www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Mon, 4 Mar 2019 03:00:40 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/03/04 03:00:38

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.386&r2=1.387
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.483&r2=1.484
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.39&r2=1.40

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- de.po       28 Feb 2019 22:00:38 -0000      1.39
+++ de.po       4 Mar 2019 08:00:36 -0000       1.40
@@ -7259,6 +7259,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- es.po       28 Feb 2019 22:00:38 -0000      1.49
+++ es.po       4 Mar 2019 08:00:36 -0000       1.50
@@ -5304,6 +5304,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- fr.po       28 Feb 2019 22:17:16 -0000      1.68
+++ fr.po       4 Mar 2019 08:00:36 -0000       1.69
@@ -5781,6 +5781,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- it.po       28 Feb 2019 22:00:38 -0000      1.39
+++ it.po       4 Mar 2019 08:00:36 -0000       1.40
@@ -6832,6 +6832,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- ja.po       28 Feb 2019 22:00:38 -0000      1.39
+++ ja.po       4 Mar 2019 08:00:36 -0000       1.40
@@ -5807,6 +5807,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-mobiles.de-diff.html        28 Feb 2019 09:30:38 -0000      1.43
+++ malware-mobiles.de-diff.html        4 Mar 2019 08:00:36 -0000       1.44
@@ -404,7 +404,7 @@
     &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
       meant</strong></del></span> <span class="inserted"><ins><em>these apps 
are proprietary it makes it
-    hard</em></ins></span> to <span class="removed"><del><strong>track users 
and show them targeted</strong></del></span> <span 
class="inserted"><ins><em>impossible to know which apps are at risk.&lt;/p&gt;
+    hard</em></ins></span> to <span class="removed"><del><strong>track users 
and show them</strong></del></span> <span class="inserted"><ins><em>impossible 
to know which apps are at risk.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405190"&gt;
@@ -506,6 +506,25 @@
     developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
@@ -777,7 +796,7 @@
     &lt;dl class="compact"&gt;
       &lt;dt&gt;SurfEasy&lt;/dt&gt;
       &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant to track users and show them targeted</em></ins></span> 
ads.&lt;/dd&gt;
+      meant to track users and show them</em></ins></span> targeted 
ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
       &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
@@ -1276,7 +1295,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:30:38 $
+$Date: 2019/03/04 08:00:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- malware-mobiles.de.po       28 Feb 2019 09:30:38 -0000      1.100
+++ malware-mobiles.de.po       4 Mar 2019 08:00:37 -0000       1.101
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -813,6 +813,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- malware-mobiles.es.po       28 Feb 2019 09:30:38 -0000      1.106
+++ malware-mobiles.es.po       4 Mar 2019 08:00:37 -0000       1.107
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -703,6 +703,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- malware-mobiles.fr.po       28 Feb 2019 22:17:16 -0000      1.127
+++ malware-mobiles.fr.po       4 Mar 2019 08:00:37 -0000       1.128
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2019-02-28 23:15+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -711,6 +712,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- malware-mobiles.it-diff.html        28 Feb 2019 09:30:38 -0000      1.48
+++ malware-mobiles.it-diff.html        4 Mar 2019 08:00:37 -0000       1.49
@@ -193,30 +193,29 @@
 
 &lt;li&gt;
   &lt;p&gt;Many Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
-       Broadcom's non-free firmware.&lt;/p&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a 
bug</strong></del></span>
+    <span class="inserted"><ins><em>change the software</em></ins></span> in
+       <span class="removed"><del><strong>Broadcom's non-free 
firmware.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
-a security hole that allows an SMS message to install
+a security hole that allows an SMS message</strong></del></span> <span 
class="inserted"><ins><em>the main processor.  They still have the
+    back door, but at least it is unable</em></ins></span> to <span 
class="removed"><del><strong>install
 ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
 &lt;p&gt;Many proprietary payment apps &lt;a
 
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
-transmit personal data</strong></del></span>
-    <span class="inserted"><ins><em>change the software</em></ins></span> in 
<span class="removed"><del><strong>an insecure way&lt;/a&gt;.
-However,</strong></del></span> the <span class="removed"><del><strong>worse 
aspect of these apps</strong></del></span> <span class="inserted"><ins><em>main 
processor.  They still have the
-    back door, but at least it</em></ins></span> is <span 
class="removed"><del><strong>that
-&lt;a 
href="/philosophy/surveillance-vs-democracy.html"&gt;payment</strong></del></span>
 <span class="inserted"><ins><em>unable to turn the phone unto a
+transmit personal data in an insecure way&lt;/a&gt;.
+However,</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> the <span 
class="removed"><del><strong>worse aspect of these apps</strong></del></span> 
<span class="inserted"><ins><em>phone unto a
     listening device.&lt;/p&gt;
 
-    &lt;p&gt;The universal back door</em></ins></span> is <span 
class="removed"><del><strong>not anonymous&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>apparently 
also used to make phones &lt;a
-    
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+    &lt;p&gt;The universal back door</em></ins></span> is <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>apparently also used to make phones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;payment
 is not anonymous&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
     transmit even when they are turned off&lt;/a&gt;.  This means their 
movements
     are tracked, and may also make the listening feature 
work.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -534,6 +533,25 @@
     developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
@@ -1304,7 +1322,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:30:38 $
+$Date: 2019/03/04 08:00:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- malware-mobiles.it.po       28 Feb 2019 09:30:39 -0000      1.100
+++ malware-mobiles.it.po       4 Mar 2019 08:00:37 -0000       1.101
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -782,6 +782,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- malware-mobiles.ja-diff.html        28 Feb 2019 09:30:39 -0000      1.62
+++ malware-mobiles.ja-diff.html        4 Mar 2019 08:00:37 -0000       1.63
@@ -330,7 +330,7 @@
     modem that tells big brother all</em></ins></span> the <span 
class="removed"><del><strong>&lt;em&gt;developer&lt;/em&gt; 
gets</strong></del></span> <span class="inserted"><ins><em>time 
where</em></ins></span> it <span class="removed"><del><strong>all.
 This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
-&lt;p&gt;The server surely has</strong></del></span> <span 
class="inserted"><ins><em>is.  If you own
+&lt;p&gt;The server surely</strong></del></span> <span 
class="inserted"><ins><em>is.  If you own
     such a car, it would be wise to disconnect the modem so as to turn
     off the tracking.&lt;/p&gt;
   &lt;/li&gt;
@@ -369,7 +369,7 @@
     personal data to a server, where the &lt;em&gt;developer&lt;/em&gt; gets 
it all.
     This &ldquo;service&rdquo; is for suckers!&lt;/p&gt;
 
