www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www graphics/po/hurd_mf.de.po graphics/po/hurd_...


From: GNUN
Subject: www graphics/po/hurd_mf.de.po graphics/po/hurd_...
Date: Sun, 17 Mar 2019 06:32:46 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/03/17 06:32:42

Modified files:
        graphics/po    : hurd_mf.de.po hurd_mf.fr.po hurd_mf.pot 
                         hurd_mf.ro.po 
        philosophy/po  : software-patents.fr.po software-patents.pot 
                         software-patents.ru.po 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po 
                         malware-mobiles.de-diff.html 
                         malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po 
                         malware-mobiles.it-diff.html 
                         malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po nl.po pl.po pot 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po 
                         proprietary-interference.de-diff.html 
                         proprietary-interference.de.po 
                         proprietary-interference.fr.po 
                         proprietary-interference.ja-diff.html 
                         proprietary-interference.ja.po 
                         proprietary-interference.pot 
                         proprietary-interference.ru.po 
                         proprietary-jails.de-diff.html 
                         proprietary-jails.de.po proprietary-jails.es.po 
                         proprietary-jails.fr.po 
                         proprietary-jails.it-diff.html 
                         proprietary-jails.it.po 
                         proprietary-jails.ja-diff.html 
                         proprietary-jails.ja.po proprietary-jails.pot 
                         proprietary-jails.ru.po 
                         proprietary-sabotage.de-diff.html 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it-diff.html 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja-diff.html 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru.po 
                         proprietary-subscriptions.de-diff.html 
                         proprietary-subscriptions.de.po 
                         proprietary-subscriptions.fr.po 
                         proprietary-subscriptions.ja-diff.html 
                         proprietary-subscriptions.ja.po 
                         proprietary-subscriptions.pot 
                         proprietary-subscriptions.ru.po 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po pt-br.po ru.po 
                         zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.de.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.fr.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.pot?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.ro.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/software-patents.fr.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/software-patents.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/software-patents.ru.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.pot?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pot?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.392&r2=1.393
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.489&r2=1.490
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.49&r2=1.50

Patches:
Index: graphics/po/hurd_mf.de.po
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.de.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- graphics/po/hurd_mf.de.po   9 Mar 2019 13:31:43 -0000       1.12
+++ graphics/po/hurd_mf.de.po   17 Mar 2019 10:32:38 -0000      1.13
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2014-04-14 22:00+0200\n"
 "Last-Translator: Joerg Kohne <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -109,8 +109,9 @@
 # | [-href=\"http://creativecommons.org/licenses/by-sa/3.0/us/\";>Creative-]
 # | {+href=\"/licenses/fdl.html\">GNU Free Documentation License</a>,
 # | version&nbsp;1.2 or any later version, or the <a rel=\"license\"
-# | href=\"https://creativecommons/licenses/by-sa/3.0/\";>Creative+} Commons
-# | Attribution-ShareAlike 3.0 [-United States-] {+Unported+} License</a>.
+# | href=\"https://creativecommons.org/licenses/by-sa/3.0/\";>Creative+}
+# | Commons Attribution-ShareAlike 3.0 [-United States-] {+Unported+}
+# | License</a>.
 #, fuzzy
 #| msgid ""
 #| "This page is licensed under a <a rel=\"license\" href=\"http://";
@@ -119,9 +120,9 @@
 msgid ""
 "This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
 "html\">GNU Free Documentation License</a>, version&nbsp;1.2 or any later "
-"version, or the <a rel=\"license\" href=\"https://creativecommons/licenses/";
-"by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported License</"
-"a>."
+"version, or the <a rel=\"license\" href=\"https://creativecommons.org/";
+"licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported "
+"License</a>."
 msgstr ""
 "Dieses Werk ist lizenziert unter einer <a rel=\"license\" href=\"//"
 "creativecommons.org/licenses/by-sa/3.0/us/deed.de\">Creative Commons "

Index: graphics/po/hurd_mf.fr.po
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.fr.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- graphics/po/hurd_mf.fr.po   9 Mar 2019 18:22:38 -0000       1.24
+++ graphics/po/hurd_mf.fr.po   17 Mar 2019 10:32:39 -0000      1.25
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-09 19:16+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -101,12 +102,25 @@
 msgstr "Copyright &copy; 1997 Stephen McCamant"
 
 #. type: Content of: <div><div><p>
+# | This image is available under the <a rel=\"license\"
+# | href=\"/licenses/fdl.html\">GNU Free Documentation License</a>,
+# | version&nbsp;1.2 or any later version, or the <a rel=\"license\"
+# | [-href=\"https://creativecommons/licenses/by-sa/3.0/\";>Creative-]
+# | {+href=\"https://creativecommons.org/licenses/by-sa/3.0/\";>Creative+}
+# | Commons Attribution-ShareAlike 3.0 Unported License</a>.
+#, fuzzy
+#| msgid ""
+#| "This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
+#| "html\">GNU Free Documentation License</a>, version&nbsp;1.2 or any later "
+#| "version, or the <a rel=\"license\" href=\"https://creativecommons/";
+#| "licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 "
+#| "Unported License</a>."
 msgid ""
 "This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
 "html\">GNU Free Documentation License</a>, version&nbsp;1.2 or any later "
-"version, or the <a rel=\"license\" href=\"https://creativecommons/licenses/";
-"by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported License</"
-"a>."
+"version, or the <a rel=\"license\" href=\"https://creativecommons.org/";
+"licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported "
+"License</a>."
 msgstr ""
 "Cette image est disponible sous la <a rel=\"license\" href=\"/licenses/fdl."
 "html\">licence GNU de documentation libre</a>, version 1.2 ou toute version "

Index: graphics/po/hurd_mf.pot
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.pot,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- graphics/po/hurd_mf.pot     9 Mar 2019 13:31:43 -0000       1.11
+++ graphics/po/hurd_mf.pot     17 Mar 2019 10:32:39 -0000      1.12
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -89,7 +89,7 @@
 "This image is available under the <a rel=\"license\" "
 "href=\"/licenses/fdl.html\">GNU Free Documentation License</a>, "
 "version&nbsp;1.2 or any later version, or the <a rel=\"license\" "
-"href=\"https://creativecommons/licenses/by-sa/3.0/\";>Creative Commons "
+"href=\"https://creativecommons.org/licenses/by-sa/3.0/\";>Creative Commons "
 "Attribution-ShareAlike 3.0 Unported License</a>."
 msgstr ""
 

Index: graphics/po/hurd_mf.ro.po
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.ro.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- graphics/po/hurd_mf.ro.po   9 Mar 2019 13:31:43 -0000       1.4
+++ graphics/po/hurd_mf.ro.po   17 Mar 2019 10:32:39 -0000      1.5
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: web-translators <address@hidden>\n"
@@ -104,9 +104,9 @@
 msgid ""
 "This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
 "html\">GNU Free Documentation License</a>, version&nbsp;1.2 or any later "
-"version, or the <a rel=\"license\" href=\"https://creativecommons/licenses/";
-"by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported License</"
-"a>."
+"version, or the <a rel=\"license\" href=\"https://creativecommons.org/";
+"licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported "
+"License</a>."
 msgstr ""
 "Această pagină este licențiată sub licența <a rel=\"license\" 
href=\"http://";
 "creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons Atribuire - "

Index: philosophy/po/software-patents.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/software-patents.fr.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- philosophy/po/software-patents.fr.po        9 Mar 2019 18:22:38 -0000       
1.68
+++ philosophy/po/software-patents.fr.po        17 Mar 2019 10:32:39 -0000      
1.69
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: software-patents.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-09 19:11+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -312,21 +313,40 @@
 "même de le publier, sans savoir qu'il va y avoir un brevet et que vous allez 
"
 "être poursuivi."
 
-#.  This link is dead and there is nothing on their site related to
-#.      the patent or LZW at all, AFAICS.         yavor, 18 Jul 2008
-#. <a href="http://www.unisys.com/unisys/lzw/default.asp";>
-#. patent</a> 
 #. type: Content of: <p>
+# | This is not just academic.  In 1984, the compress program was written, a
+# | program for data compression.  At the time, there was no patent on the LZW
+# | compression algorithm which it used.  Then in 1985, the US issued a
+# | [-patent-] {+<a
+# | href=\"https://patents.justia.com/patent/4558302\";>patent</a>+} on this
+# | algorithm and over the next few years, those who distributed the compress
+# | program started getting threats.  There was no way that the author of
+# | compress could have realized that he was likely to get sued.  All he did
+# | was use an idea that he found in a journal just like programmers have
+# | always done.  He hadn't realized that you could no longer safely use ideas
+# | that you found in a journal.
+#, fuzzy
+#| msgid ""
+#| "This is not just academic.  In 1984, the compress program was written, a "
+#| "program for data compression.  At the time, there was no patent on the "
+#| "LZW compression algorithm which it used.  Then in 1985, the US issued a "
+#| "patent on this algorithm and over the next few years, those who "
+#| "distributed the compress program started getting threats.  There was no "
+#| "way that the author of compress could have realized that he was likely to "
+#| "get sued.  All he did was use an idea that he found in a journal just "
+#| "like programmers have always done.  He hadn't realized that you could no "
+#| "longer safely use ideas that you found in a journal."
 msgid ""
 "This is not just academic.  In 1984, the compress program was written, a "
 "program for data compression.  At the time, there was no patent on the LZW "
-"compression algorithm which it used.  Then in 1985, the US issued a patent "
-"on this algorithm and over the next few years, those who distributed the "
-"compress program started getting threats.  There was no way that the author "
-"of compress could have realized that he was likely to get sued.  All he did "
-"was use an idea that he found in a journal just like programmers have always "
-"done.  He hadn't realized that you could no longer safely use ideas that you "
-"found in a journal."
+"compression algorithm which it used.  Then in 1985, the US issued a <a href="
+"\"https://patents.justia.com/patent/4558302\";>patent</a> on this algorithm "
+"and over the next few years, those who distributed the compress program "
+"started getting threats.  There was no way that the author of compress could "
+"have realized that he was likely to get sued.  All he did was use an idea "
+"that he found in a journal just like programmers have always done.  He "
+"hadn't realized that you could no longer safely use ideas that you found in "
+"a journal."
 msgstr ""
 "Ce n'est pas une hypothèse gratuite. En 1984, un programme de compression de 
"
 "données a été écrit : Compress. À l'époque, il n'y avait pas de brevet 
sur "
@@ -451,18 +471,34 @@
 "L'étude citait un ingénieur qui disait : « Je ne reconnais pas mes 
propres "
 "inventions dans ces brevets. »"
 
-#.  Link apparently not useful anymore.
-#. <a 
href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;p=1&amp;u=/netahtml/search-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;co1=AND&amp;d=pall&amp;s1=%274486857%27.WKU.&amp;OS=PN/4486857&amp;RS=PN/4486857";>
-#. patents</a>. 
 #. type: Content of: <p>
+# | This is not just theoretical.  Around 1990, a programmer named <a
+# | href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\";>Paul
+# | Heckel</a> sued Apple claiming that Hypercard infringed a couple of his
+# | [-patents.-] {+<a
+# | href=\"https://patents.justia.com/patent/4486857\";>patents</a>.+}  When he
+# | first saw Hypercard, he didn't think it had anything to do with his
+# | patent, with his &ldquo;Inventions&rdquo;.  It didn't look similar.  When
+# | his lawyer told him that you could read the patents as covering part of
+# | Hypercard, he decided to attack Apple.
+#, fuzzy
+#| msgid ""
+#| "This is not just theoretical.  Around 1990, a programmer named <a href="
+#| "\"http://www.atarimagazines.com/startv2n3/hypercard.html\";>Paul Heckel</"
+#| "a> sued Apple claiming that Hypercard infringed a couple of his patents.  "
+#| "When he first saw Hypercard, he didn't think it had anything to do with "
+#| "his patent, with his &ldquo;Inventions&rdquo;.  It didn't look similar.  "
+#| "When his lawyer told him that you could read the patents as covering part "
+#| "of Hypercard, he decided to attack Apple."
 msgid ""
 "This is not just theoretical.  Around 1990, a programmer named <a href="
 "\"http://www.atarimagazines.com/startv2n3/hypercard.html\";>Paul Heckel</a> "
-"sued Apple claiming that Hypercard infringed a couple of his patents.  When "
-"he first saw Hypercard, he didn't think it had anything to do with his "
-"patent, with his &ldquo;Inventions&rdquo;.  It didn't look similar.  When "
-"his lawyer told him that you could read the patents as covering part of "
-"Hypercard, he decided to attack Apple."
+"sued Apple claiming that Hypercard infringed a couple of his <a href="
+"\"https://patents.justia.com/patent/4486857\";>patents</a>.  When he first "
+"saw Hypercard, he didn't think it had anything to do with his patent, with "
+"his &ldquo;Inventions&rdquo;.  It didn't look similar.  When his lawyer told "
+"him that you could read the patents as covering part of Hypercard, he "
+"decided to attack Apple."
 msgstr ""
 "Ce n'est pas seulement théorique. Aux environs de 1990, un programmeur du "
 "nom de <a href=\"http://www.atarimagazines.com/startv2n3/hypercard.html";
@@ -607,15 +643,33 @@
 "étroite, sur une fonctionnalité très spécifique."
 
