+    installed.</strong></del></span> <span class="inserted"><ins><em>150 most 
popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover,</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>at least is visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the company's server&lt;/a&gt;. The 
company</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it notify the 
users of what it will do
-    with the data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
-    with the data is a secondary issue. The principal wrong here is that
-    the company gets</em></ins></span> that <span 
class="inserted"><ins><em>data</em></ins></span> at <span 
class="removed"><del><strong>least is visible</strong></del></span> <span 
class="inserted"><ins><em>all.&lt;/p&gt;
+    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>users of what it will 
do
+    with</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about a side issue. 
What</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>question of 
whether the app developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> is <span 
class="removed"><del><strong>no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as bad as what 
the others do.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>WeatherBug, are
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
     tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android</em></ins></span> apps <span 
class="removed"><del><strong>for children don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report</em></ins></span> on the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>user's actions</em></ins></span> to
+      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
-    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>data it obtains 
from</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
-
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>user is
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the</em></ins></span> data <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>it obtains from</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask</strong></del></span> <span class="inserted"><ins><em>same machine 
via
+    various apps. Some of them send Facebook detailed 
information</em></ins></span> about <span class="removed"><del><strong>sending 
it to other companies.  This shows</strong></del></span>
+    the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>user's activities in the app; others only say that 
the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless</em></ins></span> of whether the 
<span class="removed"><del><strong>app developers get</strong></del></span> 
<span class="inserted"><ins><em>user has a Facebook
-    account.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps &lt;a
-    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of</em></ins></span> users <span 
class="removed"><del><strong>to say &ldquo;I agree&rdquo;. That is no excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that have deleted 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record</em></ins></span> the <span class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
-    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending it to</strong></del></span> other <span 
class="removed"><del><strong>companies.  This shows the
-      weakness</strong></del></span> <span 
class="inserted"><ins><em>kinds</em></ins></span> of <span 
class="inserted"><ins><em>location
-    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+    &lt;p&gt;This spying occurs regardless</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>user has</em></ins></span> a <span 
class="removed"><del><strong>flashlight
       app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;</em></ins></span>
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Facebook
+    account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -1119,18 +1122,31 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201808030"&gt;
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends personal data 
about them</strong></del></span> <span class="inserted"><ins><em>disable 
&ldquo;location
+    tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This makes</em></ins></span> them <span 
class="removed"><del><strong>to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>act as</em></ins></span> spies for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as</em></ins></span> spies for <span 
class="removed"><del><strong>companies, and</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
 
     &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
     a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
@@ -1164,60 +1180,61 @@
     and collect</em></ins></span> information about <span 
class="removed"><del><strong>how
     people use it&lt;/a&gt;.&lt;/p&gt;
 
-       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span> <span class="inserted"><ins><em>its 
users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>data may be
-        true, but it doesn't really matter. If it sells the 
data</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>a
-        data broker, the data broker can figure out who the user is.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A computerized
-        vibrator &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
 <span class="inserted"><ins><em>insecurely snitch</em></ins></span> on its 
<span class="removed"><del><strong>users through the</strong></del></span> 
<span class="inserted"><ins><em>users.  Furthermore, they could
-    detect only some methods of snooping, in these</em></ins></span> 
proprietary <span class="removed"><del><strong>control app&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;The app reports the temperature</strong></del></span> <span 
class="inserted"><ins><em>apps whose
-    source code they cannot look at.  The other apps might be snooping
+       &lt;p&gt;The company's statement that it 
anonymizes</strong></del></span> <span class="inserted"><ins><em>its 
users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>data may</strong></del></span> <span 
class="inserted"><ins><em>apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
+    source code they cannot look at.  The other apps might</em></ins></span> be
+        <span class="removed"><del><strong>true, but it doesn't really matter. 
If it sells</strong></del></span> <span class="inserted"><ins><em>snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
-    need to get rid</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it is surrounded</strong></del></span> 
<span class="inserted"><ins><em>proprietary software&mdash;both proprietary
-    Android</em></ins></span> by <span class="removed"><del><strong>a person's
-      body),</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and the <span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps 
from</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free software <span 
class="removed"><del><strong>which users can check
-      and change.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>only &lt;a 
href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that &lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>proprietary software&mdash;both proprietary
+    Android by &lt;a 
href="https://replicant.us"&gt;switching</em></ins></span> to <span 
class="removed"><del><strong>a
+        data broker,</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,
+    and</em></ins></span> the <span class="removed"><del><strong>data broker 
can figure out who</strong></del></span> <span 
class="inserted"><ins><em>proprietary apps by getting apps from the free 
software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
+    the user <span 
class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops
+        on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information about its users.
-    It could be designed so that users communicate such info to each
-    other but not</em></ins></span> to <span class="inserted"><ins><em>the 
server's database.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have so much information 
about</em></ins></span> its <span class="inserted"><ins><em>users.
+    It could be designed so that</em></ins></span> users <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>communicate such info to each
+    other but not to</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service</em></ins></span>
-    spy on <span class="removed"><del><strong>children</strong></del></span> 
<span class="inserted"><ins><em>users even more than users expected. It &lt;a
-    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201803050"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="inserted"><ins><em>moviepass</em></ins></span> 
app <span class="removed"><del><strong>reports the temperature of the vibrator 
minute by
+      minute (thus, indirectly, whether it is surrounded by a person's
+      body),</strong></del></span> and <span class="removed"><del><strong>the 
vibration frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather</strong></del></span> <span 
class="inserted"><ins><em>dis-service
+    spy on users even more</em></ins></span> than <span 
class="removed"><del><strong>free software which</strong></del></span> users 
<span class="removed"><del><strong>can check
+      and change.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>expected. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after</em></ins></span> going to <span 
class="removed"><del><strong>spy on children and 
adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a movie&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>after going</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -1227,12 +1244,9 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>a movie&lt;/a&gt;.&lt;/p&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span>
 