-    &lt;p&gt;The server surely has</em></ins></span> a &ldquo;privacy 
policy,&rdquo; and <span 
class="removed"><del><strong>surely</strong></del></span> <span 
class="inserted"><ins><em>surely
+    &lt;p&gt;The server surely</em></ins></span> has a &ldquo;privacy 
policy,&rdquo; and <span 
class="removed"><del><strong>surely</strong></del></span> <span 
class="inserted"><ins><em>surely
     it is worthless since nearly all of them are.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -498,6 +498,25 @@
     developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
@@ -1148,7 +1167,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 09:30:39 $
+$Date: 2019/03/04 08:00:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-mobiles.ja.po       28 Feb 2019 09:30:39 -0000      1.88
+++ malware-mobiles.ja.po       4 Mar 2019 08:00:37 -0000       1.89
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -651,6 +651,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-mobiles.pot 28 Feb 2019 09:30:39 -0000      1.66
+++ malware-mobiles.pot 4 Mar 2019 08:00:37 -0000       1.67
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -483,6 +483,28 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a "
+"href=\"https://www.appcensus.mobi\";> how Android apps use and misuse users' "
+"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
+"which 24,000 (31%) transmit the <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
+"ID</a> to other companies, and <a "
+"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> "
+"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
+"users cannot escape tracking by resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a "
 
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";> 
"
 "recording all the users' actions</a> in interacting with the app."

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- malware-mobiles.ru.po       28 Feb 2019 10:00:08 -0000      1.161
+++ malware-mobiles.ru.po       4 Mar 2019 08:00:37 -0000       1.162
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-28 09:26+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -701,6 +702,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- nl.po       28 Feb 2019 22:00:38 -0000      1.39
+++ nl.po       4 Mar 2019 08:00:37 -0000       1.40
@@ -4589,6 +4589,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- pl.po       28 Feb 2019 22:00:38 -0000      1.39
+++ pl.po       4 Mar 2019 08:00:37 -0000       1.40
@@ -4033,6 +4033,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- pot 28 Feb 2019 22:00:38 -0000      1.39
+++ pot 4 Mar 2019 08:00:37 -0000       1.40
@@ -3856,6 +3856,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-surveillance.de-diff.html       28 Feb 2019 22:00:39 -0000      
1.51
+++ proprietary-surveillance.de-diff.html       4 Mar 2019 08:00:37 -0000       
1.52
@@ -656,26 +656,32 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201711250"&gt;
-    &lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
+    &lt;p&gt;The DMCA</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests</strong></del></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>EU Copyright 
Directive make it &lt;a
     href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-    illegal to study how iOS cr&hellip;apps spy on users&lt;/a&gt;, because
+    illegal</em></ins></span> to <span class="removed"><del><strong>read logs
+      for other apps</strong></del></span> <span 
class="inserted"><ins><em>study how iOS cr&hellip;apps spy on users&lt;/a&gt;, 
because
     this would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709210"&gt;
     &lt;p&gt;In the latest iThings system,
-    &ldquo;turning off&rdquo; WiFi and Bluetooth the obvious way &lt;a
+    &ldquo;turning off&rdquo; WiFi</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>Bluetooth the obvious way &lt;a
     
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
     doesn't really turn them off&lt;/a&gt;.  A more advanced way really does 
turn
     them off&mdash;only until 5am.  That's Apple for you&mdash;&ldquo;We
-    know you want to be spied on&rdquo;.&lt;/p&gt;
+    know you want</em></ins></span> to <span 
class="removed"><del><strong>LinkedIn. Also,</strong></del></span> <span 
class="inserted"><ins><em>be spied on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702150"&gt;
     &lt;p&gt;Apple proposes &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
     fingerprint-scanning touch screen&lt;/a&gt;&mdash;which would mean no way
-    to use it without having your fingerprints taken. Users would have
+    to use</em></ins></span> it <span class="inserted"><ins><em>without having 
your fingerprints taken. Users would have
     no way to tell whether the phone is snooping on them.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -690,14 +696,18 @@
     &lt;p&gt;iThings automatically upload to Apple's servers all the photos
     and videos they make.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library stores every photo and 
video you
-    take, and keeps them up to date on all your devices. Any edits you
+    &lt;blockquote&gt;&lt;p&gt; iCloud Photo Library</em></ins></span> stores 
<span class="removed"><del><strong>detailed logs</strong></del></span> <span 
class="inserted"><ins><em>every photo</em></ins></span> and <span 
class="removed"><del><strong>may turn</strong></del></span> <span 
class="inserted"><ins><em>video you
+    take, and keeps</em></ins></span> them <span 
class="removed"><del><strong>over</strong></del></span> <span 
class="inserted"><ins><em>up</em></ins></span> to <span 
class="inserted"><ins><em>date on all your devices. Any edits you
     make are automatically updated everywhere. [&hellip;] 
&lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
     information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
-    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
-    startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means &ldquo;please
+    &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</em></ins></span> the <span class="removed"><del><strong>UK government if
+      requested.&lt;/dd&gt;
+
+    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into</strong></del></span>
+    <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;There is a way to
@@ -802,9 +812,8 @@
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
-    disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>tracking.  
This is
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself to completely stop the tracking.  This is
     yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
@@ -838,45 +847,38 @@
     sold.  Some Motorola phones, made when this company was owned
     by Google, use a modified version of Android that &lt;a
     
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>read logs</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+    sends personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens</em></ins></span> for <span class="removed"><del><strong>other 
apps and also core system logs. TigerVPN</strong></del></span> <span 
class="inserted"><ins><em>voice all the time&lt;/a&gt;.&lt;/p&gt;
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>HTML pages returned to</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends app</em></ins></span> developers
-      <span class="removed"><del><strong>have confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs
-      and may turn them over to</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
     