 #. type: Content of: <p>
-msgid ""
-"What do you do with the <a href=\"https://web.archive.org/web/20060115162715/";
-"http://www.delphion.com/details?pn=US04873662__\";> British Telecom patent</"
-"a> on traversing hyper links together with dial-up access? Traversing hyper "
-"links is absolutely essential to a major use of computers these days.  Dial-"
-"up access is also essential.  How do you do without this feature, which, by "
-"the way, isn't even one feature, it is really a combination of two just "
-"arbitrarily juxtaposed.  It is rather like having a patent on a sofa and "
-"television in the same room."
+# | What do you do with the <a
+# | 
[-href=\"https://web.archive.org/web/20060115162715/http://www.delphion.com/details?pn=US04873662__\";>
+# | British-] {+href=\"https://patents.justia.com/patent/4873662\";>British+}
+# | Telecom patent</a> on traversing hyper links together with dial-up access?
+# | Traversing hyper links is absolutely essential to a major use of computers
+# | these days.  Dial-up access is also essential.  How do you do without this
+# | feature, which, by the way, isn't even one feature, it is really a
+# | combination of two just arbitrarily juxtaposed.  It is rather like having
+# | a patent on a sofa and television in the same room.
+#, fuzzy
+#| msgid ""
+#| "What do you do with the <a href=\"https://web.archive.org/";
+#| "web/20060115162715/http://www.delphion.com/details?pn=US04873662__\";> "
+#| "British Telecom patent</a> on traversing hyper links together with dial-"
+#| "up access? Traversing hyper links is absolutely essential to a major use "
+#| "of computers these days.  Dial-up access is also essential.  How do you "
+#| "do without this feature, which, by the way, isn't even one feature, it is "
+#| "really a combination of two just arbitrarily juxtaposed.  It is rather "
+#| "like having a patent on a sofa and television in the same room."
+msgid ""
+"What do you do with the <a href=\"https://patents.justia.com/";
+"patent/4873662\">British Telecom patent</a> on traversing hyper links "
+"together with dial-up access? Traversing hyper links is absolutely essential "
+"to a major use of computers these days.  Dial-up access is also essential.  "
+"How do you do without this feature, which, by the way, isn't even one "
+"feature, it is really a combination of two just arbitrarily juxtaposed.  It "
+"is rather like having a patent on a sofa and television in the same room."
 msgstr ""
 "Que faites-vous du <a href=\"https://web.archive.org/web/20060115162715/";
 "http://www.delphion.com/details?pn=US04873662__\";>brevet British Telecom</a> "
@@ -645,9 +699,28 @@
 "disponibles, car les détenteurs du brevet les menaçaient."
 
 #. type: Content of: <p>
+# | Then, one program got away.  The program <a
+# | href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\";>{+
+# | +}PGP</a>, which initially was released as free software.  Apparently, the
+# | patent holders by the time they got around to attacking, realized they
+# | might get too much bad publicity.  So they imposed restrictions making it
+# | for non-commercial use only, which meant it couldn't catch on too much. 
+# | So they greatly limited the use of Public Key Encryption for a decade or
+# | more.  There was no way around that patent.  There was nothing else you
+# | could do like that.
+#, fuzzy
+#| msgid ""
+#| "Then, one program got away.  The program <a href=\"https://web.archive.";
+#| "org/web/20170315023711/http://www.pgpi.org/\";>PGP</a>, which initially "
+#| "was released as free software.  Apparently, the patent holders by the "
+#| "time they got around to attacking, realized they might get too much bad "
+#| "publicity.  So they imposed restrictions making it for non-commercial use "
+#| "only, which meant it couldn't catch on too much.  So they greatly limited "
+#| "the use of Public Key Encryption for a decade or more.  There was no way "
+#| "around that patent.  There was nothing else you could do like that."
 msgid ""
 "Then, one program got away.  The program <a href=\"https://web.archive.org/";
-"web/20170315023711/http://www.pgpi.org/\";>PGP</a>, which initially was "
+"web/20170315023711/http://www.pgpi.org/\";> PGP</a>, which initially was "
 "released as free software.  Apparently, the patent holders by the time they "
 "got around to attacking, realized they might get too much bad publicity.  So "
 "they imposed restrictions making it for non-commercial use only, which meant "
@@ -1259,22 +1332,46 @@
 "la technique, voir combien de terre on leur laissera confisquer dans "
 "l'espace mental."
 
-#.  Another dead link.
-#. <a href="http://people.qualcomm.com/karn/patents/patent-comments.html";>
-#. obvious</a>! 
 #. type: Content of: <p>
+# | When programmers look at a lot of software patents, they say this is
+# | ridiculously [-obvious!-] {+<a
+# | 
href=\"https://web.archive.org/web/20040604051644/http://people.qualcomm.com/karn/patents/patent-comments.html\";>
+# | obvious</a>!+} Patent bureaucrats have all sorts of excuses to justify
+# | ignoring what programmers think.  They say &ldquo;Oh! But you have to
+# | consider it in terms of the way things were 10 or 20 years ago&rdquo;. 
+# | Then they discovered that if they talk something to death then you can
+# | eventually lose your bearings.  Anything can look unobvious if you tear it
+# | apart enough, analyze it enough.  You simply lose all standard of
+# | obviousness or at least lose the ability to justify any standard of
+# | obvious or unobvious.  Then, of course, they describe the patent holders
+# | as brilliant inventors, all of them.  Therefore we can't question their
+# | entitlement to power over what we can do.
+#, fuzzy
+#| msgid ""
+#| "When programmers look at a lot of software patents, they say this is "
+#| "ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
+#| "justify ignoring what programmers think.  They say &ldquo;Oh! But you "
+#| "have to consider it in terms of the way things were 10 or 20 years "
+#| "ago&rdquo;.  Then they discovered that if they talk something to death "
+#| "then you can eventually lose your bearings.  Anything can look unobvious "
+#| "if you tear it apart enough, analyze it enough.  You simply lose all "
+#| "standard of obviousness or at least lose the ability to justify any "
+#| "standard of obvious or unobvious.  Then, of course, they describe the "
+#| "patent holders as brilliant inventors, all of them.  Therefore we can't "
+#| "question their entitlement to power over what we can do."
 msgid ""
 "When programmers look at a lot of software patents, they say this is "
-"ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
-"justify ignoring what programmers think.  They say &ldquo;Oh! But you have "
-"to consider it in terms of the way things were 10 or 20 years ago&rdquo;.  "
-"Then they discovered that if they talk something to death then you can "
-"eventually lose your bearings.  Anything can look unobvious if you tear it "
-"apart enough, analyze it enough.  You simply lose all standard of "
-"obviousness or at least lose the ability to justify any standard of obvious "
-"or unobvious.  Then, of course, they describe the patent holders as "
-"brilliant inventors, all of them.  Therefore we can't question their "
-"entitlement to power over what we can do."
+"ridiculously <a href=\"https://web.archive.org/web/20040604051644/http://";
+"people.qualcomm.com/karn/patents/patent-comments.html\"> obvious</a>! Patent "
+"bureaucrats have all sorts of excuses to justify ignoring what programmers "
+"think.  They say &ldquo;Oh! But you have to consider it in terms of the way "
+"things were 10 or 20 years ago&rdquo;.  Then they discovered that if they "
+"talk something to death then you can eventually lose your bearings.  "
+"Anything can look unobvious if you tear it apart enough, analyze it enough.  "
+"You simply lose all standard of obviousness or at least lose the ability to "
+"justify any standard of obvious or unobvious.  Then, of course, they "
+"describe the patent holders as brilliant inventors, all of them.  Therefore "
+"we can't question their entitlement to power over what we can do."
 msgstr ""
 "Quand des programmeurs regardent des brevets, ils disent pour beaucoup "
 "d'entre eux : « Mais c'est ridiculement évident ! » Les bureaucrates 
des "
@@ -1321,18 +1418,44 @@
 "historiques définissent si un brevet est valide."
 
 #. type: Content of: <p>
-msgid ""
-"In fact, it is a weird thing that the <a href=\"http://www.delphion.com/";
-"details?pn=US04873662__\">British Telecom following hyper links together "
-"with telephone access patent</a>, I think, was applied for in 1975.  I think "
-"it was in 1974 that I developed the info package for the first time.  The "
-"info package allows you to traverse hyper links and people did use "
-"telephones to dial up and access the system.  So in fact, I produced a piece "
-"of prior art for that patent.  So that is the second patentable idea I have "
-"had in my life, but I don't think I have any proof of that.  I didn't think "
-"this was interesting enough to publish it.  After all, the idea of following "
-"hyper links I got from the demo of Engelbart's editor.  He is the one who "
-"had an idea which was interesting to publish."
+# | In fact, it is a weird thing that the <a
+# | [-href=\"http://www.delphion.com/details?pn=US04873662__\";>British-]
+# | {+href=\"https://patents.justia.com/patent/4873662\";> British+} Telecom
+# | following hyper links together with telephone access patent</a>, I think,
+# | was applied for in 1975.  I think it was in 1974 that I developed the info
+# | package for the first time.  The info package allows you to traverse hyper
+# | links and people did use telephones to dial up and access the system.  So
+# | in fact, I produced a piece of prior art for that patent.  So that is the
+# | second patentable idea I have had in my life, but I don't think I have any
+# | proof of that.  I didn't think this was interesting enough to publish it. 
+# | After all, the idea of following hyper links I got from the demo of
+# | Engelbart's editor.  He is the one who had an idea which was interesting
+# | to publish.
+#, fuzzy
+#| msgid ""
+#| "In fact, it is a weird thing that the <a href=\"http://www.delphion.com/";
+#| "details?pn=US04873662__\">British Telecom following hyper links together "
+#| "with telephone access patent</a>, I think, was applied for in 1975.  I "
+#| "think it was in 1974 that I developed the info package for the first "
+#| "time.  The info package allows you to traverse hyper links and people did "
+#| "use telephones to dial up and access the system.  So in fact, I produced "
+#| "a piece of prior art for that patent.  So that is the second patentable "
+#| "idea I have had in my life, but I don't think I have any proof of that.  "
+#| "I didn't think this was interesting enough to publish it.  After all, the "
+#| "idea of following hyper links I got from the demo of Engelbart's editor.  "
+#| "He is the one who had an idea which was interesting to publish."
+msgid ""
+"In fact, it is a weird thing that the <a href=\"https://patents.justia.com/";
+"patent/4873662\"> British Telecom following hyper links together with "
+"telephone access patent</a>, I think, was applied for in 1975.  I think it "
+"was in 1974 that I developed the info package for the first time.  The info "
+"package allows you to traverse hyper links and people did use telephones to "
+"dial up and access the system.  So in fact, I produced a piece of prior art "
+"for that patent.  So that is the second patentable idea I have had in my "
+"life, but I don't think I have any proof of that.  I didn't think this was "
+"interesting enough to publish it.  After all, the idea of following hyper "
+"links I got from the demo of Engelbart's editor.  He is the one who had an "
+"idea which was interesting to publish."
 msgstr ""
 "En fait, c'est bizarre que le <a href=\"http://www.delphion.com/details?";
 "pn=US04873662__\">brevet de British Telecom pour suivre les hyperliens avec "

Index: philosophy/po/software-patents.pot
===================================================================
RCS file: /web/www/www/philosophy/po/software-patents.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/po/software-patents.pot  9 Mar 2019 17:02:55 -0000       1.29
+++ philosophy/po/software-patents.pot  17 Mar 2019 10:32:39 -0000      1.30
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: software-patents.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -201,19 +201,16 @@
 "that there is going to be a patent and you are going to get sued."
 msgstr ""
 
-#.  This link is dead and there is nothing on their site related to
-#.      the patent or LZW at all, AFAICS.         yavor, 18 Jul 2008
-#. <a href="http://www.unisys.com/unisys/lzw/default.asp";>
-#. patent</a> 
 #. type: Content of: <p>
 msgid ""
 "This is not just academic.  In 1984, the compress program was written, a "
 "program for data compression.  At the time, there was no patent on the LZW "
-"compression algorithm which it used.  Then in 1985, the US issued a patent "
-"on this algorithm and over the next few years, those who distributed the "
-"compress program started getting threats.  There was no way that the author "
-"of compress could have realized that he was likely to get sued.  All he did "
-"was use an idea that he found in a journal just like programmers have always "
+"compression algorithm which it used.  Then in 1985, the US issued a <a "
+"href=\"https://patents.justia.com/patent/4558302\";>patent</a> on this "
+"algorithm and over the next few years, those who distributed the compress "
+"program started getting threats.  There was no way that the author of "
+"compress could have realized that he was likely to get sued.  All he did was "
+"use an idea that he found in a journal just like programmers have always "
 "done.  He hadn't realized that you could no longer safely use ideas that you "
 "found in a journal."
 msgstr ""
@@ -282,18 +279,16 @@
 "saying &ldquo;I can't recognize my own inventions in patenteese&rdquo;."
 msgstr ""
 