-    &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711240"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -1250,7 +1264,7 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows 
installs.</strong></del></span> <span class="inserted"><ins><em>email 
addresses&lt;/a&gt; in user's address
-    book to developer's server.</em></ins></span>  Note that <span 
class="inserted"><ins><em>this article misuses the words
+    book to developer's server.</em></ins></span>  Note that <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo 
used</strong></del></span> <span class="inserted"><ins><em>words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -1260,13 +1274,80 @@
     
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google specifically
-    for the snooping of these apps.&lt;/p&gt;
+    &lt;p&gt;Google</em></ins></span> did not <span 
class="removed"><del><strong>affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>intend</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>contrary,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
+    <span class="inserted"><ins><em>worked</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;</strong></del></span>
 <span class="inserted"><ins><em>various ways to prevent that, and deleted 
these apps after
+    discovering what they did. So we cannot blame Google</em></ins></span> 
specifically
+    for <span class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the snooping of these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
+    therefore shares</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>responsibility for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer is using</strong></del></span> <span 
class="inserted"><ins><em>injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
@@ -1277,77 +1358,148 @@
 
     &lt;p&gt;Google could demand the source code for these apps, and study
     the source code somehow to determine whether they mistreat users in
-    various ways. If it did a good job of this, it could more or less
+    various ways. If</em></ins></span> it <span class="inserted"><ins><em>did 
a good job of this, it could more or less
     prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
+    enough</em></ins></span> to outsmart
+      <span class="removed"><del><strong>you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this</strong></del></span> <span class="inserted"><ins><em>the 
checking.&lt;/p&gt;
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;
+    Google to protect us. We must demand release of source</em></ins></span> 
code <span class="removed"><del><strong>snoops</strong></del></span> <span 
class="inserted"><ins><em>to the
+    public, so we can depend</em></ins></span> on <span 
class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>each other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART &lt;a
-    
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only the
+      Kindle:</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
-    don't snoop.&lt;/p&gt;
+    &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that</em></ins></span> they <span 
class="removed"><del><strong>report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
-    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users</em></ins></span> 
by <span class="removed"><del><strong>most US libraries,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
+    &lt;p&gt;Faceapp appears to do</em></ins></span> lots of <span 
class="removed"><del><strong>data to Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>surveillance, judging by &lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
+    how much access it demands</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>personal data</em></ins></span> in <span 
class="removed"><del><strong>Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree 
software</strong></del></span> <span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
-    along with the headphone's unique serial number.&lt;/p&gt;
-
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of Android apps can collude
-    to transmit users' personal data to servers. &lt;a
+    &lt;p&gt;Users</em></ins></span> are <span class="inserted"><ins><em>suing 
Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing</em></ins></span> a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access</strong></del></span> <span class="inserted"><ins><em>spyware app 
for</em></ins></span> its <span class="removed"><del><strong>computers remotely 
and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,</em></ins></span>
+    the <span class="removed"><del><strong>system has no authentication when
+    accessed through</strong></del></span> <span class="inserted"><ins><em>app 
would record</em></ins></span> the <span class="removed"><del><strong>modem.  
However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in</strong></del></span> <span 
class="inserted"><ins><em>names of</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>audio files users listen</em></ins></span> to
+    <span class="inserted"><ins><em>along with</em></ins></span> the <span 
class="removed"><del><strong>car remotely, the cell phone
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses that this was done without</em></ins></span> the 
<span class="removed"><del><strong>phone company to track</strong></del></span> 
<span class="inserted"><ins><em>users' consent.
+    If</em></ins></span> the <span class="removed"><del><strong>car's 
movements all</strong></del></span> <span class="inserted"><ins><em>fine print 
of</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>app said that users gave consent for this,
+    would that make</em></ins></span> it <span class="removed"><del><strong>is 
possible</strong></del></span> <span class="inserted"><ins><em>acceptable? No 
way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>physically 
remove</strong></del></span> <span 
class="inserted"><ins><em>design</em></ins></span>
+    the <span class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app to snoop at 
all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs of Android apps can collude</em></ins></span>
+    to <span class="removed"><del><strong>car manufacturers, insurance 
companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case</strong></del></span> <span 
class="inserted"><ins><em>transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
+    study found tens</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned in this 
article, is not
+      really a matter</strong></del></span> <span 
class="inserted"><ins><em>thousands</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> <span class="inserted"><ins><em>pairs that 
collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703300"&gt;
     &lt;p&gt;Verizon &lt;a
     