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>UK government if
-      requested.&lt;/dd&gt;
-
-    &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into</strong></del></span> <span 
class="inserted"><ins><em>personal details of users that 
install</em></ins></span> the <span class="removed"><del><strong>HTML pages 
returned to</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+    the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span class="inserted"><ins><em>personal 
details</em></ins></span> of <span class="inserted"><ins><em>users that 
install</em></ins></span> the <span class="removed"><del><strong>JS injection 
is to display
+      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Merely asking</em></ins></span> the
-      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>the JS injection</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> is <span 
class="inserted"><ins><em>not enough</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
-    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
-    they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information</em></ins></span> it <span 
class="removed"><del><strong>redirects</strong></del></span> <span 
class="inserted"><ins><em>collects on users, instead of
-    hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information 
in</em></ins></span> the
       <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
       website).&lt;/dd&gt;
 
     &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects</strong></del></span>
+    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
+      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo;</em></ins></span> of <span 
class="inserted"><ins><em>users is not enough to
+    legitimize actions like this.  At</em></ins></span> this <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>point, most users</em></ins></span> have
+      <span class="removed"><del><strong>confirmed</strong></del></span> <span 
class="inserted"><ins><em>stopped
+    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="inserted"><ins><em>spell out what
+    they are &ldquo;consenting&rdquo; to.  Google should clearly and
+    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>non-premium version</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, 
instead</em></ins></span> of
+    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+
+    &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+    and other companies from getting this personal information 
in</em></ins></span> the <span class="removed"><del><strong>app 
does</strong></del></span>
     <span class="inserted"><ins><em>first place!&lt;/p&gt;
   &lt;/li&gt;
 
@@ -895,14 +897,15 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain</em></ins></span> JavaScript <span 
class="removed"><del><strong>code into HTML pages,</strong></del></span> <span 
class="inserted"><ins><em>code,</em></ins></span> and <span 
class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers of</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;E-books can contain</em></ins></span> JavaScript <span 
class="removed"><del><strong>injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>code,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes</em></ins></span> this <span class="removed"><del><strong>app 
have
-      confirmed that</strong></del></span> <span 
class="inserted"><ins><em>code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span>
 
-  &lt;li id="M201410080"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
@@ -911,20 +914,16 @@
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware in many e-readers&mdash;not only</em></ins></span> the 
<span class="removed"><del><strong>non-premium version of</strong></del></span> 
<span class="inserted"><ins><em>Kindle: &lt;a
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only the Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report even which page</em></ins></span> the <span 
class="removed"><del><strong>app does
-      JavaScript injection for tracking and display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>user reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInApplications"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found</strong></del></span> <span 
class="inserted"><ins><em>Applications&lt;/h3&gt;
+  &lt;h3 id="SpywareInApplications"&gt;Spyware in Applications&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInApplications"&gt;#SpywareInApplications&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -958,10 +957,7 @@
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps for BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With</strong></del></span>
+  &lt;p&gt;Apps</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
@@ -971,35 +967,56 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary
-    <span class="inserted"><ins><em>library for building 
mobile</em></ins></span> apps, <span class="removed"><del><strong>one can only 
hope that they don't.&lt;/p&gt;
-&lt;/li&gt;
+    &lt;p&gt;Facebook offered a convenient proprietary
+    library</em></ins></span> for <span class="removed"><del><strong>BART
+    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software</strong></del></span> <span 
class="inserted"><ins><em>building mobile</em></ins></span> apps, <span 
class="removed"><del><strong>users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>which 
also &lt;a
+    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing</em></ins></span> that 
<span class="inserted"><ins><em>all the personal
+    data</em></ins></span> they <span class="removed"><del><strong>don't 
snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>collected would go to Facebook as well.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span> <span class="inserted"><ins><em>which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    &lt;p&gt;It shows that no</em></ins></span> one can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>trust a 
nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
        to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
        &lt;/p&gt;
 
 &lt;/li&gt;
 