-#.  Link apparently not useful anymore.
-#. <a 
href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;p=1&amp;u=/netahtml/search-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;co1=AND&amp;d=pall&amp;s1=%274486857%27.WKU.&amp;OS=PN/4486857&amp;RS=PN/4486857";>
-#. patents</a>. 
 #. type: Content of: <p>
 msgid ""
 "This is not just theoretical.  Around 1990, a programmer named <a "
 "href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\";>Paul "
-"Heckel</a> sued Apple claiming that Hypercard infringed a couple of his "
-"patents.  When he first saw Hypercard, he didn't think it had anything to do "
-"with his patent, with his &ldquo;Inventions&rdquo;.  It didn't look "
-"similar.  When his lawyer told him that you could read the patents as "
-"covering part of Hypercard, he decided to attack Apple."
+"Heckel</a> sued Apple claiming that Hypercard infringed a couple of his <a "
+"href=\"https://patents.justia.com/patent/4486857\";>patents</a>.  When he "
+"first saw Hypercard, he didn't think it had anything to do with his patent, "
+"with his &ldquo;Inventions&rdquo;.  It didn't look similar.  When his lawyer "
+"told him that you could read the patents as covering part of Hypercard, he "
+"decided to attack Apple."
 msgstr ""
 
 #. type: Content of: <p>
@@ -388,13 +383,13 @@
 #. type: Content of: <p>
 msgid ""
 "What do you do with the <a "
-"href=\"https://web.archive.org/web/20060115162715/http://www.delphion.com/details?pn=US04873662__\";>
 "
-"British Telecom patent</a> on traversing hyper links together with dial-up "
-"access? Traversing hyper links is absolutely essential to a major use of "
-"computers these days.  Dial-up access is also essential.  How do you do "
-"without this feature, which, by the way, isn't even one feature, it is "
-"really a combination of two just arbitrarily juxtaposed.  It is rather like "
-"having a patent on a sofa and television in the same room."
+"href=\"https://patents.justia.com/patent/4873662\";>British Telecom "
+"patent</a> on traversing hyper links together with dial-up access? "
+"Traversing hyper links is absolutely essential to a major use of computers "
+"these days.  Dial-up access is also essential.  How do you do without this "
+"feature, which, by the way, isn't even one feature, it is really a "
+"combination of two just arbitrarily juxtaposed.  It is rather like having a "
+"patent on a sofa and television in the same room."
 msgstr ""
 
 #. type: Content of: <p>
@@ -410,10 +405,10 @@
 #. type: Content of: <p>
 msgid ""
 "Then, one program got away.  The program <a "
-"href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\";>PGP</a>,
 "
-"which initially was released as free software.  Apparently, the patent "
-"holders by the time they got around to attacking, realized they might get "
-"too much bad publicity.  So they imposed restrictions making it for "
+"href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\";> "
+"PGP</a>, which initially was released as free software.  Apparently, the "
+"patent holders by the time they got around to attacking, realized they might "
+"get too much bad publicity.  So they imposed restrictions making it for "
 "non-commercial use only, which meant it couldn't catch on too much.  So they "
 "greatly limited the use of Public Key Encryption for a decade or more.  "
 "There was no way around that patent.  There was nothing else you could do "
@@ -772,23 +767,21 @@
 "mental space you can get away with."
 msgstr ""
 
-#.  Another dead link.
-#. <a href="http://people.qualcomm.com/karn/patents/patent-comments.html";>
-#
-#. obvious</a>! 
 #. type: Content of: <p>
 msgid ""
 "When programmers look at a lot of software patents, they say this is "
-"ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
-"justify ignoring what programmers think.  They say &ldquo;Oh! But you have "
-"to consider it in terms of the way things were 10 or 20 years ago&rdquo;.  "
-"Then they discovered that if they talk something to death then you can "
-"eventually lose your bearings.  Anything can look unobvious if you tear it "
-"apart enough, analyze it enough.  You simply lose all standard of "
-"obviousness or at least lose the ability to justify any standard of obvious "
-"or unobvious.  Then, of course, they describe the patent holders as "
-"brilliant inventors, all of them.  Therefore we can't question their "
-"entitlement to power over what we can do."
+"ridiculously <a "
+"href=\"https://web.archive.org/web/20040604051644/http://people.qualcomm.com/karn/patents/patent-comments.html\";>
 "
+"obvious</a>! Patent bureaucrats have all sorts of excuses to justify "
+"ignoring what programmers think.  They say &ldquo;Oh! But you have to "
+"consider it in terms of the way things were 10 or 20 years ago&rdquo;.  Then "
+"they discovered that if they talk something to death then you can eventually "
+"lose your bearings.  Anything can look unobvious if you tear it apart "
+"enough, analyze it enough.  You simply lose all standard of obviousness or "
+"at least lose the ability to justify any standard of obvious or unobvious.  "
+"Then, of course, they describe the patent holders as brilliant inventors, "
+"all of them.  Therefore we can't question their entitlement to power over "
+"what we can do."
 msgstr ""
 
 #. type: Content of: <p>
@@ -813,7 +806,7 @@
 #. type: Content of: <p>
 msgid ""
 "In fact, it is a weird thing that the <a "
-"href=\"http://www.delphion.com/details?pn=US04873662__\";>British Telecom "
+"href=\"https://patents.justia.com/patent/4873662\";> British Telecom "
 "following hyper links together with telephone access patent</a>, I think, "
 "was applied for in 1975.  I think it was in 1974 that I developed the info "
 "package for the first time.  The info package allows you to traverse hyper "

Index: philosophy/po/software-patents.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/software-patents.ru.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- philosophy/po/software-patents.ru.po        9 Mar 2019 18:05:20 -0000       
1.41
+++ philosophy/po/software-patents.ru.po        17 Mar 2019 10:32:39 -0000      
1.42
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: software-patents.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-09 17:00+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Software Patents - GNU Project - Free Software Foundation"
@@ -310,21 +311,40 @@
 "программу и даже выпустить ее, не зная, что 
будет выдан патент, а на вас "
 "подадут в суд."
 
-#.  This link is dead and there is nothing on their site related to
-#.      the patent or LZW at all, AFAICS.         yavor, 18 Jul 2008
-#. <a href="http://www.unisys.com/unisys/lzw/default.asp";>
-#. patent</a> 
 #. type: Content of: <p>
+# | This is not just academic.  In 1984, the compress program was written, a
+# | program for data compression.  At the time, there was no patent on the LZW
+# | compression algorithm which it used.  Then in 1985, the US issued a
+# | [-patent-] {+<a
+# | href=\"https://patents.justia.com/patent/4558302\";>patent</a>+} on this
+# | algorithm and over the next few years, those who distributed the compress
+# | program started getting threats.  There was no way that the author of
+# | compress could have realized that he was likely to get sued.  All he did
+# | was use an idea that he found in a journal just like programmers have
+# | always done.  He hadn't realized that you could no longer safely use ideas
+# | that you found in a journal.
+#, fuzzy
+#| msgid ""
+#| "This is not just academic.  In 1984, the compress program was written, a "
+#| "program for data compression.  At the time, there was no patent on the "
+#| "LZW compression algorithm which it used.  Then in 1985, the US issued a "
+#| "patent on this algorithm and over the next few years, those who "
+#| "distributed the compress program started getting threats.  There was no "
+#| "way that the author of compress could have realized that he was likely to "
+#| "get sued.  All he did was use an idea that he found in a journal just "
+#| "like programmers have always done.  He hadn't realized that you could no "
+#| "longer safely use ideas that you found in a journal."
 msgid ""
 "This is not just academic.  In 1984, the compress program was written, a "
 "program for data compression.  At the time, there was no patent on the LZW "
-"compression algorithm which it used.  Then in 1985, the US issued a patent "
-"on this algorithm and over the next few years, those who distributed the "
-"compress program started getting threats.  There was no way that the author "
-"of compress could have realized that he was likely to get sued.  All he did "
-"was use an idea that he found in a journal just like programmers have always "
-"done.  He hadn't realized that you could no longer safely use ideas that you "
-"found in a journal."
+"compression algorithm which it used.  Then in 1985, the US issued a <a href="
+"\"https://patents.justia.com/patent/4558302\";>patent</a> on this algorithm "
+"and over the next few years, those who distributed the compress program "
+"started getting threats.  There was no way that the author of compress could "
+"have realized that he was likely to get sued.  All he did was use an idea "
+"that he found in a journal just like programmers have always done.  He "
+"hadn't realized that you could no longer safely use ideas that you found in "
+"a journal."
 msgstr ""
 "Это не просто теоретическая возможность. 
В 1984&nbsp;году была написана "
 "программа compress, программа для сжатия 
данных. В то время алгоритм LZW, "
@@ -445,18 +465,34 @@
 "слишком трудно. По выражению одного 
инженера, &ldquo;в этих дебрях я не "
 "узнаю своих собственных изобретений&rdquo;."
 
-#.  Link apparently not useful anymore.
-#. <a 
href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&amp;Sect2=HITOFF&amp;p=1&amp;u=/netahtml/search-bool.html&amp;r=1&amp;f=G&amp;l=50&amp;co1=AND&amp;d=pall&amp;s1=%274486857%27.WKU.&amp;OS=PN/4486857&amp;RS=PN/4486857";>
-#. patents</a>. 
 #. type: Content of: <p>
+# | This is not just theoretical.  Around 1990, a programmer named <a
+# | href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\";>Paul
+# | Heckel</a> sued Apple claiming that Hypercard infringed a couple of his
+# | [-patents.-] {+<a
+# | href=\"https://patents.justia.com/patent/4486857\";>patents</a>.+}  When he
+# | first saw Hypercard, he didn't think it had anything to do with his
+# | patent, with his &ldquo;Inventions&rdquo;.  It didn't look similar.  When
+# | his lawyer told him that you could read the patents as covering part of
+# | Hypercard, he decided to attack Apple.
+#, fuzzy
+#| msgid ""
+#| "This is not just theoretical.  Around 1990, a programmer named <a href="
+#| "\"http://www.atarimagazines.com/startv2n3/hypercard.html\";>Paul Heckel</"
+#| "a> sued Apple claiming that Hypercard infringed a couple of his patents.  "
+#| "When he first saw Hypercard, he didn't think it had anything to do with "
+#| "his patent, with his &ldquo;Inventions&rdquo;.  It didn't look similar.  "
+#| "When his lawyer told him that you could read the patents as covering part "
+#| "of Hypercard, he decided to attack Apple."
 msgid ""
 "This is not just theoretical.  Around 1990, a programmer named <a href="
 "\"http://www.atarimagazines.com/startv2n3/hypercard.html\";>Paul Heckel</a> "
-"sued Apple claiming that Hypercard infringed a couple of his patents.  When "
-"he first saw Hypercard, he didn't think it had anything to do with his "
-"patent, with his &ldquo;Inventions&rdquo;.  It didn't look similar.  When "
-"his lawyer told him that you could read the patents as covering part of "
-"Hypercard, he decided to attack Apple."
+"sued Apple claiming that Hypercard infringed a couple of his <a href="
+"\"https://patents.justia.com/patent/4486857\";>patents</a>.  When he first "
+"saw Hypercard, he didn't think it had anything to do with his patent, with "
+"his &ldquo;Inventions&rdquo;.  It didn't look similar.  When his lawyer told "
+"him that you could read the patents as covering part of Hypercard, he "
+"decided to attack Apple."
 msgstr ""
 "Это не просто абстрактная теория. Где-то в 
1990&nbsp;году программист по "
 "имени <a 
href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\";> "
@@ -596,15 +632,33 @@
 "Это довольно узкий патент на очень 
специфическую функцию."
 
 #. type: Content of: <p>
-msgid ""
-"What do you do with the <a href=\"https://web.archive.org/web/20060115162715/";
-"http://www.delphion.com/details?pn=US04873662__\";> British Telecom patent</"
-"a> on traversing hyper links together with dial-up access? Traversing hyper "
-"links is absolutely essential to a major use of computers these days.  Dial-"
-"up access is also essential.  How do you do without this feature, which, by "
-"the way, isn't even one feature, it is really a combination of two just "
-"arbitrarily juxtaposed.  It is rather like having a patent on a sofa and "
-"television in the same room."
+# | What do you do with the <a
+# | 
[-href=\"https://web.archive.org/web/20060115162715/http://www.delphion.com/details?pn=US04873662__\";>
+# | British-] {+href=\"https://patents.justia.com/patent/4873662\";>British+}
+# | Telecom patent</a> on traversing hyper links together with dial-up access?
+# | Traversing hyper links is absolutely essential to a major use of computers
+# | these days.  Dial-up access is also essential.  How do you do without this
+# | feature, which, by the way, isn't even one feature, it is really a
+# | combination of two just arbitrarily juxtaposed.  It is rather like having
+# | a patent on a sofa and television in the same room.
+#, fuzzy
+#| msgid ""
+#| "What do you do with the <a href=\"https://web.archive.org/";
+#| "web/20060115162715/http://www.delphion.com/details?pn=US04873662__\";> "
+#| "British Telecom patent</a> on traversing hyper links together with dial-"
+#| "up access? Traversing hyper links is absolutely essential to a major use "
+#| "of computers these days.  Dial-up access is also essential.  How do you "
+#| "do without this feature, which, by the way, isn't even one feature, it is "
+#| "really a combination of two just arbitrarily juxtaposed.  It is rather "
+#| "like having a patent on a sofa and television in the same room."
+msgid ""
+"What do you do with the <a href=\"https://patents.justia.com/";
+"patent/4873662\">British Telecom patent</a> on traversing hyper links "
+"together with dial-up access? Traversing hyper links is absolutely essential "
+"to a major use of computers these days.  Dial-up access is also essential.  "
+"How do you do without this feature, which, by the way, isn't even one "
+"feature, it is really a combination of two just arbitrarily juxtaposed.  It "
+"is rather like having a patent on a sofa and television in the same room."
 msgstr ""
 "А что делать с <a 
href=\"https://web.archive.org/web/20060115162715/http://";
 "www.delphion.com/details?pn=US04873662__\"> патентом British 
Telecom</a> на "
@@ -634,9 +688,28 @@
 "угрозами."
 