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
+    announced</em></ins></span> an
+      <span class="removed"><del><strong>intolerable 
invasion</strong></del></span> <span class="inserted"><ins><em>opt-in 
proprietary search app that it will&lt;/a&gt; pre-install
+    on some</em></ins></span> of <span class="removed"><del><strong>privacy, 
and should be replaced with anonymous
+      payment systems, but the invasion isn't done by 
malware.</strong></del></span> <span class="inserted"><ins><em>its 
phones.</em></ins></span> The <span class="removed"><del><strong>other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>app will give Verizon</em></ins></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>same information
+    about</em></ins></span> the <span class="removed"><del><strong>company to 
extract data remotely and
+      determine</strong></del></span> <span class="inserted"><ins><em>users' 
searches that Google normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However, the app
+    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>app 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>user must
+    explicitly opt-in before</em></ins></span> the <span 
class="removed"><del><strong>data
+      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the 
<span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app
     remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    still spyware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
 
-  &lt;li id="M201701210"&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
     user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
@@ -1702,7 +1854,7 @@
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>article for the 
facts it presents. It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
     moral weakness of surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
@@ -1767,10 +1919,9 @@
 
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;</em></ins></span>
-    used <span class="inserted"><ins><em>a firmware &ldquo;upgrade&rdquo; to 
make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs</em></ins></span> did not <span 
class="removed"><del><strong>affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>do that when first sold.&lt;/p&gt;
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201502090"&gt;
@@ -1780,19 +1931,12 @@
     Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition</em></ins></span> is not <span 
class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts</strong></del></span> <span class="inserted"><ins><em>to be trusted 
unless it is done by free
-    software</em></ins></span> in <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>your</em></ins></span> own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>third
+    data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1804,18 +1948,8 @@
 
   &lt;li id="M201409290"&gt;
     &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>their 
users&lt;/a&gt;.&lt;/p&gt;
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
@@ -1831,29 +1965,21 @@
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
     reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>had installed a patch to stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1861,62 +1987,35 @@
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
     Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
+    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send the video they capture to Amazon servers&lt;/a&gt; which save it
     permanently.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
     give the manufacturer an unencrypted copy of everything they
     see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
     &lt;p&gt;When Consumer Reports tested them, it suggested that these
     manufacturers promise not to look at what's in the videos. That's not
-    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+    security for your home. Security means making</em></ins></span> sure <span 
class="inserted"><ins><em>they don't get to
+    see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
@@ -1925,204 +2024,139 @@
     security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;</em></ins></span>
+  &lt;li id="M201511250"&gt;
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
     even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using 
<span class="removed"><del><strong>it to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
-    accessed through</strong></del></span> the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>code could surely convert</em></ins></span> it 
<span class="removed"><del><strong>asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span>
-    <span class="inserted"><ins><em>into one.&lt;/p&gt;
+    listening device, remote changes to the code could surely convert it
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span class="removed"><del><strong>car 
is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>users 
through</em></ins></span> the <span class="removed"><del><strong>phone company 
to track</strong></del></span> <span class="inserted"><ins><em>proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>temperature of</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>vibrator minute by
-    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>was surrounded by 
a person's
-    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars
-      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+    minute (thus, indirectly, whether it was surrounded by a person's
+    body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>their
-    products, rather than free software</em></ins></span> which <span 
class="removed"><del><strong>is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>users could 
have checked</em></ins></span>
-    and
-      <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;</em></ins></span>
+    standard with which manufacturers would make statements about their
+    products, rather than free software which users could have checked
+    and changed.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>case</strong></del></span> 
<span class="inserted"><ins><em>company that made the vibrator &lt;a
+    &lt;p&gt;The company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, mentioned 
in</strong></del></span> <span class="inserted"><ins><em>personal information 
about how people
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>a data
     broker, the data broker would have been able to figure out who the
     user was.&lt;/p&gt;
 
-    &lt;p&gt;Following</em></ins></span> this <span 
class="removed"><del><strong>article, is not
-      really</strong></del></span> <span class="inserted"><ins><em>lawsuit, 
&lt;a
+    &lt;p&gt;Following this lawsuit, &lt;a
     