 &lt;li&gt;
-  &lt;p&gt;Pairs of Android apps can collude to transmit 
users'</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="removed"><del><strong>pairs</strong></del></span> <span 
class="inserted"><ins><em>companies built apps</em></ins></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Pairs of</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; 
how</em></ins></span> Android apps <span class="removed"><del><strong>can 
collude to transmit</strong></del></span> <span class="inserted"><ins><em>use 
and
+    misuse</em></ins></span> users' personal
+       <span class="removed"><del><strong>data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;. As</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
+    78,000 have been analyzed,</em></ins></span> of <span 
class="removed"><del><strong>pairs that collude&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers &lt;a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span class="inserted"><ins><em>way and released them, apparently not 
realizing that all</em></ins></span> the personal <span 
class="removed"><del><strong>details of users</strong></del></span>
-    <span class="inserted"><ins><em>data they collected would go to Facebook 
as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>no one can trust a nonfree program, not 
even</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;consent&rdquo;</strong></del></span>
-    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>users is not enough
-to legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>other nonfree 
programs.&lt;/p&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span> 
<span class="inserted"><ins><em>which 24,000 (31%) transmit 
the</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>personal details</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent 
violation</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span>
+    <span class="inserted"><ins><em>Google's policies. But it 
seems</em></ins></span> that <span class="removed"><del><strong>install the 
app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Google wasn't aware</em></ins></span> of <span 
class="removed"><del><strong>users is not enough</strong></del></span> <span 
class="inserted"><ins><em>it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>take action. This 
proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
@@ -1970,8 +1987,8 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The 
other day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
+&lt;p&gt;Emo Phillips made a joke: The other day</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>woman came 
up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see</em></ins></span> out
       <span class="removed"><del><strong>who</strong></del></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
@@ -3277,7 +3294,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary-surveillance.de.po      28 Feb 2019 22:00:39 -0000      1.266
+++ proprietary-surveillance.de.po      4 Mar 2019 08:00:37 -0000       1.267
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1864,6 +1864,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.386
retrieving revision 1.387
diff -u -b -r1.386 -r1.387
--- proprietary-surveillance.fr.po      28 Feb 2019 22:17:16 -0000      1.386
+++ proprietary-surveillance.fr.po      4 Mar 2019 08:00:37 -0000       1.387
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2019-02-28 23:15+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1430,6 +1431,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-surveillance.it-diff.html       28 Feb 2019 22:00:39 -0000      
1.118
+++ proprietary-surveillance.it-diff.html       4 Mar 2019 08:00:37 -0000       
1.119
@@ -1153,78 +1153,96 @@
     <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
     data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps 
that</em></ins></span> used <span class="inserted"><ins><em>to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>the user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the 
user&lt;/a&gt;. This is in addition to
+      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>use</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
       phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>redirecting
-    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>question</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>most of them 
was designed</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
-    difficult.&lt;/p&gt;
-
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there</em></ins></span> is no <span class="removed"><del><strong>excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Don't be distracted by the question</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. 
As</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>app 
developers get
+      users</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>other companies, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
       sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because it asked the user to
-      approve sending personal data to the app developer but did not
-      ask about sending it to other companies.  This shows the
-      weakness</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>the app developer but did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
+    that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
+    their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>Google Play 
found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>interacting 
with the app.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span> <span class="inserted"><ins><em>protect 
their users’ privacy&lt;/a&gt; due to DNS leaks. In
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads 
on users, and redirecting</em></ins></span>
+    them to
+      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,
+    the user interface of most of them was designed to make uninstallation
+    difficult.&lt;/p&gt;
+
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>companies, and the NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
     potentially also be used</em></ins></span> to spy <span 
class="removed"><del><strong>through it too&lt;/a&gt;.
@@ -1257,59 +1275,57 @@
     &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Weather Channel app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in</strong></del></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+      a speech recognition</strong></del></span> <span 
class="inserted"><ins><em>the company's server&lt;/a&gt;. The</em></ins></span> 
company <span class="removed"><del><strong>based in</strong></del></span> <span 
class="inserted"><ins><em>is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
-    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>toys</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do</em></ins></span>
+      can remotely control the toys</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do</em></ins></span>
     with <span class="inserted"><ins><em>the data.&lt;/p&gt;
 
     &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen in on a child's speech, and even speak
-      into</strong></del></span> <span class="inserted"><ins><em>side issue. 
What</em></ins></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;
+      enable crackers to listen in on</strong></del></span> <span 
class="inserted"><ins><em>side issue. What the company does
+    with the data is</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
+      into</strong></del></span> <span class="inserted"><ins><em>secondary 
issue. The principal wrong here is that</em></ins></span>
+    the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a
+    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
+    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through</strong></del></span> <span 
class="inserted"><ins><em>company does
-    with</em></ins></span> the <span class="removed"><del><strong>proprietary 
control app&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
     
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>data 
is</em></ins></span> a <span class="removed"><del><strong>person's
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span class="removed"><del><strong>its users 
through</strong></del></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>machine's &ldquo;advertising ID,&rdquo; so that
+    Facebook can correlate</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>was surrounded by a person's
       body), as well as the vibration frequency.&lt;/p&gt;
     
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>secondary issue. The principal wrong here is 
that</em></ins></span>
-    the <span class="removed"><del><strong>totally inadequate proposed 
response: a labeling
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
       standard with which manufacturers would make statements about
       their products, rather than free software which users could have
       checked and changed.&lt;/p&gt;
     
-    &lt;p&gt;The</strong></del></span> company <span 
class="inserted"><ins><em>gets</em></ins></span> that <span 
class="removed"><del><strong>made the vibrator
+    &lt;p&gt;The company that made</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>vibrator
       &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>data at all.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
-  &lt;/li&gt;
-
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+       was sued for collecting lots</strong></del></span> <span 
class="inserted"><ins><em>same machine via
+    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed</em></ins></span> 
information about <span class="removed"><del><strong>how
        people used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; 
so</em></ins></span> that <span class="removed"><del><strong>it was 
anonymizing</strong></del></span>
-    <span class="inserted"><ins><em>Facebook can correlate</em></ins></span> 
the data <span class="removed"><del><strong>may be
-      true, but it doesn't really matter. If</strong></del></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>data to a
-      data broker,</strong></del></span> <span class="inserted"><ins><em>same 
machine via
-    various apps. Some of them send Facebook detailed information 
about</em></ins></span>
-    the <span class="removed"><del><strong>data broker would have been able to 
figure out
-      who</strong></del></span> <span class="inserted"><ins><em>user's 
activities in the app; others only say that</em></ins></span> the user <span 
class="removed"><del><strong>was.&lt;/p&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold</strong></del></span>
+    the <span class="removed"><del><strong>data to a
+      data broker,</strong></del></span> <span 
class="inserted"><ins><em>user's activities in</em></ins></span> the <span 
class="removed"><del><strong>data broker would have been able to figure out
+      who</strong></del></span> <span class="inserted"><ins><em>app; others 
only say that</em></ins></span> the user <span 
class="removed"><del><strong>was.&lt;/p&gt;
     
     &lt;p&gt;Following this lawsuit,
       &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is
@@ -1345,7 +1361,7 @@
   &lt;li id="M201806110"&gt;
     &lt;p&gt;The Spanish football streaming app &lt;a
     
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="removed"><del><strong>the FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>listens through the microphone&lt;/a&gt;.&lt;/p&gt;
+    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
@@ -1510,7 +1526,7 @@
     &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span>
     <span class="inserted"><ins><em>worked in various ways to prevent that, 
and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>snooping of these apps.&lt;/p&gt;
+    for</em></ins></span> the <span class="removed"><del><strong>manufacturer 
is using it</strong></del></span> <span class="inserted"><ins><em>snooping of 
these apps.&lt;/p&gt;
 