 #. type: Content of: <p>
+# | Then, one program got away.  The program <a
+# | href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\";>{+
+# | +}PGP</a>, which initially was released as free software.  Apparently, the
+# | patent holders by the time they got around to attacking, realized they
+# | might get too much bad publicity.  So they imposed restrictions making it
+# | for non-commercial use only, which meant it couldn't catch on too much. 
+# | So they greatly limited the use of Public Key Encryption for a decade or
+# | more.  There was no way around that patent.  There was nothing else you
+# | could do like that.
+#, fuzzy
+#| msgid ""
+#| "Then, one program got away.  The program <a href=\"https://web.archive.";
+#| "org/web/20170315023711/http://www.pgpi.org/\";>PGP</a>, which initially "
+#| "was released as free software.  Apparently, the patent holders by the "
+#| "time they got around to attacking, realized they might get too much bad "
+#| "publicity.  So they imposed restrictions making it for non-commercial use "
+#| "only, which meant it couldn't catch on too much.  So they greatly limited "
+#| "the use of Public Key Encryption for a decade or more.  There was no way "
+#| "around that patent.  There was nothing else you could do like that."
 msgid ""
 "Then, one program got away.  The program <a href=\"https://web.archive.org/";
-"web/20170315023711/http://www.pgpi.org/\";>PGP</a>, which initially was "
+"web/20170315023711/http://www.pgpi.org/\";> PGP</a>, which initially was "
 "released as free software.  Apparently, the patent holders by the time they "
 "got around to attacking, realized they might get too much bad publicity.  So "
 "they imposed restrictions making it for non-commercial use only, which meant "
@@ -1235,22 +1308,46 @@
 "захватить при таком подходе."
 
 #
-#.  Another dead link.
-#. <a href="http://people.qualcomm.com/karn/patents/patent-comments.html";>
-#. obvious</a>! 
 #. type: Content of: <p>
+# | When programmers look at a lot of software patents, they say this is
+# | ridiculously [-obvious!-] {+<a
+# | 
href=\"https://web.archive.org/web/20040604051644/http://people.qualcomm.com/karn/patents/patent-comments.html\";>
+# | obvious</a>!+} Patent bureaucrats have all sorts of excuses to justify
+# | ignoring what programmers think.  They say &ldquo;Oh! But you have to
+# | consider it in terms of the way things were 10 or 20 years ago&rdquo;. 
+# | Then they discovered that if they talk something to death then you can
+# | eventually lose your bearings.  Anything can look unobvious if you tear it
+# | apart enough, analyze it enough.  You simply lose all standard of
+# | obviousness or at least lose the ability to justify any standard of
+# | obvious or unobvious.  Then, of course, they describe the patent holders
+# | as brilliant inventors, all of them.  Therefore we can't question their
+# | entitlement to power over what we can do.
+#, fuzzy
+#| msgid ""
+#| "When programmers look at a lot of software patents, they say this is "
+#| "ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
+#| "justify ignoring what programmers think.  They say &ldquo;Oh! But you "
+#| "have to consider it in terms of the way things were 10 or 20 years "
+#| "ago&rdquo;.  Then they discovered that if they talk something to death "
+#| "then you can eventually lose your bearings.  Anything can look unobvious "
+#| "if you tear it apart enough, analyze it enough.  You simply lose all "
+#| "standard of obviousness or at least lose the ability to justify any "
+#| "standard of obvious or unobvious.  Then, of course, they describe the "
+#| "patent holders as brilliant inventors, all of them.  Therefore we can't "
+#| "question their entitlement to power over what we can do."
 msgid ""
 "When programmers look at a lot of software patents, they say this is "
-"ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
-"justify ignoring what programmers think.  They say &ldquo;Oh! But you have "
-"to consider it in terms of the way things were 10 or 20 years ago&rdquo;.  "
-"Then they discovered that if they talk something to death then you can "
-"eventually lose your bearings.  Anything can look unobvious if you tear it "
-"apart enough, analyze it enough.  You simply lose all standard of "
-"obviousness or at least lose the ability to justify any standard of obvious "
-"or unobvious.  Then, of course, they describe the patent holders as "
-"brilliant inventors, all of them.  Therefore we can't question their "
-"entitlement to power over what we can do."
+"ridiculously <a href=\"https://web.archive.org/web/20040604051644/http://";
+"people.qualcomm.com/karn/patents/patent-comments.html\"> obvious</a>! Patent "
+"bureaucrats have all sorts of excuses to justify ignoring what programmers "
+"think.  They say &ldquo;Oh! But you have to consider it in terms of the way "
+"things were 10 or 20 years ago&rdquo;.  Then they discovered that if they "
+"talk something to death then you can eventually lose your bearings.  "
+"Anything can look unobvious if you tear it apart enough, analyze it enough.  "
+"You simply lose all standard of obviousness or at least lose the ability to "
+"justify any standard of obvious or unobvious.  Then, of course, they "
+"describe the patent holders as brilliant inventors, all of them.  Therefore "
+"we can't question their entitlement to power over what we can do."
 msgstr ""
 "Когда программисты заглядывают в патенты 
на программы, они часто говорят, "
 "что это очевидно до смешного. У патентных 
бюрократов есть всевозможные "
@@ -1297,18 +1394,44 @@
 "исторических случайностей определяет, 
действителен ли патент."
 
 #. type: Content of: <p>
-msgid ""
-"In fact, it is a weird thing that the <a href=\"http://www.delphion.com/";
-"details?pn=US04873662__\">British Telecom following hyper links together "
-"with telephone access patent</a>, I think, was applied for in 1975.  I think "
-"it was in 1974 that I developed the info package for the first time.  The "
-"info package allows you to traverse hyper links and people did use "
-"telephones to dial up and access the system.  So in fact, I produced a piece "
-"of prior art for that patent.  So that is the second patentable idea I have "
-"had in my life, but I don't think I have any proof of that.  I didn't think "
-"this was interesting enough to publish it.  After all, the idea of following "
-"hyper links I got from the demo of Engelbart's editor.  He is the one who "
-"had an idea which was interesting to publish."
+# | In fact, it is a weird thing that the <a
+# | [-href=\"http://www.delphion.com/details?pn=US04873662__\";>British-]
+# | {+href=\"https://patents.justia.com/patent/4873662\";> British+} Telecom
+# | following hyper links together with telephone access patent</a>, I think,
+# | was applied for in 1975.  I think it was in 1974 that I developed the info
+# | package for the first time.  The info package allows you to traverse hyper
+# | links and people did use telephones to dial up and access the system.  So
+# | in fact, I produced a piece of prior art for that patent.  So that is the
+# | second patentable idea I have had in my life, but I don't think I have any
+# | proof of that.  I didn't think this was interesting enough to publish it. 
+# | After all, the idea of following hyper links I got from the demo of
+# | Engelbart's editor.  He is the one who had an idea which was interesting
+# | to publish.
+#, fuzzy
+#| msgid ""
+#| "In fact, it is a weird thing that the <a href=\"http://www.delphion.com/";
+#| "details?pn=US04873662__\">British Telecom following hyper links together "
+#| "with telephone access patent</a>, I think, was applied for in 1975.  I "
+#| "think it was in 1974 that I developed the info package for the first "
+#| "time.  The info package allows you to traverse hyper links and people did "
+#| "use telephones to dial up and access the system.  So in fact, I produced "
+#| "a piece of prior art for that patent.  So that is the second patentable "
+#| "idea I have had in my life, but I don't think I have any proof of that.  "
+#| "I didn't think this was interesting enough to publish it.  After all, the "
+#| "idea of following hyper links I got from the demo of Engelbart's editor.  "
+#| "He is the one who had an idea which was interesting to publish."
+msgid ""
+"In fact, it is a weird thing that the <a href=\"https://patents.justia.com/";
+"patent/4873662\"> British Telecom following hyper links together with "
+"telephone access patent</a>, I think, was applied for in 1975.  I think it "
+"was in 1974 that I developed the info package for the first time.  The info "
+"package allows you to traverse hyper links and people did use telephones to "
+"dial up and access the system.  So in fact, I produced a piece of prior art "
+"for that patent.  So that is the second patentable idea I have had in my "
+"life, but I don't think I have any proof of that.  I didn't think this was "
+"interesting enough to publish it.  After all, the idea of following hyper "
+"links I got from the demo of Engelbart's editor.  He is the one who had an "
+"idea which was interesting to publish."
 msgstr ""
 "На самом деле довольно странно, что заявка 
на <a href=\"http://www.delphion.";
 "com/details?pn=US04873662__\"> патент British Telecom на перех
од по "

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/de.po        13 Mar 2019 11:00:58 -0000      1.49
+++ proprietary/po/de.po        17 Mar 2019 10:32:39 -0000      1.50
@@ -3107,11 +3107,21 @@
 "Ist ein Produkt „smart“ und wurde nicht von einem selbst konstruieren, "
 "scheint es geschickt dem Hersteller zu dienen&#160;&#8209;&#160;gegen einen."
 
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "Einige <a href=\"//www.itworld.com/article/2705284/data-protection/backdoor-"
 "found-in-d-link-router-firmware-code.html\" title=\"Backdoor found in D-Link "
@@ -4962,7 +4972,8 @@
 "termsofservice.html\">Abschnitt 4 der EULA</a>."
 
 # | In Android, <a
-# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
 # | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
 # | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
 # | which seems since then to have been merged into Google Play.)+}
@@ -4974,9 +4985,9 @@
 #| "has a back door to remotely delete apps.</a> (It is in a program called "
 #| "GTalkService)."
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"
@@ -5761,7 +5772,7 @@
 # | [-<a
 # | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]Windows
 # | 8 also has a back door for {+<a
-# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | 
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
 # | remotely deleting apps</a>.
 #. type: Content of: <ul><li><p>
 #, fuzzy
@@ -5770,9 +5781,9 @@
 #| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
 #| "has a back door for remotely deleting apps</a>."
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"https://www.computerworld.com/article/2500036/desktop-apps/";
 "microsoft--we-can-remotely-delete-windows-8-apps.html\" title=\"Microsoft: "
@@ -5942,12 +5953,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -6267,12 +6278,22 @@
 msgid "Microsoft Subscriptions"
 msgstr "Abonnements"
 
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/";
 "article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
@@ -6656,7 +6677,7 @@
 # | 
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
 # | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
 # | 
[-href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
-# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
 # | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
 # | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>
 # | secret NSA key in Windows</a>, whose functions we don't know.
@@ -6673,11 +6694,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Spähprogramm in Windows: <a href=\"http://www.theregister.co.uk/2003/02/28/";
 "windows_update_keeps_tabs/\" title=\"Windows Update keeps tabs on all system "
@@ -6721,11 +6742,20 @@
 "\">S Modus</a>. Hauptunterschied zu Windows 10 S ist eine einfache "
 "Möglichkeit, den S-Modus auszuschalten."
 
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"https://www.itworld.com/article/2832657/operating-systems/";
 "microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "
@@ -10577,15 +10607,33 @@
 "cars-in-florida-to-help-people-evacuate/ 2017.\">nur einen begrenzten Teil "
 "der Batterie in einigen Autos nutzen konnten</a>."
 
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"//www.computerworld.com/article/2984889/windows-pcs/lenovo-"
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "
@@ -10635,8 +10683,9 @@
 "lediglich als sachbezogene Referenz dienen."
 
 # | In 2014, <a
-# | 
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>Oracle-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
 #. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
@@ -10644,9 +10693,9 @@
 #| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 #| "\">Oracle insisted on continuing this practice.</a>"
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "201<ins>3</ins> <a href=\"//www.computerworld.com/article/2494794/malware-"
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\" "
@@ -11767,6 +11816,166 @@
 "id=\"tn01-ref\" class=\"transnote\">[1]</a>."
 