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>total</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be 
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m&lt;/a&gt; 
to its
+    the company has been ordered to pay a total of C$4m&lt;/a&gt; to its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
+    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; 
collected</em></ins></span> by <span class="removed"><del><strong>proprietary 
malware in</strong></del></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    Crackers found a way to access the data&lt;/a&gt; collected by the
+    manufacturer's snooping.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    &lt;p&gt;That the manufacturer and the FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
-    company <span class="removed"><del><strong>says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in the U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+    can remotely control the toys with a mobile phone. This would enable
+    crackers to listen in</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+  &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in 
many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>break the security of 
an Amazon device,
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and</em></ins></span> &lt;a <span class="removed"><del><strong>href="
   
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
@@ -2747,7 +2781,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:49 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.242
retrieving revision 1.243
diff -u -b -r1.242 -r1.243
--- proprietary-surveillance.ja.po      7 Feb 2019 10:59:49 -0000       1.242
+++ proprietary-surveillance.ja.po      8 Feb 2019 08:59:36 -0000       1.243
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1492,6 +1492,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary-surveillance.pot        7 Feb 2019 10:59:49 -0000       1.190
+++ proprietary-surveillance.pot        8 Feb 2019 08:59:36 -0000       1.191
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -997,6 +997,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\";> 25% fail "
+"to protect their users’ privacy</a> due to DNS leaks. In addition, 85% "
+"feature intrusive permissions or functions in their source code&mdash;often "
+"used for invasive advertising&mdash;that could potentially also be used to "
+"spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-app-investigation/\";>half of the "
+"top 10 gratis VPN apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a "
+"href=\"/philosophy/free-sw.html\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a "
 
"href=\"https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\";>
 "
 "stored users' locations to the company's server</a>. The company is being "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.463
retrieving revision 1.464
diff -u -b -r1.463 -r1.464
--- proprietary-surveillance.ru.po      7 Feb 2019 13:30:31 -0000       1.463
+++ proprietary-surveillance.ru.po      8 Feb 2019 08:59:36 -0000       1.464
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1394,6 +1395,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-tyrants.it.po   5 Jan 2019 11:31:36 -0000       1.39
+++ proprietary-tyrants.it.po   8 Feb 2019 08:59:36 -0000       1.40
@@ -64,12 +64,23 @@
 "approvate&rdquo;. Chiamiamo questa pratica <em>tivoizzazione</em>."
 