     &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
     therefore shares in the responsibility for the injustice of their being
@@ -1519,7 +1535,7 @@
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Could Google have done a better job of preventing apps from
-    cheating? There</em></ins></span> is <span 
class="removed"><del><strong>using it</strong></del></span> <span 
class="inserted"><ins><em>no systematic way for Google, or Android users,
+    cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
     &lt;p&gt;Google could demand the source code for these apps, and study
@@ -3035,7 +3051,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary-surveillance.it.po      28 Feb 2019 22:00:39 -0000      1.279
+++ proprietary-surveillance.it.po      4 Mar 2019 08:00:37 -0000       1.280
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1814,6 +1814,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary-surveillance.ja-diff.html       28 Feb 2019 22:00:39 -0000      
1.128
+++ proprietary-surveillance.ja-diff.html       4 Mar 2019 08:00:37 -0000       
1.129
@@ -1047,84 +1047,83 @@
     <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
     data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps 
that</em></ins></span> used <span class="inserted"><ins><em>to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="removed"><del><strong>the user&lt;/a&gt;. This is in addition to
-      the snooping done by the phone company,</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and <span 
class="removed"><del><strong>perhaps by the OS in the
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner</strong></del></span>
+    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) 
transmit</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>perhaps by 
the OS in the
       phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>redirecting
-    them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>question</strong></del></span> 
<span class="inserted"><ins><em>user interface</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>most of them 
was designed</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>make uninstallation
-    difficult.&lt;/p&gt;
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23%</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> the <span 
class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>total) link 
this ID</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there</em></ins></span> is no <span class="removed"><del><strong>excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>no excuse for malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
       &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
       sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
       &lt;p&gt;The FTC criticized this app because it asked the user to
       approve sending personal data to the app developer but did not
-      ask about sending it to other companies.  This shows the
-      weakness</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation</em></ins></span> of the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>other companies.</strong></del></span> <span 
class="inserted"><ins><em>take action.</em></ins></span> This <span 
class="removed"><del><strong>shows</strong></del></span> <span 
class="inserted"><ins><em>proves
+    that</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>policies</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
       app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>150 most popular
-    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>Google Play 
found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves and then sends personal data about 
them</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
       &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies</strong></del></span> <span class="inserted"><ins><em>protect 
their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>companies, and the NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>invasive 
advertising&mdash;that could
-    potentially also be used</em></ins></span> to spy <span 
class="removed"><del><strong>through it too&lt;/a&gt;.
-      Here's information</strong></del></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      spies</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
+      Here's information</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1138,206 +1137,270 @@
 
 &lt;ul&gt;
 
-   &lt;li&gt;&lt;p&gt;A company</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
+   &lt;li&gt;&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span> <span class="inserted"><ins><em>malicious 
functionalities, such as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+    being sued for collecting lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
+    people use it&lt;/a&gt;.&lt;/p&gt;
+
+       &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites</em></ins></span> that <span 
class="removed"><del><strong>it anonymizes the data may be
+        true, but it doesn't really matter. If it sells</strong></del></span> 
<span class="inserted"><ins><em>stole their credentials. 
Furthermore,</em></ins></span>
+    the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them was 
designed</em></ins></span> to <span class="inserted"><ins><em>make 
uninstallation
+    difficult.&lt;/p&gt;
+
+    &lt;p&gt;Users should of course uninstall these dangerous apps if they
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a
+        <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>potential risk because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out who the user 
is.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A computerized
+        vibrator</strong></del></span> <span class="inserted"><ins><em>150 
most popular
+    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also be used to spy</em></ins></span> on <span 
class="removed"><del><strong>its users through</strong></del></span> <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>makes internet-controlled 
vibrators</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
-    being sued for collecting lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>personal 
information</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half 
of</em></ins></span>
+    the <span class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that these articles talk</em></ins></span> 
about <span class="removed"><del><strong>how
-    people use it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
     apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Weather Channel app &lt;a
+    &lt;p&gt;The <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the</em></ins></span> company's <span 
class="removed"><del><strong>statement</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;. The company is
-    being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>anonymizes</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>data may be
-        true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>sells the data to</strong></del></span> <span 
class="inserted"><ins><em>will do
+    stored users' locations to</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="inserted"><ins><em>will do
     with the data.&lt;/p&gt;
 
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="inserted"><ins><em>side issue. What the company does
-    with the</em></ins></span> data <span 
class="removed"><del><strong>broker,</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue. The principal wrong here is 
that</em></ins></span>
-    the <span class="inserted"><ins><em>company gets that</em></ins></span> 
data <span class="removed"><del><strong>broker</strong></del></span> <span 
class="inserted"><ins><em>at all.&lt;/p&gt;
+    &lt;p&gt;I think that lawsuit</em></ins></span> is <span 
class="removed"><del><strong>surrounded by</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> a <span 
class="removed"><del><strong>person's
+      body), and</strong></del></span> <span class="inserted"><ins><em>side 
issue. What</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>company does
+    with</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>data is</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which users can 
check</strong></del></span> <span class="inserted"><ins><em>secondary issue. 
The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
-    Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    Other weather apps&lt;/a&gt;, including Accuweather</em></ins></span> and 
<span class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>WeatherBug, are
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps &lt;a
-    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report</em></ins></span> on <span class="removed"><del><strong>children 
and adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook</em></ins></span> can <span class="removed"><del><strong>figure 
out who</strong></del></span> <span class="inserted"><ins><em>correlate the 
data it obtains from the same machine via
-    various apps. Some of them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
-    using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
user <span class="removed"><del><strong>is.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>the user's actions</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
+    Facebook can correlate the data it obtains from the same 
machine</em></ins></span> via <span class="removed"><del><strong>BIOS&lt;/a&gt; 
on Windows installs.
+Note</strong></del></span>
+    <span class="inserted"><ins><em>various apps. Some of them send Facebook 
detailed information about
+    the user's activities in the app; others only say</em></ins></span> that 
the <span class="removed"><del><strong>specific sabotage method Lenovo used did 
not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>not really
+clean since</strong></del></span>
+    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
+
+    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    account.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A computerized
-        vibrator</strong></del></span>
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;snoops</strong></del></span>
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
     track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>its</strong></del></span> <span 
class="inserted"><ins><em>Android &lt;a
-    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>disable &ldquo;location
+    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span 
class="inserted"><ins><em>Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>user's location 
even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways to turn off</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;There are other ways to turn off the other 
kinds</em></ins></span> of <span class="removed"><del><strong>Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li id="M201806110"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Spanish football 
streaming</em></ins></span> app <span 
class="removed"><del><strong>reports</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>temperature 
of</strong></del></span> <span class="inserted"><ins><em>user's movements and 
listens through</em></ins></span> the <span 
class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>surrounded 
by</strong></del></span> <span class="inserted"><ins><em>no way to 
save</em></ins></span>
-    a <span class="removed"><del><strong>person's
-      body), and the vibration frequency.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span> 
the <span class="removed"><del><strong>totally inadequate proposed response: a 
labeling
-      standard with which manufacturers would make 
statements</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
 