 #~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "Einige <a href=\"//www.itworld.com/article/2705284/data-protection/"
+#~ "backdoor-found-in-d-link-router-firmware-code.html\" title=\"Backdoor "
+#~ "found in D-Link router firmware code, unter: itworld.com 2013.\">D-Link "
+#~ "Router haben Hintertür</a> zum Ändern von Einstellungen.<a 
href=\"#tn03\" "
+#~ "id=\"tn03-ref\" class=\"transnote\">[3]</a>"
+
+# | In Android, <a
+# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
+# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
+# | which seems since then to have been merged into Google Play.)+}
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It is in a program called "
+#~| "GTalkService)."
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"
+#~ "google-throws--kill-switch--on-android-phones.html\" title=\"Google "
+#~ "throws 'kill switch' on Android phones, unter: computerworld.com 2011."
+#~ "\">Android eine Hintertür, um Applikationen aus der Ferne zu löschen</a> 
"
+#~ "(sie befindet sich in einem Programm namens <em>GTalkService</em> <ins>"
+#~ "[das über den Dienst <em>Google Play</em> aufgerufen wird, A. d. Ü.]</"
+#~ "ins>).<!--a href=\"#tn02\" id=\"tn02-ref\" class=\"transnote\">[2]</a -->"
+
+# | [-<a
+# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]Windows
+# | 8 also has a back door for {+<a
+# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
+#~| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
+#~| "has a back door for remotely deleting apps</a>."
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.computerworld.com/article/2500036/desktop-apps/";
+#~ "microsoft--we-can-remotely-delete-windows-8-apps.html\" title="
+#~ "\"Microsoft: We can remotely delete Windows 8 apps, unter: computerworld."
+#~ "com 2011.\">Windows 8 hat ebenfalls eine Hintertür zum rechnerfernen "
+#~ "löschen von Anwendungssoftware</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/";
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\" title=\"Office for "
+#~ "Windows 10 will require Office 365 subscription on PCs, larger tablets, "
+#~ "IDG Communications 2018.\">Office 365-Abo</a> um Dokumente erstellen bzw. "
+#~ "bearbeiten zu können."
+
+# (fix) http_s_://www.infoworld.com …
+# | Spyware in {+older versions of+} Windows: <a
+# | 
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
+# | 
[-href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
+# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>
+# | secret NSA key in Windows</a>, whose functions we don't know.
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Windows: <a href=\"http://www.theregister.co.uk/2003/02/28/";
+#~| "windows_update_keeps_tabs/\"> Windows Update snoops on the user.</a> <a "
+#~| "href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-";
+#~| "underbelly-of-windows-81-blue-222175\"> Windows 8.1 snoops on local "
+#~| "searches.</a> And there's a <a href=\"http://www.marketoracle.co.uk/";
+#~| "Article40836.html\"> secret NSA key in Windows</a>, whose functions we "
+#~| "don't know."
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Spähprogramm in Windows: <a href=\"http://www.theregister.co.";
+#~ "uk/2003/02/28/windows_update_keeps_tabs/\" title=\"Windows Update keeps "
+#~ "tabs on all system software, unter: theregister.co.uk 2003\">Windows "
+#~ "Update schnüffelt dem Benutzer hinterher</a>. <a href=\"http://www.";
+#~ "infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-"
+#~ "blue-222175\" title=\"A look at the black underbelly of Windows 8.1 "
+#~ "'Blue', unter: infoworld.com 2013.\">Windows 8.1 schnüffelt in lokaler "
+#~ "Suche herum</a>. Und es gibt einen <a href=\"http://www.marketoracle.co.";
+#~ "uk/Article40836.html\" title=\"NSA Built Back Door In All Microsoft "
+#~ "Windows Software Since 1999, unter: marketoracle.co.uk 2013\">geheimen "
+#~ "NSA-Schlüssel in Windows</a>, dessen Funktionen wir nicht kennen."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#~ "devices&rdquo; (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app "
+#~ "store lock down, IDG Communications 2018.\">Windows&#160;8 auf "
+#~ "„Mobilgeräten“ <em>war</em> ein Gefängnis.</a>"
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs.  Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"//www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "
+#~ "title=\"Lenovo collects usage data on ThinkPad, ThinkCentre and "
+#~ "ThinkStation PCs, unter: computerworld.com 2015.\">Lenovo installiert(e) "
+#~ "heimlich <i>unerwünschte vorinstallierte Software</i> („Crapware“) 
via "
+#~ "BIOS</a> auf Windows-Installationen. <em>Beachten Sie</em>, dass diese "
+#~ "konkrete von Lenovo verwendete <strong>Sabotage-Methode keinerlei "
+#~ "Einfluss auf GNU-Systeme</strong> (mit Linux-Kern) hatte; auch ist eine "
+#~ "„saubere“ Windows-Installation nicht wirklich sauber, da <a href=\"/"
+#~ "proprietary/malware-microsoft\">Microsoft eigene Schadprogramme einbaut</"
+#~ "a>."
+
+# | In 2014, <a
+# | 
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>{+
+# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+#, fuzzy
+#~| msgid ""
+#~| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~| "\">Oracle insisted on continuing this practice.</a>"
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "201<ins>3</ins> <a href=\"//www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\" title=\"Oracle will continue to bundle ‘crapware’ with Java, unter: 
"
+#~ "computerworld.com 2013.\">bestand Oracle darauf, diese Praxis "
+#~ "fortzusetzen</a>."
+
+#~ msgid ""
 #~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-";
 #~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"
 #~ "mic/\"> Symphony surveillance software snoop on what radio and TV "

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary/po/es.po        14 Mar 2019 11:30:41 -0000      1.66
+++ proprietary/po/es.po        17 Mar 2019 10:32:39 -0000      1.67
@@ -2335,9 +2335,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3530,25 +3530,31 @@
 "en la <a href=\"https://www.google.com/intl/en/chromebook/termsofservice.html";
 "\">sección 4 del Acuerdo de Licencia de Usuario Final</a>."
 
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
 #. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
 #| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
 #| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
-#| "has a back door to remotely delete apps.</a> (It was in a program called "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
 #| "GTalkService, which seems since then to have been merged into Google "
 #| "Play.)"
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "En Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\">Google tiene una puerta "
-"trasera para eliminar aplicaciones de forma remota</a>. (Estaba en un "
-"programa llamado GTalkService, que posteriormente parece haber sido "
-"integrado en Google Play)."
+"google-throws--kill-switch--on-android-phones.html\"> Google ha dispuesto "
+"una puerta trasera para borrar aplicaciones de forma remota</a>. (Esto lo "
+"hacía con un programa llamado GTalkService, al parecer integrado en Google "
+"Play desde entonces)."
 
 #. type: Content of: <ul><li><p>
 #, fuzzy
@@ -4241,11 +4247,20 @@
 "reprogramable para microprocesadores Intel y AMD</a> puede ser un medio para "
 "que la NSA acceda a los ordenadores con la ayuda de Microsoft."
 
+# | Windows 8 also has a back door for <a
+# | 
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "Windows 8 también tiene una puerta trasera para <a href=\"http://www.";
 "computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-"
@@ -4391,16 +4406,39 @@
 "tab=AllReplies#tabs\">reduce drásticamente el rendimiento de los ordenadores 
"
 "con Windows&nbsp;10</a>, y no puede deshabilitarse con facilidad."
 
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "Tras <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -4660,12 +4698,22 @@
 msgid "Microsoft Subscriptions"
 msgstr "Suscripciones de Microsoft"
 
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office obliga a los usuarios a <a href=\"https://www.computerworld.";
 "com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -4925,15 +4973,32 @@
 "www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"
 "\"> específicamente para espiar</a>."
 
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Código espí­a en versiones antiguas de Windows: <a href=\"https://www.";
 "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"><i>Windows Update</"
@@ -4971,11 +5036,20 @@
 "principal diferencia con Windows 10 S es que existe una manera sencilla de "
 "salir del modo S."
 
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Windows 8 para «dispositivos móviles» (ya 
"
@@ -8141,13 +8215,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -8174,9 +8248,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 
 #. type: Content of: <title>
@@ -9026,6 +9100,97 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";> Los "
 "procesadores Intel incorporarán software tirano</a>."
 
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It was in a program called "
+#~| "GTalkService, which seems since then to have been merged into Google "
+#~| "Play.)"
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "En Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\">Google "
+#~ "tiene una puerta trasera para eliminar aplicaciones de forma remota</a>. "
+#~ "(Estaba en un programa llamado GTalkService, que posteriormente parece "
+#~ "haber sido integrado en Google Play)."
+
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "Windows 8 también tiene una puerta trasera para <a href=\"http://www.";
+#~ "computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-"
+#~ "delete-windows-8-apps.html\">cancelar aplicaciones de forma remota</a>."
+
+#~ msgid ""
+#~ "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forcing the download of Windows 10</a> on computers that were running "
+#~ "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#~ "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#~ "turned it off, in the hope that some day they would fail to say no.  To "
+#~ "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#~ "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#~ "techniques</a>."
+#~ msgstr ""
+#~ "Tras <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forzar la descarga de Windows 10</a> en ordenadores que funcionaban "
+#~ "con Windows 7 y 8, Microsoft <a href=\"http://www.computerworld.com/";
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\">hacía reaparecer reiteradamente una "
+#~ "indicación que instaba a los usuarios a «actualizar» a Windows 10</a>, "
+#~ "aunque estos ya lo hubieran rechazado con anterioridad, con la esperanza "
+#~ "de que alguna vez erraran. Para hacerlo, Microsoft utilizó <a href="
+#~ "\"https://www.theregister.co.uk/2016/03/17/";
+#~ "microsoft_windows_10_upgrade_gwx_vs_humanity/\">técnicas de "
+#~ "<cite>malware</cite> techniques</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office obliga a los usuarios a <a href=\"https://www.";
+#~ "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+#~ "require-office-365-subscription-on-pcs-larger-tablets.html\">suscribirse "
+#~ "a Office 365 para poder crear o editar documentos</a>."
+
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Código espí­a en versiones antiguas de Windows: <a href=\"https://www.";
+#~ "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"><i>Windows "
+#~ "Update</i> husmea en las actividades del usuario</a>. <a href=\"https://";
+#~ "www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-"
+#~ "underbelly-of-windows-8-1--blue-.html\">Windows 8.1 rastrea las búsquedas 
"
+#~ "locales</a>, y <a href=\"http://www.marketoracle.co.uk/Article40836.html";
+#~ "\"> Windows contiene una clave secreta de la <abbr title=\"National "
+#~ "Security Agency\">NSA</abbr></a> cuyas funciones desconocemos."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#~ "devices&rdquo; (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\">Windows 8 para «dispositivos "
+#~ "móviles» (ya desaparecido) era una prisión</a>."
+
 #~ msgid ""
 #~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-";
 #~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary/po/fr.po        13 Mar 2019 13:14:42 -0000      1.87
+++ proprietary/po/fr.po        17 Mar 2019 10:32:39 -0000      1.88
@@ -2565,11 +2565,21 @@
 "utilise son intelligence pour servir son fabricant <em>à votre détriment</"
 "em>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> ont "
@@ -4039,11 +4049,24 @@
 "\">l'article 4 des <abbr title=\"Contrat de Licence d'Utilisateur Final"
 "\">CLUF</abbr></a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "Dans Android, <a href=\"http://www.computerworld.com/article/2506557/";
@@ -4671,11 +4694,20 @@
 "pourrait fournir à la NSA un moyen d'envahir les ordinateurs, disent des "
 "experts respectés en sécurité."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# | 
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
 "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 a aussi "
@@ -4820,16 +4852,39 @@
 "tab=AllReplies#tabs\">réduit considérablement les performances des machines 
"
 "sous Windows 10</a> et ne peut pas être désactivé facilement."
 
-#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -5089,12 +5144,22 @@
 msgid "Microsoft Subscriptions"
 msgstr "Abonnements"
 
-#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office force ses utilisateurs <a href=\"https://www.computerworld.";
 "com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -5355,15 +5420,32 @@
 "\"http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-";
 "user-data\">dans un but précis d'espionnage</a>."
 