 #. type: Content of: <div><div><p>
+# || No change detected.  The change might only be in amounts of spaces.
+#, fuzzy
+#| msgid ""
+#| "If you know of an example that ought to be in this page but isn't here, "
+#| "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
+#| "org&gt;</a> to inform us. Please include the URL of a trustworthy "
+#| "reference or two to serve as specific substantiation."
 msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
 "or two to serve as specific substantiation."
 msgstr ""
+"Se conoscete un esempio che dovrebbe essere in questa pagina ma non è "
+"elencato, scrivete a <a href=\"mailto:address@hidden";>&lt;"
+"address@hidden&gt;</a> per informarci. Vi chiediamo di includere anche "
+"uno o due link con informazioni affidabili a fini di verifica."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary.de-diff.html    7 Feb 2019 10:59:50 -0000       1.42
+++ proprietary.de-diff.html    8 Feb 2019 08:59:36 -0000       1.43
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -123,9 +123,9 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -183,6 +183,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902040"&gt;
     &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
@@ -232,21 +251,6 @@
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901110"&gt;
-    &lt;p&gt;Samsung phones come preloaded with &lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
-    a version of the Facebook app that can't be deleted&lt;/a&gt;. &lt;a
-    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
-    Facebook claims this is a stub&lt;/a&gt; which doesn't do anything, but we
-    have to take their word for it, and there is the permanent risk that
-    the app will be activated by an automatic update.&lt;/p&gt;
-
-    &lt;p&gt;Preloading crapware along with a nonfree operating system is 
common
-    practice, but by making the crapware undeletable, Facebook and Samsung 
(&lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
-    are going one step further in their hijacking of users' devices.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.de.po   7 Feb 2019 10:59:50 -0000       1.84
+++ proprietary.de.po   8 Feb 2019 08:59:36 -0000       1.85
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -497,26 +521,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.es.po   7 Feb 2019 11:31:42 -0000       1.93
+++ proprietary.es.po   8 Feb 2019 08:59:36 -0000       1.94
@@ -8,13 +8,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2019-02-07 11:37+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
 "Language: es\n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=utf-8\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 "X-Outdated-Since: 2019-02-07 10:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -299,6 +299,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -393,39 +417,6 @@
 "es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
 "se pague por algo malo, pero no lo hace menos malo."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"Los teléfonos Samsung llevan preinstalada <a href=\"https://www.bloomberg.";
-"com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
-"delete-facebook\">una versión de la aplicación de Facebook que no puede "
-"eliminarse</a>. <a href=\"https://www.infopackets.com/news/10484/truth-";
-"behind-undeletable-facebook-app\">Facebook afirma que eso es un residuo</a> "
-"que no hace nada, pero tenemos que creerles, y existe un riesgo permanente "
-"de que la aplicación se active mediante una actualización automática."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"La preinstalación de programas basura es una práctica común en los 
sistemas "
-"operativos que no son libres, pero al hacer que esos programas no puedan "
-"eliminarse, Facebook and Samsung (<a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">among others</a>) están dando un paso más en su secuestro de los 
"
-"dispositivos de los usuarios."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,6 +496,38 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/";
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-";
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "Los teléfonos Samsung llevan preinstalada <a 
href=\"https://www.bloomberg.";
+#~ "com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\">una versión de la aplicación de Facebook que no puede "
+#~ "eliminarse</a>. <a href=\"https://www.infopackets.com/news/10484/truth-";
+#~ "behind-undeletable-facebook-app\">Facebook afirma que eso es un residuo</"
+#~ "a> que no hace nada, pero tenemos que creerles, y existe un riesgo "
+#~ "permanente de que la aplicación se active mediante una actualización "
+#~ "automática."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-";
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "La preinstalación de programas basura es una práctica común en los "
+#~ "sistemas operativos que no son libres, pero al hacer que esos programas "
+#~ "no puedan eliminarse, Facebook and Samsung (<a href=\"https://www.";
+#~ "bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-"
+#~ "they-can-t-delete-facebook\">among others</a>) están dando un paso más 
en "
+#~ "su secuestro de los dispositivos de los usuarios."
+
+#~ msgid ""
 #~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 #~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 #~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary.fr.po   7 Feb 2019 13:27:55 -0000       1.116
+++ proprietary.fr.po   8 Feb 2019 08:59:36 -0000       1.117
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2019-02-07 14:20+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -396,39 +421,6 @@
 "remède contre l'injustice qu'ils représentent. Elle permet ne pas payer 
pour "
 "ces choses malfaisantes, mais ne peut pas les rendre moins malfaisantes."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"Les téléphone Samsung sont livrés avec <a 
href=\"https://www.bloomberg.com/";
-"news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">une version de l'appli Facebook qu'on ne peut pas supprimer</a>. "
-"<a href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-";
-"facebook-app\">Facebook prétend qu'il s'agit d'une coquille vide</a>, non "
-"fonctionnelle, mais on doit les croire sur parole et il y a toujours un "
-"risque que l'appli soit activée par une mise à jour automatique."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"La préinstallation de pourriciels avec un système d'exploitation non libre "
-"est pratique courante, mais en rendant impossible la suppression du "
-"pouriciel, Facebook et Samsung (<a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">parmi d'autres</a>) vont encore plus loin dans le piratage des "
-"appareils des utilisateurs."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,3 +494,35 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/";
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-";
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "Les téléphone Samsung sont livrés avec <a href=\"https://www.bloomberg.";
+#~ "com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\">une version de l'appli Facebook qu'on ne peut pas "
+#~ "supprimer</a>. <a href=\"https://www.infopackets.com/news/10484/truth-";
+#~ "behind-undeletable-facebook-app\">Facebook prétend qu'il s'agit d'une "
+#~ "coquille vide</a>, non fonctionnelle, mais on doit les croire sur parole "
+#~ "et il y a toujours un risque que l'appli soit activée par une mise à 
jour "
+#~ "automatique."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-";
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "La préinstallation de pourriciels avec un système d'exploitation non "
+#~ "libre est pratique courante, mais en rendant impossible la suppression du "