-    &lt;p&gt;If you learn to care much less</em></ins></span> about
-      <span class="removed"><del><strong>their products, rather than free 
software which users can check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and <span class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This makes them act as spies</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be</em></ins></span> sure <span 
class="inserted"><ins><em>from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>care much less about sports, you will 
benefit</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</strong></del></span>
+    <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span 
class="inserted"><ins><em>one more.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a
+      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>manufacturer is 
using it</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span> 
<span class="inserted"><ins><em>insecurely snitch on its users.  Furthermore, 
they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+  &lt;li&gt;&lt;p&gt;E-books</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on 
Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>the proprietary 
apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt;</em></ins></span> that <span class="inserted"><ins><em>&lt;a
-    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently 
warns</em></ins></span>
-    the <span class="removed"><del><strong>specific sabotage method Lenovo 
used did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>user if an 
app contains anti-features&lt;/a&gt;.&lt;/p&gt;
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+    href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not have so much information 
about</em></ins></span> its <span class="removed"><del><strong>own 
malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>users.
-    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>place new items on top 
under</strong></del></span> each <span class="removed"><del><strong>subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span class="inserted"><ins><em>other but not to</em></ins></span> the 
<span class="removed"><del><strong>emails of members of Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>server's database.&lt;/p&gt;
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where</em></ins></span> they <span class="removed"><del><strong>pass it 
through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>travel before and after going to a 
movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>popular Android apps
-    is pervasive and sometimes very clever. Some trackers 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+    &lt;p&gt;Tracking software in popular Android apps
+    is pervasive and sometimes very clever. Some trackers</em></ins></span> 
can <span class="removed"><del><strong>contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
     book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
@@ -1345,17 +1408,17 @@
   &lt;/li&gt;
 
   &lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
     calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
     worked in various ways to prevent that, and deleted these apps after
-    discovering what they did. So we cannot blame Google</em></ins></span> 
specifically
-    for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the snooping of these apps.&lt;/p&gt;
+    discovering what they did. So we cannot blame Google specifically
+    for the snooping of these apps.&lt;/p&gt;
 
-    &lt;p&gt;On the other hand, Google redistributes nonfree Android apps, and
-    therefore shares in the responsibility for the injustice of their being
+    &lt;p&gt;On the other hand, Google redistributes nonfree Android 
apps,</em></ins></span> and
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
@@ -1372,16 +1435,10 @@
 
     &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
     Google to protect us. We must demand release of source code to the
-    public, so we can depend on each other.&lt;/p&gt;</em></ins></span>
+    public, so we can depend on each other.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
+  &lt;li id="M201705230"&gt;
     &lt;p&gt;Apps for BART &lt;a
     
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
@@ -1887,49 +1944,27 @@
   &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>make its TVs snoop</em></ins></span> on <span 
class="inserted"><ins><em>what
-    users watch&lt;/a&gt;.</em></ins></span>  The <span 
class="removed"><del><strong>Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>TVs did not 
do that when first sold.&lt;/p&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Nest Cam 
&ldquo;smart&rdquo; camera is</strong></del></span> <span 
class="inserted"><ins><em>Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;owner&rdquo; switches</strong></del></span> 
<span class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</strong></del></span> <span 
class="inserted"><ins><em>and would then have to give it to</em></ins></span> 
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>US or some
+  &lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it to the US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition</em></ins></span> is <span 
class="removed"><del><strong>using</strong></del></span> <span 
class="inserted"><ins><em>not to be trusted unless</em></ins></span> it <span 
class="inserted"><ins><em>is done by free
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
     &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>outsmart
-      you.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    data containing sensitive information will be transmitted to third
+    parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+  &lt;li id="M201411090"&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
@@ -1954,14 +1989,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain Javascript 
code,</strong></del></span> <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs &lt;a
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="inserted"><ins><em>the switch to turn this off has
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
@@ -2858,7 +2888,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary-surveillance.ja.po      28 Feb 2019 22:00:39 -0000      1.252
+++ proprietary-surveillance.ja.po      4 Mar 2019 08:00:38 -0000       1.253
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1507,6 +1507,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- proprietary-surveillance.pot        28 Feb 2019 22:00:39 -0000      1.200
+++ proprietary-surveillance.pot        4 Mar 2019 08:00:38 -0000       1.201
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1013,6 +1013,28 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a "
+"href=\"https://www.appcensus.mobi\";> how Android apps use and misuse users' "
+"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
+"which 24,000 (31%) transmit the <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
+"ID</a> to other companies, and <a "
+"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> "
+"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
+"users cannot escape tracking by resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a "
 