-#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Espions dans les anciennes versions de Windows : <a href=\"https://www.";
 "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
@@ -5401,11 +5483,20 @@
 "différence principale avec Windows 10 est qu'on peut facilement sortir du "
 "mode S."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobiles 
» "
@@ -8740,15 +8831,33 @@
 "cars-in-florida-to-help-people-evacuate/\">limite l'utilisation de la "
 "batterie</a> par le client à une partie seulement de sa capacité."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"
@@ -8795,11 +8904,20 @@
 "Nous ne sommes pas d'accord avec ce que dit l'article sur ces questions, "
 "mais nous le proposons comme référence factuelle."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>+}
+# | Oracle insisted on continuing this practice</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "En 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
@@ -9772,6 +9890,127 @@
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
 
 #~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> "
+#~ "ont une porte dérobée pour changer les réglages."
+
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "Dans Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\">Google a "
+#~ "une porte dérobée qui lui permet de supprimer des applications à "
+#~ "distance</a> (elle est dans un programme appelé GTalkService qui semble, "
+#~ "depuis la parution de cet article, avoir été intégré à Google Play)."
+
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
+#~ "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 a aussi 
"
+#~ "une porte dérobée pour supprimer des applications à distance</a>."
+
+#~ msgid ""
+#~ "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forcing the download of Windows 10</a> on computers that were running "
+#~ "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#~ "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#~ "turned it off, in the hope that some day they would fail to say no.  To "
+#~ "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#~ "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#~ "techniques</a>."
+#~ msgstr ""
+#~ "Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-"
+#~ "forcing\">forcé le téléchargement de Windows 10</a> sur les 
ordinateurs "
+#~ "exécutant Windows 7 ou 8, Microsoft a <a 
href=\"http://www.computerworld.";
+#~ "com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\">continué à afficher un panneau "
+#~ "exhortant les utilisateurs à faire la « mise à niveau »</a>, même "
+#~ "lorsqu'ils avaient refusé de nombreuses fois, dans l'espoir qu'un jour ou 
"
+#~ "l'autre ils oublieraient de dire non. Pour ce faire, Microsoft a utilisé "
+#~ "des <a href=\"https://www.theregister.co.uk/2016/03/17/";
+#~ "microsoft_windows_10_upgrade_gwx_vs_humanity/\">techniques classiques "
+#~ "dans l'industrie du malware</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office force ses utilisateurs <a href=\"https://www.";
+#~ "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+#~ "require-office-365-subscription-on-pcs-larger-tablets.html\">à s'abonner "
+#~ "à Office 365 pour pouvoir créer ou éditer des documents</a>."
+
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Espions dans les anciennes versions de Windows : <a href=\"https://www.";
+#~ "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
+#~ "espionne l'utilisateur</a>. <a href=\"https://www.infoworld.com/";
+#~ "article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-"
+#~ "windows-8-1--blue-.html\">Windows 8.1 espionne les recherches locales</"
+#~ "a>. Et il existe, toujours dans Windows, <a href=\"http://www.";
+#~ "marketoracle.co.uk/Article40836.html\">une clé secrète de la NSA</a> 
dont "
+#~ "nous ne connaissons pas la fonction."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#~ "devices&rdquo; (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\">Feu Windows 8 pour « 
appareils "
+#~ "mobiles » était une prison</a> : il censurait le choix de 
l'utilisateur "
+#~ "en matière de programmes d'application."
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs.  Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"
+#~ "\">Lenovo a installé furtivement des logiciels promotionnels et espions "
+#~ "via le BIOS</a>, sur des installations de Windows. Notez que la méthode "
+#~ "particulière de sabotage utilisée par Lenovo n'a pas affecté GNU/Linux 
; "
+#~ "par ailleurs, une installation « propre » de Windows n'est pas 
vraiment "
+#~ "propre puisque <a href=\"/proprietary/malware-microsoft.html\">Microsoft "
+#~ "y ajoute ses propres logiciels malveillants</a>."
+
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "En 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\">Oracle a insisté pour continuer cette pratique</a>."
+
+#~ msgid ""
 #~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
 #~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
 #~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/it.po        13 Mar 2019 11:00:59 -0000      1.49
+++ proprietary/po/it.po        17 Mar 2019 10:32:39 -0000      1.50
@@ -2904,11 +2904,21 @@
 "il prodotto sta furbescamente facendo gli interessi del suo produttore "
 "<em>contro di voi</em>."
 
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\"> Alcuni router D-Link</a> hanno "
@@ -4662,7 +4672,8 @@
 msgstr ""
 
 # | In Android, <a
-# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
 # | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
 # | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
 # | which seems since then to have been merged into Google Play.)+}
@@ -4674,9 +4685,9 @@
 #| "has a back door to remotely delete apps.</a> (It is in a program called "
 #| "GTalkService)."
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
@@ -5398,7 +5409,7 @@
 # | [-<a
 # | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]Windows
 # | 8 also has a back door for {+<a
-# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | 
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
 # | remotely deleting apps</a>.
 #. type: Content of: <ul><li><p>
 #, fuzzy
@@ -5407,9 +5418,9 @@
 #| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
 #| "has a back door for remotely deleting apps</a>."
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
 "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 ha anche "
@@ -5565,12 +5576,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -5884,9 +5895,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -6260,7 +6271,7 @@
 # | 
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>+}
 # | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
 # | 
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
-# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
 # | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
 # | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>
 # | secret NSA key in Windows</a>, whose functions we don't know.
@@ -6278,11 +6289,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/";
 "http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>Windows "
@@ -6311,7 +6322,7 @@
 
 # | <a
 # | 
[-href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown\";>-]
-# | 
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>+}
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
 # | Windows 8 on &ldquo;mobile devices&rdquo; [-is-] {+(now defunct) was+} a
 # | [-jail</a>: it censors the user's choice of application programs.-]
 # | {+jail</a>.+}
@@ -6322,9 +6333,9 @@
 #| "app-store-lockdown\"> Windows 8 on &ldquo;mobile devices&rdquo; is a "
 #| "jail</a>: it censors the user's choice of application programs."
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 "app-store-lockdown\">Windows 8 sui &ldquo;dispositivi mobili&rdquo; è una "
@@ -9865,15 +9876,33 @@
 "a>."
 msgstr ""
 
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -9918,8 +9947,9 @@
 "in ogni caso come riferimento fattuale."
 
 # | In 2014, <a
-# | 
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>Oracle-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
 #. type: Content of: <ul><li><p>
 #, fuzzy
 #| msgid ""
@@ -9927,9 +9957,9 @@
 #| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 #| "\">Oracle insisted on continuing this practice.</a>"
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "Nel 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
@@ -11068,6 +11098,149 @@
 "processori Intel avranno del software tiranno preinstallato</a>."
 
 #~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\"> Alcuni router D-Link</a> "
+#~ "hanno una backdoor per cambiare le impostazioni immediatamente."
+
+# | In Android, <a
+# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
+# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
+# | which seems since then to have been merged into Google Play.)+}
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It is in a program called "
+#~| "GTalkService)."
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\">Google ha "
+#~ "una backdoor per disinstallare applicazioni a distanza</a>. (Si trova "
+#~ "all'interno di un programma chiamato GTalkService)."
+
+# | [-<a
+# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]Windows
+# | 8 also has a back door for {+<a
+# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
+#~| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
+#~| "has a back door for remotely deleting apps</a>."
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
+#~ "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 ha "
+#~ "anche una backdoor per disinstallare programmi a distanza</a>."
+
+# | Spyware in [-Windows 8:-] {+older versions of Windows:+} <a
+# | 
[-href=\"https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>-]
+# | 
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>+}
+# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
+# | 
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
+# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>
+# | secret NSA key in Windows</a>, whose functions we don't know.
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Windows 8: <a href=\"https://web.archive.org/";
+#~| "web/20160313105805/http://www.theregister.co.uk/2003/02/28/";
+#~| "windows_update_keeps_tabs/\"> Windows Update snoops on the user.</a> <a "
+#~| "href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-";
+#~| "underbelly-of-windows-81-blue-222175\"> Windows 8.1 snoops on local "
+#~| "searches.</a> And there's a <a href=\"http://www.marketoracle.co.uk/";
+#~| "Article40836.html\"> secret NSA key in Windows</a>, whose functions we "
+#~| "don't know."
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Spyware in Windows 8: <a href=\"https://web.archive.org/";
+#~ "web/20160313105805/http://www.theregister.co.uk/2003/02/28/";
+#~ "windows_update_keeps_tabs/\">Windows Update spia l'utente</a>. <a href="
+#~ "\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-";
+#~ "of-windows-81-blue-222175\">Windows 8.1 curiosa nelle ricerche locali</"
+#~ "a>. E c'è una <a href=\"http://www.marketoracle.co.uk/Article40836.html";
+#~ "\">chiave segreta dell'NSA in Windows</a>, le cui funzioni sono a noi "
+#~ "ignote."
+
+# | <a
+# | 
[-href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; [-is-] {+(now defunct) was+} a
+# | [-jail</a>: it censors the user's choice of application programs.-]
+# | {+jail</a>.+}
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-";
+#~| "metro-app-store-lockdown\"> Windows 8 on &ldquo;mobile devices&rdquo; is "
+#~| "a jail</a>: it censors the user's choice of application programs."
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#~ "devices&rdquo; (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
+#~ "app-store-lockdown\">Windows 8 sui &ldquo;dispositivi mobili&rdquo; è una 
"
+#~ "prigione</a>: censura la scelta delle applicazioni da parte dell'utente."
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs.  Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo ha installato di nascosto software indesiderato tramite il BIOS</"
+#~ "a> sui suoi dispositivi Windows.  Lo specifico metodo usato da Lenovo non "
+#~ "aveva conseguenze per chi eseguiva GNU/Linux; tra l'altro, "
+#~ "un'installazione &ldquo;pulita&rdquo; di Windows non è mai davvero pulita 
"
+#~ "a causa del <a href=\"/proprietary/malware-microsoft.html\">malware "
+#~ "preinstallato da Microsoft</a>."
+
+# | In 2014, <a
+# | 
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>{+
+# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+#, fuzzy
+#~| msgid ""
+#~| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~| "\">Oracle insisted on continuing this practice.</a>"
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "Nel 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\">ha continuato a perpetrare questa pratica.</a>"
+
+#~ msgid ""
 #~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-";
 #~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"
 #~ "mic/\"> Symphony surveillance software snoop on what radio and TV "

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/ja.po        13 Mar 2019 11:00:59 -0000      1.49
+++ proprietary/po/ja.po        17 Mar 2019 10:32:39 -0000      1.50
@@ -2486,10 +2486,15 @@
 "造業者に仕えて<em>あなたに反する</em>のです。"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/darticle/2705284/data-protection/backdoor-";
 
"found-d-link-router-firmware-code.html\">いくつかのD-Linkのルータ</a>はバック"
@@ -4035,9 +4040,9 @@
 #| "has a back door to remotely delete apps.</a> (It is in a program called "
 #| "GTalkService)."
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "アンドロイドでは<a 
href=\"http://www.computerworld.com/article/2506557/";
@@ -4655,9 +4660,9 @@
 #| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
 #| "has a back door for remotely deleting apps</a>."
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
 
"microsoft--we-can-remotely-delete-windows-8-apps.html\">ウィンドウズ8もé
 éš”操"
@@ -4788,12 +4793,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -5056,9 +5061,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -5351,11 +5356,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "ウィンドウズ8のスパイウェア: <a href=\"https://web.archive.org/";
 "web/20160313105805/http://www.theregister.co.uk/2003/02/28/";
@@ -5390,9 +5395,9 @@
 #| "app-store-lockdown\"> Windows 8 on &ldquo;mobile devices&rdquo; is a "
 #| "jail</a>: it censors the user's choice of application programs."
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 
"app-store-lockdown\">「モバイルデバイス」のウィンドウズ8は牢獄です</a>:
 ユー"
@@ -8414,14 +8419,23 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "ウィンドウズのインストールで<a 
href=\"http://www.computerworld.com/";
 "article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"
@@ -8471,9 +8485,9 @@
 #| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 #| "\">Oracle insisted on continuing this practice.</a>"
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "2014年、<a href=\"http://www.computerworld.com/article/2494794/malware-";
 
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">オ"
@@ -9494,6 +9508,121 @@
 
"プロセッサには暴君ソフトウェアが組み込まれるようになります</a>。"
 
 #~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/darticle/2705284/data-protection/";
+#~ 
"backdoor-found-d-link-router-firmware-code.html\">いくつかのD-Linkのルータ"
+#~ 
"</a>はバックドアを有し、瞬時に(英語原文ではdlinkにかけたシャレ)設定を変更"
+#~ "することができます。"
+
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It is in a program called "
+#~| "GTalkService)."
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "アンドロイドでは<a 
href=\"http://www.computerworld.com/article/2506557/";
+#~ 
"security0/google-throws--kill-switch--on-android-phones.html\">グーグルが"
+#~ "遠隔でアプリを削除するバックドアがあります。</a> 
(GTalkServiceと呼ばれるプ"
+#~ "ログラムです)。"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
+#~| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
+#~| "has a back door for remotely deleting apps</a>."
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
+#~ 
"microsoft--we-can-remotely-delete-windows-8-apps.html\">ウィンドウズ8もé
 "
+#~ 
"隔操作でアプリを削除するためのバックドアを有します</a>。"
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Windows 8: <a href=\"https://web.archive.org/";
+#~| "web/20160313105805/http://www.theregister.co.uk/2003/02/28/";
+#~| "windows_update_keeps_tabs/\"> Windows Update snoops on the user.</a> <a "
+#~| "href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-";
+#~| "underbelly-of-windows-81-blue-222175\"> Windows 8.1 snoops on local "
+#~| "searches.</a> And there's a <a href=\"http://www.marketoracle.co.uk/";
+#~| "Article40836.html\"> secret NSA key in Windows</a>, whose functions we "
+#~| "don't know."
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "ウィンドウズ8のスパイウェア: <a 
href=\"https://web.archive.org/";
+#~ "web/20160313105805/http://www.theregister.co.uk/2003/02/28/";
+#~ 
"windows_update_keeps_tabs/\">ウィンドウズ・アップデートはユーザを覗き見ま"
+#~ "す。</a> <a 
href=\"http://www.infoworld.com/t/microsoft-windows/look-the-";
+#~ 
"black-underbelly-of-windows-81-blue-222175\">ウィンドウズ8.1はローカルの検"
+#~ "索を覗き見します。</a> そして<a 
href=\"http://www.marketoracle.co.uk/";
+#~ "Article40836.html\"> 
秘密のNSA鍵がウィンドウズにはあり</a>、その機能はわた"
+#~ "したちにはわかりません。"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-";
+#~| "metro-app-store-lockdown\"> Windows 8 on &ldquo;mobile devices&rdquo; is "
+#~| "a jail</a>: it censors the user's choice of application programs."
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#~ "devices&rdquo; (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
+#~ 
"app-store-lockdown\">「モバイルデバイス」のウィンドウズ8は牢獄です</a>:
 "
+#~ "ユーザのアプリケーションプログラム
の選択を検閲します。"
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs.  Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "ウィンドウズのインストールで<a 
href=\"http://www.computerworld.com/";
+#~ "article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"
+#~ 
"thinkcentre-and-thinkstation-pcs.html\">レノボはBIOSを通じてクラップウェア"
+#~ 
"をこっそりインストールしました</a>。レノボが使ったこの特定の妨害の方法は"
+#~ 
"GNU/Linuxには関係しません。また、「クリーン」ウィンドウズインストールは実"
+#~ "際にはクリーンではありません。<a 
href=\"/proprietary/malware-microsoft."
+#~ "html\">マイクロソフトはそれ自身のマルウェアをå…
¥ã‚Œã‚‹</a>からです。"
+
+#, fuzzy
+#~| msgid ""
+#~| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~| "\">Oracle insisted on continuing this practice.</a>"
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "2014年、<a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\">オラクルはこのæ…
£ç¿’を続けることを主張しています。</a>"
+
+#~ msgid ""
 #~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-";
 #~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"
 #~ "mic/\"> Symphony surveillance software snoop on what radio and TV "

Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/malware-appliances.de-diff.html      4 Mar 2019 09:00:10 
-0000       1.38
+++ proprietary/po/malware-appliances.de-diff.html      17 Mar 2019 10:32:39 
-0000      1.39
@@ -769,7 +769,7 @@
 
   &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;
     Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
     dlink of an eye.&lt;/p&gt;
 
@@ -1299,7 +1299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 09:00:10 $
+$Date: 2019/03/17 10:32:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/po/malware-appliances.de.po     4 Mar 2019 09:00:10 -0000       
1.72
+++ proprietary/po/malware-appliances.de.po     17 Mar 2019 10:32:40 -0000      
1.73
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1120,10 +1120,20 @@
 "scheint es geschickt dem Hersteller zu dienen&#160;&#8209;&#160;gegen einen."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "Einige <a href=\"//www.itworld.com/article/2705284/data-protection/backdoor-"
 "found-in-d-link-router-firmware-code.html\" title=\"Backdoor found in D-Link "

Index: proprietary/po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/malware-appliances.fr.po     4 Mar 2019 20:20:41 -0000       
1.115
+++ proprietary/po/malware-appliances.fr.po     17 Mar 2019 10:32:40 -0000      
1.116
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-04 21:09+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -996,10 +997,20 @@
 "em>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> ont "

Index: proprietary/po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-appliances.pot       4 Mar 2019 09:00:10 -0000       
1.57
+++ proprietary/po/malware-appliances.pot       17 Mar 2019 10:32:40 -0000      
1.58
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -660,7 +660,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "<a "
-"href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>
 "
+"href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>
 "
 "Some D-Link routers</a> have a back door for changing settings in a dlink of "
 "an eye."
 msgstr ""

Index: proprietary/po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary/po/malware-appliances.ru.po     4 Mar 2019 09:29:52 -0000       
1.149
+++ proprietary/po/malware-appliances.ru.po     17 Mar 2019 10:32:40 -0000      
1.150
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -986,10 +987,20 @@
 "служит своему производителю <em>против 
вас</em>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\">В некоторых 
маршрутизаторах D-"

Index: proprietary/po/malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/malware-google.de-diff.html  9 Feb 2019 23:00:28 -0000       
1.21
+++ proprietary/po/malware-google.de-diff.html  17 Mar 2019 10:32:40 -0000      
1.22
@@ -108,7 +108,8 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;</em></ins></span>
     &lt;p&gt;In Android, &lt;a
-    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+      <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;</em></ins></span>
     Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> in a
     program called <span 
class="removed"><del><strong>GTalkService).&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>GTalkService, which seems since then to have 
been
     merged into Google Play.)&lt;/p&gt;</em></ins></span>
@@ -576,7 +577,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/09 23:00:28 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-google.de.po 9 Feb 2019 23:00:28 -0000       1.36
+++ proprietary/po/malware-google.de.po 17 Mar 2019 10:32:40 -0000      1.37
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -188,7 +188,8 @@
 
 #. type: Content of: <ul><li><p>
 # | In Android, <a
-# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
 # | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
 # | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
 # | which seems since then to have been merged into Google Play.)+}
@@ -199,9 +200,9 @@
 #| "has a back door to remotely delete apps.</a> (It is in a program called "
 #| "GTalkService)."
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"

Index: proprietary/po/malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/po/malware-google.es.po 18 Feb 2019 10:52:39 -0000      1.1
+++ proprietary/po/malware-google.es.po 17 Mar 2019 10:32:40 -0000      1.2
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-02-18 11:40+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -157,10 +158,23 @@
 "\">sección 4 del Acuerdo de Licencia de Usuario Final</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "En Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";

Index: proprietary/po/malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-google.fr.po 10 Feb 2019 15:42:57 -0000      1.57
+++ proprietary/po/malware-google.fr.po 17 Mar 2019 10:32:40 -0000      1.58
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-02-10 16:42+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -159,10 +160,23 @@
 "\">CLUF</abbr></a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "Dans Android, <a href=\"http://www.computerworld.com/article/2506557/";

Index: proprietary/po/malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/malware-google.pot   9 Feb 2019 23:00:28 -0000       1.32
+++ proprietary/po/malware-google.pot   17 Mar 2019 10:32:40 -0000      1.33
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -127,7 +127,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "In Android, <a "
-"href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
 "
+"href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>
 "
 "Google has a back door to remotely delete apps</a>. (It was in a program "
 "called GTalkService, which seems since then to have been merged into Google "
 "Play.)"

Index: proprietary/po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary/po/malware-google.ru.po 25 Feb 2019 09:37:05 -0000      1.77
+++ proprietary/po/malware-google.ru.po 17 Mar 2019 10:32:40 -0000      1.78
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-10-05 09:03+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -158,10 +159,23 @@
 "пользователя</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "В Android <a href=\"http://www.computerworld.com/article/2506557/security0/";

Index: proprietary/po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-microsoft.de-diff.html       6 Mar 2019 09:30:53 
-0000       1.36
+++ proprietary/po/malware-microsoft.de-diff.html       17 Mar 2019 10:32:40 
-0000      1.37
@@ -142,7 +142,7 @@
 
   &lt;li id="M201112080.1"&gt;
     &lt;p&gt;Windows 8</em></ins></span> also has a back door for <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You might well decide to let a security service that you trust
@@ -179,8 +179,8 @@
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt;
 disks. 
     (The article talks about</em></ins></span> how <span 
class="removed"><del><strong>to permanently reject</strong></del></span> the 
<span class="removed"><del><strong>downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This seems to involve use of a back door</strong></del></span> 
<span class="inserted"><ins><em>same malware would later be
-    introduced</em></ins></span> in <span class="removed"><del><strong>Windows 
7 and 8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>MacOS. 
 That had not been done at the time, but it was
+    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same malware 
would later be
+    introduced in MacOS.  That had not been done at the time, but it was
     done subsequently.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -236,96 +236,94 @@
 &lt;p&gt;This</em></ins></span> section <span class="removed"><del><strong>are 
not precisely malware, since they do
 not involve making</strong></del></span> <span class="inserted"><ins><em>gives 
examples of Microsoft software harassing or annoying</em></ins></span>
 the <span class="removed"><del><strong>program that runs in a way that 
hurts</strong></del></span> <span class="inserted"><ins><em>user, or causing 
trouble for</em></ins></span> the user.
-<span class="removed"><del><strong>But they</strong></del></span>  <span 
class="inserted"><ins><em>These actions</em></ins></span> are <span 
class="removed"><del><strong>a lot</strong></del></span> like <span 
class="removed"><del><strong>malware, since they are technical Microsoft
-actions that harm to</strong></del></span>
-<span class="inserted"><ins><em>sabotage but</em></ins></span> the <span 
class="inserted"><ins><em>word &ldquo;sabotage&rdquo; is too strong for 
them.&lt;/p&gt;
+<span class="removed"><del><strong>But they</strong></del></span>  <span 
class="inserted"><ins><em>These actions</em></ins></span> are <span 
class="removed"><del><strong>a lot</strong></del></span> like <span 
class="removed"><del><strong>malware, since</strong></del></span>
+<span class="inserted"><ins><em>sabotage but the word &ldquo;sabotage&rdquo; 
is too strong for them.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201809120"&gt;
     &lt;p&gt;One version of Windows 10 &lt;a
     
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/"&gt;
-    harangues</em></ins></span> users <span class="inserted"><ins><em>if they 
try to install Firefox (or Chrome)&lt;/a&gt;.&lt;/p&gt;
+    harangues users if</em></ins></span> they <span 
class="removed"><del><strong>are technical</strong></del></span> <span 
class="inserted"><ins><em>try to install Firefox (or 
Chrome)&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803190"&gt;
     &lt;p&gt;Microsoft is planning to make Windows &lt;a
     
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox"&gt;
-    impose use</em></ins></span> of <span 
class="removed"><del><strong>specific Microsoft software.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
+    impose use of its browser, Edge, in certain 
circumstances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The reason</em></ins></span> Microsoft <span 
class="inserted"><ins><em>can force things on users is that Windows
+    &lt;p&gt;The reason</em></ins></span> Microsoft
+<span class="removed"><del><strong>actions</strong></del></span> <span 
class="inserted"><ins><em>can force things on users is</em></ins></span> that 
<span class="removed"><del><strong>harm to</strong></del></span> <span 
class="inserted"><ins><em>Windows
     is nonfree.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703170"&gt;
-    &lt;p&gt;Windows displays</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
-       has dropped support</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
-    intrusive ads</em></ins></span> for <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>Microsoft products</em></ins></span> and <span 
class="removed"><del><strong>8 on recent processors&lt;/a&gt;
-      in</strong></del></span> <span class="inserted"><ins><em>its partners'
+    &lt;p&gt;Windows displays &lt;a
+    
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer"&gt;
+    intrusive ads for Microsoft products and its partners'
     products&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article's author starts from the premise that Microsoft 
has</em></ins></span>
-    a <span class="removed"><del><strong>big hurry.&lt;/p&gt;
-    &lt;p&gt;It makes no difference</strong></del></span> <span 
class="inserted"><ins><em>right to control</em></ins></span> what <span 
class="removed"><del><strong>legitimate reasons Microsoft might
-      have for not doing work</strong></del></span> <span 
class="inserted"><ins><em>Windows does</em></ins></span> to <span 
class="removed"><del><strong>support them. If</strong></del></span> <span 
class="inserted"><ins><em>users, as long as</em></ins></span> it doesn't <span 
class="removed"><del><strong>want to
-      do this work, it should let users do</strong></del></span>
-    <span class="inserted"><ins><em>go &ldquo;too far&rdquo;. We 
disagree.&lt;/p&gt;
+    &lt;p&gt;The article's author starts from</em></ins></span> the <span 
class="removed"><del><strong>users of specific</strong></del></span> <span 
class="inserted"><ins><em>premise that</em></ins></span> Microsoft <span 
class="removed"><del><strong>software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>has
+    a right to control what Windows does to users, as long as it doesn't
+    go &ldquo;too far&rdquo;. We disagree.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612140"&gt;
-    &lt;p&gt;The Microsoft Telemetry Compatibility service &lt;a
-    
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
-    drastically reduces</em></ins></span> the <span 
class="removed"><del><strong>work.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>performances of machines running
-    Windows&nbsp;10&lt;/a&gt;, and can't be disabled 
easily.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The</em></ins></span> Microsoft <span 
class="inserted"><ins><em>Telemetry Compatibility service</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/"&gt;
+       has dropped support for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs"&gt;
+    drastically reduces the performances of machines running
+    Windows&nbsp;10&lt;/a&gt;, and can't be disabled easily.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Microsoft has made</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201608170"&gt;
+  &lt;li id="M201608170"&gt;
     &lt;p&gt; After &lt;a 
href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing the 
download of Windows 10&lt;/a&gt;
-    on computers that were running</em></ins></span> Windows 7 and <span 
class="removed"><del><strong>8 cease to function on certain
-      new computers,</strong></del></span> <span class="inserted"><ins><em>8, 
Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
-      forcing their owners</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    repeatedly switched on a flag that urged users</em></ins></span> to <span 
class="removed"><del><strong>switch</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;upgrade&rdquo;</em></ins></span> to 
Windows <span class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
-   of Windows
-   10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-   find</strong></del></span> <span class="inserted"><ins><em>10&lt;/a&gt; 
when they had turned
-    it off, in the hope</em></ins></span> that <span 
class="inserted"><ins><em>some day</em></ins></span> they <span 
class="removed"><del><strong>are denied</strong></del></span> <span 
class="inserted"><ins><em>would fail to say no.
-    To do this, Microsoft used &lt;a
+    on computers that were running</em></ins></span> Windows 7 and <span 
class="removed"><del><strong>8</strong></del></span> <span 
class="inserted"><ins><em>8, Microsoft &lt;a
+    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    repeatedly switched</em></ins></span> on <span 
class="removed"><del><strong>recent processors&lt;/a&gt;
+      in</strong></del></span> a <span class="removed"><del><strong>big 
hurry.&lt;/p&gt;
+    &lt;p&gt;It makes no difference what legitimate reasons Microsoft might
+      have for not doing work</strong></del></span> <span 
class="inserted"><ins><em>flag that urged users</em></ins></span> to <span 
class="removed"><del><strong>support them. If it doesn't 
want</strong></del></span>
+    <span class="inserted"><ins><em>&ldquo;upgrade&rdquo;</em></ins></span> to
+      <span class="removed"><del><strong>do this work,</strong></del></span> 
<span class="inserted"><ins><em>Windows 10&lt;/a&gt; when they had 
turned</em></ins></span>
+    it <span class="removed"><del><strong>should let 
users</strong></del></span> <span class="inserted"><ins><em>off, in the hope 
that some day they would fail to say no.
+    To</em></ins></span> do <span class="inserted"><ins><em>this, Microsoft 
used &lt;a
     