+#~ "pouriciel, Facebook et Samsung (<a href=\"https://www.bloomberg.com/news/";
+#~ "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+#~ "facebook\">parmi d'autres</a>) vont encore plus loin dans le piratage des "
+#~ "appareils des utilisateurs."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.it-diff.html    7 Feb 2019 10:59:50 -0000       1.54
+++ proprietary.it-diff.html    8 Feb 2019 08:59:36 -0000       1.55
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -99,18 +99,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -182,6 +182,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902040"&gt;
     &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
@@ -231,21 +250,6 @@
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901110"&gt;
-    &lt;p&gt;Samsung phones come preloaded with &lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
-    a version of the Facebook app that can't be deleted&lt;/a&gt;. &lt;a
-    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
-    Facebook claims this is a stub&lt;/a&gt; which doesn't do anything, but we
-    have to take their word for it, and there is the permanent risk that
-    the app will be activated by an automatic update.&lt;/p&gt;
-
-    &lt;p&gt;Preloading crapware along with a nonfree operating system is 
common
-    practice, but by making the crapware undeletable, Facebook and Samsung 
(&lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
-    are going one step further in their hijacking of users' devices.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -306,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.it.po   7 Feb 2019 10:59:50 -0000       1.93
+++ proprietary.it.po   8 Feb 2019 08:59:36 -0000       1.94
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -501,26 +525,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.ja-diff.html    7 Feb 2019 10:59:50 -0000       1.55
+++ proprietary.ja-diff.html    8 Feb 2019 08:59:36 -0000       1.56
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -95,16 +95,16 @@
  &lt;/tr&gt;
  &lt;tr&gt;
   &lt;td&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html"&gt;Malware
 in the Amazon
-      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+      Swindle&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
@@ -155,10 +155,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -179,6 +179,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902040"&gt;
     &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
@@ -228,21 +247,6 @@
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901110"&gt;
-    &lt;p&gt;Samsung phones come preloaded with &lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
-    a version of the Facebook app that can't be deleted&lt;/a&gt;. &lt;a
-    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
-    Facebook claims this is a stub&lt;/a&gt; which doesn't do anything, but we
-    have to take their word for it, and there is the permanent risk that
-    the app will be activated by an automatic update.&lt;/p&gt;
-
-    &lt;p&gt;Preloading crapware along with a nonfree operating system is 
common
-    practice, but by making the crapware undeletable, Facebook and Samsung 
(&lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
-    are going one step further in their hijacking of users' devices.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -303,7 +307,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.ja.po   7 Feb 2019 10:59:50 -0000       1.76
+++ proprietary.ja.po   8 Feb 2019 08:59:36 -0000       1.77
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -421,26 +445,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.nl-diff.html    7 Feb 2019 10:59:50 -0000       1.54
+++ proprietary.nl-diff.html    8 Feb 2019 08:59:36 -0000       1.55
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -99,19 +99,19 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -182,6 +182,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902040"&gt;
     &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
@@ -231,21 +250,6 @@
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901110"&gt;
-    &lt;p&gt;Samsung phones come preloaded with &lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
-    a version of the Facebook app that can't be deleted&lt;/a&gt;. &lt;a
-    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
-    Facebook claims this is a stub&lt;/a&gt; which doesn't do anything, but we
-    have to take their word for it, and there is the permanent risk that
-    the app will be activated by an automatic update.&lt;/p&gt;
-
-    &lt;p&gt;Preloading crapware along with a nonfree operating system is 
common
-    practice, but by making the crapware undeletable, Facebook and Samsung 
(&lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
-    are going one step further in their hijacking of users' devices.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -306,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.nl.po   7 Feb 2019 10:59:50 -0000       1.65
+++ proprietary.nl.po   8 Feb 2019 08:59:36 -0000       1.66
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -494,26 +518,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.pl-diff.html    7 Feb 2019 10:59:50 -0000       1.72
+++ proprietary.pl-diff.html    8 Feb 2019 08:59:36 -0000       1.73
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -87,8 +87,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
+instances of malicious functionalities (with more than 400 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -124,10 +124,10 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -180,6 +180,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902040"&gt;
     &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
@@ -229,21 +248,6 @@
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901110"&gt;
-    &lt;p&gt;Samsung phones come preloaded with &lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
-    a version of the Facebook app that can't be deleted&lt;/a&gt;. &lt;a
-    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
-    Facebook claims this is a stub&lt;/a&gt; which doesn't do anything, but we
-    have to take their word for it, and there is the permanent risk that
-    the app will be activated by an automatic update.&lt;/p&gt;
-
-    &lt;p&gt;Preloading crapware along with a nonfree operating system is 
common
-    practice, but by making the crapware undeletable, Facebook and Samsung 
(&lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
-    are going one step further in their hijacking of users' devices.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -304,7 +308,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary.pl.po   7 Feb 2019 10:59:50 -0000       1.60
+++ proprietary.pl.po   8 Feb 2019 08:59:37 -0000       1.61
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -576,26 +600,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary.pot     7 Feb 2019 10:59:50 -0000       1.57
+++ proprietary.pot     8 Feb 2019 08:59:37 -0000       1.58
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Content of: <title>
@@ -245,6 +245,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\";> 25% fail "
+"to protect their users’ privacy</a> due to DNS leaks. In addition, 85% "
+"feature intrusive permissions or functions in their source code&mdash;often "
+"used for invasive advertising&mdash;that could potentially also be used to "
+"spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a "
+"href=\"https://www.top10vpn.com/free-vpn-app-investigation/\";>half of the "
+"top 10 gratis VPN apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a "
+"href=\"/philosophy/free-sw.html\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a "
 