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\";> 
"
 "recording all the users' actions</a> in interacting with the app."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.483
retrieving revision 1.484
diff -u -b -r1.483 -r1.484
--- proprietary-surveillance.ru.po      1 Mar 2019 05:29:26 -0000       1.483
+++ proprietary-surveillance.ru.po      4 Mar 2019 08:00:38 -0000       1.484
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1417,6 +1418,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.de-diff.html    28 Feb 2019 22:00:39 -0000      1.54
+++ proprietary.de-diff.html    4 Mar 2019 08:00:38 -0000       1.55
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -101,17 +101,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
@@ -125,9 +125,9 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
@@ -185,6 +185,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -252,14 +271,6 @@
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902200"&gt;
-    &lt;p&gt;Some portable surveillance
-    devices (&ldquo;phones&rdquo;) now have &lt;a
-    
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"&gt;
-    fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
-    take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -320,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.de.po   28 Feb 2019 22:00:39 -0000      1.96
+++ proprietary.de.po   4 Mar 2019 08:00:38 -0000       1.97
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -513,15 +534,6 @@
 "Or, as a last resort, you can replace your TV with another model."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.es.po   28 Feb 2019 22:00:39 -0000      1.109
+++ proprietary.es.po   4 Mar 2019 08:00:38 -0000       1.110
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2019-02-25 11:08+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -414,20 +435,6 @@
 "las conexiones a los servidores de Vizio. O, como último recurso, sustituir "
 "su televisor por otro modelo."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"Algunos dispositivos portátiles de vigilancia («teléfonos») tienen ahora 
<a "
-"href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\">lectores de "
-"huella dactilar en la pantalla</a>. ¿Supone esto que podrían registrar la "
-"huella dactilar de cualquiera que opere en la pantalla táctil?"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -507,6 +514,20 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "Algunos dispositivos portátiles de vigilancia («teléfonos») tienen 
ahora "
+#~ "<a href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-";
+#~ "galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"
+#~ "\">lectores de huella dactilar en la pantalla</a>. ¿Supone esto que "
+#~ "podrían registrar la huella dactilar de cualquiera que opere en la "
+#~ "pantalla táctil?"
+
+#~ msgid ""
 #~ "Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google "
 #~ "Play had one or more malicious functionalities, such as stealing users' "
 #~ "photos instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.fr.po   28 Feb 2019 22:17:16 -0000      1.134
+++ proprietary.fr.po   4 Mar 2019 08:00:38 -0000       1.135
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2019-02-28 23:15+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -425,21 +447,6 @@
 "aux serveurs de Vizio. Et en dernier ressort, vous pouvez toujours remplacer "
 "votre téléviseur par un autre modèle. "
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"Certains appareils portables de surveillance (appelés « téléphones ») "
-"possèdent maintenant un <a href=\"https://www.theguardian.com/";
-"technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-"
-"fingerprint-sensors-and-5g\">lecteur d'empreinte digitale dans l'écran</a>. "
-"Cela signifie-t-il qu'ils pourraient prendre l'empreinte digitale de toute "
-"personne se servant de l'écran tactile?"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,3 +520,17 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "Certains appareils portables de surveillance (appelés « téléphones 
») "
+#~ "possèdent maintenant un <a href=\"https://www.theguardian.com/";
+#~ "technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-"
+#~ "ultrasonic-fingerprint-sensors-and-5g\">lecteur d'empreinte digitale dans "
+#~ "l'écran</a>. Cela signifie-t-il qu'ils pourraient prendre l'empreinte "
+#~ "digitale de toute personne se servant de l'écran tactile?"

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.it-diff.html    28 Feb 2019 22:00:39 -0000      1.66
+++ proprietary.it-diff.html    4 Mar 2019 08:00:38 -0000       1.67
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -184,6 +184,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -251,14 +270,6 @@
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902200"&gt;
-    &lt;p&gt;Some portable surveillance
-    devices (&ldquo;phones&rdquo;) now have &lt;a
-    
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"&gt;
-    fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
-    take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -319,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.it.po   28 Feb 2019 22:00:39 -0000      1.105
+++ proprietary.it.po   4 Mar 2019 08:00:38 -0000       1.106
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -517,15 +538,6 @@
 "Or, as a last resort, you can replace your TV with another model."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.ja-diff.html    28 Feb 2019 22:00:39 -0000      1.67
+++ proprietary.ja-diff.html    4 Mar 2019 08:00:38 -0000       1.68
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -157,10 +157,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -181,6 +181,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -248,14 +267,6 @@
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902200"&gt;
-    &lt;p&gt;Some portable surveillance
-    devices (&ldquo;phones&rdquo;) now have &lt;a
-    
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"&gt;
-    fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
-    take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -316,7 +327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary.ja.po   28 Feb 2019 22:00:39 -0000      1.88
+++ proprietary.ja.po   4 Mar 2019 08:00:38 -0000       1.89
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -437,15 +458,6 @@
 "Or, as a last resort, you can replace your TV with another model."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary.nl-diff.html    28 Feb 2019 22:00:39 -0000      1.66
+++ proprietary.nl-diff.html    4 Mar 2019 08:00:38 -0000       1.67
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -184,6 +184,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -251,14 +270,6 @@
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902200"&gt;
-    &lt;p&gt;Some portable surveillance
-    devices (&ldquo;phones&rdquo;) now have &lt;a
-    
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"&gt;
-    fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
-    take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -319,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.nl.po   28 Feb 2019 22:00:39 -0000      1.77
+++ proprietary.nl.po   4 Mar 2019 08:00:38 -0000       1.78
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -510,15 +531,6 @@
 "Or, as a last resort, you can replace your TV with another model."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary.pl-diff.html    28 Feb 2019 22:00:39 -0000      1.84
+++ proprietary.pl-diff.html    4 Mar 2019 08:00:38 -0000       1.85
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
-instances of malicious functionalities (with more than 400 references to
+&lt;p&gt;As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -132,12 +132,12 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -249,14 +268,6 @@
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902200"&gt;
-    &lt;p&gt;Some portable surveillance
-    devices (&ldquo;phones&rdquo;) now have &lt;a
-    
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"&gt;
-    fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
-    take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -317,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.pl.po   28 Feb 2019 22:00:39 -0000      1.72
+++ proprietary.pl.po   4 Mar 2019 08:00:38 -0000       1.73
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -592,15 +613,6 @@
 "Or, as a last resort, you can replace your TV with another model."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.pot     28 Feb 2019 22:00:39 -0000      1.69
+++ proprietary.pot     4 Mar 2019 08:00:38 -0000       1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,28 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a "
+"href=\"https://www.appcensus.mobi\";> how Android apps use and misuse users' "
+"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
+"which 24,000 (31%) transmit the <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\"> Advertising "
+"ID</a> to other companies, and <a "
+"href=\"https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\";> "
+"18,000 (23% of the total) link this ID to hardware identifiers</a>, so that "
+"users cannot escape tracking by resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a "
 "href=\"https://boingboing.net/2019/02/23/surveillance-zucksterism.html\";> "
@@ -327,14 +349,6 @@
 "servers. Or, as a last resort, you can replace your TV with another model."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
-"href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\";>
 "
-"fingerprint sensors in the display</a>. Does that imply they could take the "
-"fingerprint of anyone who operates the touch screen?"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary.pt-br.po        28 Feb 2019 22:00:39 -0000      1.98
+++ proprietary.pt-br.po        4 Mar 2019 08:00:38 -0000       1.99
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2019-02-24 15:49-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -405,20 +426,6 @@
 "livre), e configurar um firewall para bloquear conexões com os servidores da 
"
 "Vizio. Ou, como último recurso, você pode substituir sua TV por outro 
modelo."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"Alguns dispositivos portáteis de vigilância (“telefones”) agora têm <a 
href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> sensores de "
-"impressão digital na tela</a>. Isso significa que eles poderia coletar a "
-"impressão digital de qualquer um que opera a tela de toque?"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -494,6 +501,20 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "Alguns dispositivos portáteis de vigilância (“telefones”) agora têm 
<a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "sensores de impressão digital na tela</a>. Isso significa que eles "
+#~ "poderia coletar a impressão digital de qualquer um que opera a tela de "
+#~ "toque?"
+
+#~ msgid ""
 #~ "Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google "
 #~ "Play had one or more malicious functionalities, such as stealing users' "
 #~ "photos instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.ru.po   1 Mar 2019 05:29:26 -0000       1.167
+++ proprietary.ru.po   4 Mar 2019 08:00:38 -0000       1.168
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2019-01-23 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -428,20 +450,6 @@
 "и настройть брандмауэр, чтобы соединения 
с серверами Vizio блокировались. "
 "Или, в крайнем случае, можно заменить свой 
телевизор на другую модель."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-"В некоторых портативных устройствах 
слежки (&ldquo;телефонах&rdquo;) теперь "
-"есть <a 
href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-";
-"galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
-"датчики отпечатков пальцев на экране</a>. 
Подразумевает ли это, что они "
-"могли бы снимать отпечатки всех, кто 
работает с сенсорным экраном?"
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -521,6 +529,19 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a "
+#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-";
+#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
+#~ "fingerprint sensors in the display</a>. Does that imply they could take "
+#~ "the fingerprint of anyone who operates the touch screen?"
+#~ msgstr ""
+#~ "В некоторых портативных устройствах 
слежки (&ldquo;телефонах&rdquo;) "
+#~ "теперь есть <a 
href=\"https://www.theguardian.com/technology/2019/feb/20/";
+#~ "samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-"
+#~ "and-5g\"> датчики отпечатков пальцев на 
экране</a>. Подразумевает ли это, "
+#~ "что они могли бы снимать отпечатки всех, 
кто работает с сенсорным экраном?"
+
+#~ msgid ""
 #~ "Twenty nine &ldquo;beauty camera&rdquo; apps that used to be on Google "
 #~ "Play had one or more malicious functionalities, such as stealing users' "
 #~ "photos instead of &ldquo;beautifying&rdquo; them, <a href=\"https://www.";