"href=\"https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss\";>
 "
 "let Google monitor their phone use, and all internet use in their homes, for "
@@ -310,26 +335,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\";>
 "
-"a version of the Facebook app that can't be deleted</a>. <a "
-"href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app\";>
 "
-"Facebook claims this is a stub</a> which doesn't do anything, but we have to "
-"take their word for it, and there is the permanent risk that the app will be "
-"activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\";>among
 "
-"others</a>)  are going one step further in their hijacking of users' "
-"devices."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.pt-br.po        7 Feb 2019 10:59:50 -0000       1.76
+++ proprietary.pt-br.po        8 Feb 2019 08:59:37 -0000       1.77
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2019-02-03 22:30-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -386,39 +410,6 @@
 "cura para a injustiça do software não livre. Pode evitar pagar pelo "
 "desagradável, mas não pode torná-lo menos desagradável."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"Os telefones Samsung vêm pré-carregados com <a 
href=\"https://www.bloomberg.";
-"com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
-"delete-facebook\"> uma versão do aplicativo do Facebook que não pode ser "
-"excluída </a>. <a 
href=\"https://www.infopackets.com/news/10484/truth-behind-";
-"undeletable-facebook-app\"> O Facebook alega que este é um esboço</a> que "
-"não faz nada, mas nós temos que aceitar a palavra deles nisso, e há o 
risco "
-"permanente de que o aplicativo será ativado por uma atualização 
automática."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"Pré-carregar o “crapware” junto com um sistema operacional não livre é 
uma "
-"prática comum, mas fazer o “crapware” não poder ser excluído, Facebook 
e "
-"Samsung (<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/";
-"samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">entre outros</"
-"a>) estão indo um passo adiante em seu sequestro de dispositivos dos "
-"usuários."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -494,6 +485,38 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/";
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-";
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "Os telefones Samsung vêm pré-carregados com <a href=\"https://www.";
+#~ "bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-"
+#~ "they-can-t-delete-facebook\"> uma versão do aplicativo do Facebook que "
+#~ "não pode ser excluída </a>. <a href=\"https://www.infopackets.com/";
+#~ "news/10484/truth-behind-undeletable-facebook-app\"> O Facebook alega que "
+#~ "este é um esboço</a> que não faz nada, mas nós temos que aceitar a "
+#~ "palavra deles nisso, e há o risco permanente de que o aplicativo será "
+#~ "ativado por uma atualização automática."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-";
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "Pré-carregar o “crapware” junto com um sistema operacional não livre 
é "
+#~ "uma prática comum, mas fazer o “crapware” não poder ser excluído, "
+#~ "Facebook e Samsung (<a href=\"https://www.bloomberg.com/news/";
+#~ "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+#~ "facebook\">entre outros</a>) estão indo um passo adiante em seu sequestro 
"
+#~ "de dispositivos dos usuários."
+
+#~ msgid ""
 #~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 #~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 #~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.ru.po   7 Feb 2019 13:30:31 -0000       1.145
+++ proprietary.ru.po   8 Feb 2019 08:59:37 -0000       1.146
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-08 08:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -400,39 +425,6 @@
 "не избавляет от несправедливости 
несвободных программ. Возможно, это "
 "позволяет не платить за эту гадость, но 
меньшей гадостью это ее не делает."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-"Телефоны Samsung продаются с <a 
href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> версией приложения Facebook, которую 
нельзя удалить</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook уверяет, что это заглушка</a>, 
которая ничего не делает, но "
-"нам остается только верить им на слово, и 
всегда есть риск, что приложение "
-"будет активировано при автоматическом 
обновлении."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-"Поставка захламляющих устройство 
программ с несвободной операционной "
-"системой&nbsp;&mdash; обычная практика, но 
делая эти программы неудаляемыми, "
-"Facebook и Samsung (<a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\">в числе прочих</a>) делают еще один 
шаг к захвату усройств "
-"пользователей."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -512,6 +504,37 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/";
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
+#~ "a>. <a href=\"https://www.infopackets.com/news/10484/truth-behind-";
+#~ "undeletable-facebook-app\"> Facebook claims this is a stub</a> which "
+#~ "doesn't do anything, but we have to take their word for it, and there is "
+#~ "the permanent risk that the app will be activated by an automatic update."
+#~ msgstr ""
+#~ "Телефоны Samsung продаются с <a 
href=\"https://www.bloomberg.com/news/";
+#~ "articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+#~ "facebook\"> версией приложения Facebook, которую 
нельзя удалить</a>. <a "
+#~ "href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-";
+#~ "facebook-app\"> Facebook уверяет, что это 
заглушка</a>, которая ничего не "
+#~ "делает, но нам остается только верить им 
на слово, и всегда есть риск, "
+#~ "что приложение будет активировано при 
автоматическом обновлении."
+
+#~ msgid ""
+#~ "Preloading crapware along with a nonfree operating system is common "
+#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
+#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-";