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary.zh-tw-diff.html 28 Feb 2019 22:00:39 -0000      1.44
+++ proprietary.zh-tw-diff.html 4 Mar 2019 08:00:38 -0000       1.45
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
---&gt;
+<span class="inserted"><ins><em>--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -101,17 +101,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
@@ -125,9 +125,9 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
@@ -185,6 +185,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
@@ -252,14 +271,6 @@
     firewall to block connections to Vizio's servers. Or, as a last resort,
     you can replace your TV with another model.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201902200"&gt;
-    &lt;p&gt;Some portable surveillance
-    devices (&ldquo;phones&rdquo;) now have &lt;a
-    
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g"&gt;
-    fingerprint sensors in the display&lt;/a&gt;. Does that imply they could
-    take the fingerprint of anyone who operates the touch screen?&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -320,7 +331,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:39 $
+$Date: 2019/03/04 08:00:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.zh-tw.po        28 Feb 2019 22:00:39 -0000      1.55
+++ proprietary.zh-tw.po        4 Mar 2019 08:00:38 -0000       1.56
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 07:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook offered a convenient proprietary library for building mobile apps, "
 "which also <a href=\"https://boingboing.net/2019/02/23/surveillance-";
 "zucksterism.html\"> sent personal data to Facebook</a>. Lots of companies "
@@ -426,15 +447,6 @@
 "Or, as a last resort, you can replace your TV with another model."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Some portable surveillance devices (&ldquo;phones&rdquo;) now have <a href="
-"\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-";
-"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> fingerprint "
-"sensors in the display</a>. Does that imply they could take the fingerprint "
-"of anyone who operates the touch screen?"
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- pt-br.po    28 Feb 2019 22:00:39 -0000      1.53
+++ pt-br.po    4 Mar 2019 08:00:38 -0000       1.54
@@ -4149,6 +4149,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- ru.po       1 Mar 2019 05:59:20 -0000       1.88
+++ ru.po       4 Mar 2019 08:00:38 -0000       1.89
@@ -5746,6 +5746,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- zh-tw.po    28 Feb 2019 22:00:39 -0000      1.39
+++ zh-tw.po    4 Mar 2019 08:00:38 -0000       1.40
@@ -3985,6 +3985,27 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The AppCensus database gives information on <a href=\"https://www.appcensus.";
+"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
+"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
+"the <a href=\"/proprietary/proprietary-surveillance.html#M201812290\"> "
+"Advertising ID</a> to other companies, and <a href=\"https://blog.appcensus.";
+"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18,000 (23% of the total) link "
+"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
+"resetting it."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Collecting hardware identifiers is in apparent violation of Google's "
+"policies. But it seems that Google wasn't aware of it, and, once informed, "
+"was in no hurry to take action. This proves that the policies of a "
+"development platform are ineffective at preventing nonfree software "
+"developers from including malware in their programs."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Many nonfree apps have a surveillance feature for <a href=\"https://";
 "techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
 "all the users' actions</a> in interacting with the app."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]