+#~ "phone-users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  "
+#~ "are going one step further in their hijacking of users' devices."
+#~ msgstr ""
+#~ "Поставка захламляющих устройство 
программ с несвободной операционной "
+#~ "системой&nbsp;&mdash; обычная практика, но 
делая эти программы "
+#~ "неудаляемыми, Facebook и Samsung (<a 
href=\"https://www.bloomberg.com/";
+#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
+#~ "delete-facebook\">в числе прочих</a>) делают еще 
один шаг к захвату "
+#~ "усройств пользователей."
+
+#~ msgid ""
 #~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 #~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 #~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary.zh-tw-diff.html 7 Feb 2019 10:59:50 -0000       1.32
+++ proprietary.zh-tw-diff.html 8 Feb 2019 08:59:37 -0000       1.33
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -123,9 +123,9 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -183,6 +183,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy on users. Other technical flaws were
+    found as well.&lt;/p&gt;
+
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are _not_ &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902040"&gt;
     &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
@@ -232,21 +251,6 @@
     is not a cure for the injustice of nonfree software. It may avoid
     paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201901110"&gt;
-    &lt;p&gt;Samsung phones come preloaded with &lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;
-    a version of the Facebook app that can't be deleted&lt;/a&gt;. &lt;a
-    
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app"&gt;
-    Facebook claims this is a stub&lt;/a&gt; which doesn't do anything, but we
-    have to take their word for it, and there is the permanent risk that
-    the app will be activated by an automatic update.&lt;/p&gt;
-
-    &lt;p&gt;Preloading crapware along with a nonfree operating system is 
common
-    practice, but by making the crapware undeletable, Facebook and Samsung 
(&lt;a
-    
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook"&gt;among
 others&lt;/a&gt;)
-    are going one step further in their hijacking of users' devices.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -307,7 +311,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/07 10:59:50 $
+$Date: 2019/02/08 08:59:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary.zh-tw.po        7 Feb 2019 10:59:50 -0000       1.43
+++ proprietary.zh-tw.po        8 Feb 2019 08:59:37 -0000       1.44
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-07 10:56+0000\n"
+"POT-Creation-Date: 2019-02-08 08:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "
@@ -410,26 +434,6 @@
 "nasty thing, but cannot make it less nasty."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/";
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-";
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-";
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>)  are going "
-"one step further in their hijacking of users' devices."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- pt-br.po    7 Feb 2019 10:59:50 -0000       1.32
+++ pt-br.po    8 Feb 2019 08:59:37 -0000       1.33
@@ -4000,6 +4000,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- ru.po       7 Feb 2019 13:17:26 -0000       1.55
+++ ru.po       8 Feb 2019 08:59:37 -0000       1.56
@@ -4012,7 +4012,8 @@
 "Google приглашает людей <a 
href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> позволить Google наблюдать за 
использованием их телефона и "
-"всем использованием Интернета в их домах 
за экстравагантную плату 20 долларов</a>."
+"всем использованием Интернета в их домах 
за экстравагантную плату 20 "
+"долларов</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -4021,10 +4022,10 @@
 "in a way that encourages most people to ignore the details. That, we "
 "believe, makes it fitting to list here."
 msgstr ""
-"Это не вредоносная функция программы, у 
которой есть какое-то другое назначение; "
-"это единственное назначение программы, 
Google так и говорит. Но Google говорит "
-"это так, чтобы люди не обращали внимания 
на подробности. Мы считаем, что это "
-"делает программу подходящей для нашего 
списка."
+"Это не вредоносная функция программы, у 
которой есть какое-то другое "
+"назначение; это единственное назначение 
программы, Google так и говорит. Но "
+"Google говорит это так, чтобы люди не 
обращали внимания на подробности. Мы "
+"считаем, что это делает программу подх
одящей для нашего списка."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -5585,6 +5586,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- zh-tw.po    7 Feb 2019 10:59:50 -0000       1.23
+++ zh-tw.po    8 Feb 2019 08:59:37 -0000       1.24
@@ -3886,6 +3886,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"An investigation of the 150 most popular gratis VPN apps in Google Play "
+"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-";
+"index/\"> 25% fail to protect their users’ privacy</a> due to DNS leaks. In 
"
+"addition, 85% feature intrusive permissions or functions in their source "
+"code&mdash;often used for invasive advertising&mdash;that could potentially "
+"also be used to spy on users. Other technical flaws were found as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Moreover, a previous investigation had found that <a href=\"https://www.";
+"top10vpn.com/free-vpn-app-investigation/\">half of the top 10 gratis VPN "
+"apps have lousy privacy policies</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"It is unfortunate that these articles talk about &ldquo;free apps.&rdquo; "
+"These apps are gratis, but they are _not_ <a href=\"/philosophy/free-sw.html"
+"\">free software</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Weather Channel app <a href=\"https://www.theguardian.com/";
 "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling\"> "
 "stored users' locations to the company's server</a>. The company is being "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]