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
     malware techniques&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;A detailed &lt;a
     
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive"&gt;
-    analysis of Microsoft's scheme&lt;/a&gt; is available on</em></ins></span> 
the <span class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>Electronic
-    Frontier Foundation's website.&lt;/p&gt;
+    analysis of Microsoft's scheme&lt;/a&gt; is available on</em></ins></span> 
the <span class="removed"><del><strong>work.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Electronic
+    Frontier Foundation's website.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201603090"&gt;</em></ins></span>
+    &lt;p&gt;Microsoft has made <span 
class="inserted"><ins><em>companies'</em></ins></span>
+    Windows <span class="removed"><del><strong>7 and 8 cease to function on 
certain
+      new computers,</strong></del></span> <span 
class="inserted"><ins><em>machines managed by the company's 
sysadmins</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
+      forcing their owners</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
+    users</em></ins></span> to <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>complain to the sysadmins about not 
&ldquo;upgrading&rdquo;</em></ins></span>
+    to Windows 10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201603090"&gt;
-    &lt;p&gt;Microsoft has made companies'
-    Windows machines managed by the company's sysadmins &lt;a
-    
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
-    users to complain</em></ins></span> to <span 
class="removed"><del><strong>cancel or even postpone</strong></del></span> the
-   <span class="removed"><del><strong>imposed date of installation&lt;/a&gt;.
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Once Microsoft has 
tricked a user into accepting installation
+   of Windows
+   10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
+   find that they are denied the option to cancel or even postpone the
+   imposed date of installation&lt;/a&gt;.
    &lt;/p&gt;
    &lt;p&gt;This demonstrates what we've said for years: using proprietary
    software means letting someone have power over you, and you're
-   going</strong></del></span> <span class="inserted"><ins><em>sysadmins about 
not &ldquo;upgrading&rdquo;</em></ins></span>
-    to <span class="removed"><del><strong>get screwed sooner or 
later.&lt;/p&gt;&lt;/li&gt;
+   going to get screwed sooner or later.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span> <span 
class="inserted"><ins><em>Windows 10&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Microsoft</strong></del></span>
 
-  &lt;li id="M201601160"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201601160"&gt;
     &lt;p&gt;Microsoft</em></ins></span> has &lt;a
     
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake"&gt;desupported
     all future Intel CPUs for Windows 7 and 8&lt;/a&gt;. Those
@@ -492,8 +490,8 @@
 
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts"&gt;
       annoying advertisements inside of</strong></del></span> <span 
class="inserted"><ins><em>work on a particular
     program; the wrong here is Microsoft does this after having 
made</em></ins></span> the <span class="removed"><del><strong>File 
Explorer&lt;/a&gt; to nag</strong></del></span>
-    users <span class="inserted"><ins><em>dependent on Microsoft, because they 
are not free</em></ins></span> to <span class="removed"><del><strong>buy 
subscriptions</strong></del></span> <span class="inserted"><ins><em>ask anyone
-    else to work on the program</em></ins></span> for <span 
class="inserted"><ins><em>them.&lt;/p&gt;
+    users <span class="inserted"><ins><em>dependent on Microsoft, because they 
are not free to ask anyone
+    else</em></ins></span> to <span class="removed"><del><strong>buy 
subscriptions</strong></del></span> <span class="inserted"><ins><em>work on the 
program</em></ins></span> for <span class="inserted"><ins><em>them.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201306220"&gt;
@@ -521,15 +519,15 @@
   &lt;li&gt;&lt;p&gt;Microsoft
       &lt;a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml"&gt;is
         tricking
-        users&lt;/a&gt;</strong></del></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
+        users&lt;/a&gt; &lt;a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
 into replacing Windows 7 with Windows 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Microsoft has made companies' Windows machines managed by 
the
 company's
-sysadmins &lt;a 
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
+sysadmins</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
 users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
     subscribe</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>Office 365</em></ins></span> to <span 
class="removed"><del><strong>the sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>be able</em></ins></span> to <span 
class="removed"><del><strong>Windows
 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>create/edit documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;</em></ins></span>
@@ -738,7 +736,7 @@
     &lt;p&gt;Spyware in older versions of Windows: &lt;a
     
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
     Windows Update snoops on</em></ins></span> the <span 
class="removed"><del><strong>same malware would later be 
introduced</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. &lt;a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
     Windows 8.1 snoops on local searches&lt;/a&gt;. And there's a &lt;a
     href="http://www.marketoracle.co.uk/Article40836.html"&gt; secret NSA
     key</em></ins></span> in <span 
class="removed"><del><strong>MacOS.)&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/p&gt;
@@ -767,8 +765,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201210080"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
     Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
       <span 
class="removed"><del><strong>jail&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
     <span class="inserted"><ins><em>jail&lt;/a&gt;.&lt;/p&gt;
@@ -872,7 +870,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/06 09:30:53 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary/po/malware-microsoft.de.po      6 Mar 2019 09:30:53 -0000       
1.132
+++ proprietary/po/malware-microsoft.de.po      17 Mar 2019 10:32:40 -0000      
1.133
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -279,7 +279,7 @@
 # | [-<a
 # | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]Windows
 # | 8 also has a back door for {+<a
-# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | 
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
 # | remotely deleting apps</a>.
 #, fuzzy
 #| msgid ""
@@ -287,9 +287,9 @@
 #| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
 #| "has a back door for remotely deleting apps</a>."
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"https://www.computerworld.com/article/2500036/desktop-apps/";
 "microsoft--we-can-remotely-delete-windows-8-apps.html\" title=\"Microsoft: "
@@ -486,12 +486,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -812,11 +812,21 @@
 msgstr "Abonnements"
 
 #. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/";
 "article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
@@ -1201,7 +1211,7 @@
 # | 
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
 # | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
 # | 
[-href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
-# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
 # | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
 # | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>
 # | secret NSA key in Windows</a>, whose functions we don't know.
@@ -1217,11 +1227,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Spähprogramm in Windows: <a href=\"http://www.theregister.co.uk/2003/02/28/";
 "windows_update_keeps_tabs/\" title=\"Windows Update keeps tabs on all system "
@@ -1266,10 +1276,19 @@
 "Möglichkeit, den S-Modus auszuschalten."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"https://www.itworld.com/article/2832657/operating-systems/";
 "microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "

Index: proprietary/po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary/po/malware-microsoft.es.po      11 Mar 2019 10:12:09 -0000      
1.135
+++ proprietary/po/malware-microsoft.es.po      17 Mar 2019 10:32:40 -0000      
1.136
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 
 #. type: Content of: <title>
@@ -221,10 +222,19 @@
 "que la NSA acceda a los ordenadores con la ayuda de Microsoft."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# | 
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "Windows 8 también tiene una puerta trasera para <a href=\"http://www.";
 "computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-"
@@ -395,15 +405,38 @@
 "con Windows&nbsp;10</a>, y no puede deshabilitarse con facilidad."
 
 #. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "Tras <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -664,11 +697,21 @@
 msgstr "Suscripciones"
 
 #. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office obliga a los usuarios a <a href=\"https://www.computerworld.";
 "com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -929,14 +972,31 @@
 "\"> específicamente para espiar</a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Código espí­a en versiones antiguas de Windows: <a href=\"https://www.";
 "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"><i>Windows Update</"
@@ -975,10 +1035,19 @@
 "salir del modo S."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Windows 8 para «dispositivos móviles» (ya 
"

Index: proprietary/po/malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary/po/malware-microsoft.fr.po      6 Mar 2019 10:29:15 -0000       
1.153
+++ proprietary/po/malware-microsoft.fr.po      17 Mar 2019 10:32:40 -0000      
1.154
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-06 11:28+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -221,10 +222,19 @@
 "experts respectés en sécurité."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# | 
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
 "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 a aussi "
@@ -393,15 +403,38 @@
 "sous Windows 10</a> et ne peut pas être désactivé facilement."
 
 #. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -662,11 +695,21 @@
 msgstr "Abonnements"
 
 #. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office force ses utilisateurs <a href=\"https://www.computerworld.";
 "com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -928,14 +971,31 @@
 "user-data\">dans un but précis d'espionnage</a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Espions dans les anciennes versions de Windows : <a href=\"https://www.";
 "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
@@ -974,10 +1034,19 @@
 "mode S."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobiles 
» "

Index: proprietary/po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-microsoft.it-diff.html       6 Mar 2019 09:30:54 
-0000       1.36
+++ proprietary/po/malware-microsoft.it-diff.html       17 Mar 2019 10:32:40 
-0000      1.37
@@ -141,7 +141,7 @@
 
   &lt;li id="M201112080.1"&gt;
     &lt;p&gt;Windows 8</em></ins></span> also has a back door for <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You might well decide to let a security service that you trust
@@ -289,7 +289,7 @@
     on computers that were running</em></ins></span> Windows 7 and <span 
class="removed"><del><strong>8 cease to function on certain
       new computers,</strong></del></span> <span class="inserted"><ins><em>8, 
Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha"&gt;effectively
       forcing their owners</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
     repeatedly switched on a flag that urged users</em></ins></span> to <span 
class="removed"><del><strong>switch</strong></del></span>
     <span class="inserted"><ins><em>&ldquo;upgrade&rdquo;</em></ins></span> to 
Windows <span class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -297,9 +297,9 @@
   &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
    of Windows
    10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-   find that</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt; when</em></ins></span> they <span 
class="removed"><del><strong>are denied</strong></del></span> <span 
class="inserted"><ins><em>had turned
-    it off, in</em></ins></span> the <span 
class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>hope that some day they would fail</em></ins></span> 
to <span class="removed"><del><strong>cancel or even postpone the
-   imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
+   find that</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt; when</em></ins></span> they <span 
class="removed"><del><strong>are denied the option to cancel or even 
postpone</strong></del></span> <span class="inserted"><ins><em>had turned
+    it off, in</em></ins></span> the
+   <span class="removed"><del><strong>imposed date</strong></del></span> <span 
class="inserted"><ins><em>hope that some day they would fail to say no.
     To do this, Microsoft used &lt;a
     
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
     malware techniques&lt;/a&gt;.&lt;/p&gt;
@@ -519,7 +519,7 @@
 company's
 sysadmins</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html"&gt;harangue
 users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
     subscribe</em></ins></span> to <span 
class="removed"><del><strong>complain</strong></del></span> <span 
class="inserted"><ins><em>Office 365</em></ins></span> to <span 
class="removed"><del><strong>the sysadmins about not 
&ldquo;upgrading&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>be able</em></ins></span> to <span 
class="removed"><del><strong>Windows
 10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>create/edit documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;</em></ins></span>
@@ -733,7 +733,7 @@
     &lt;p&gt;Spyware in older versions of Windows: &lt;a
     
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
     Windows Update snoops on</em></ins></span> the <span 
class="removed"><del><strong>same malware would later be 
introduced</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. &lt;a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
     Windows 8.1 snoops on local searches&lt;/a&gt;. And there's a &lt;a
     href="http://www.marketoracle.co.uk/Article40836.html"&gt; secret NSA
     key</em></ins></span> in <span 
class="removed"><del><strong>MacOS.)&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/p&gt;
@@ -767,7 +767,7 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
     Windows 8 on &ldquo;mobile devices&rdquo; <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span 
class="removed"><del><strong>jail&lt;/a&gt;: it censors the
   user's choice of application 
programs.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
     <span class="inserted"><ins><em>jail&lt;/a&gt;.&lt;/p&gt;
@@ -862,7 +862,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary/po/malware-microsoft.it.po      6 Mar 2019 09:30:54 -0000       
1.138
+++ proprietary/po/malware-microsoft.it.po      17 Mar 2019 10:32:40 -0000      
1.139
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -261,7 +261,7 @@
 # | [-<a
 # | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]Windows
 # | 8 also has a back door for {+<a
-# | 
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | 
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
 # | remotely deleting apps</a>.
 #, fuzzy
 #| msgid ""
@@ -269,9 +269,9 @@
 #| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
 #| "has a back door for remotely deleting apps</a>."
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
 "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 ha anche "
@@ -461,12 +461,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -780,9 +780,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -1157,7 +1157,7 @@
 # | 
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>+}
 # | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
 # | 
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
-# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
 # | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
 # | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>
 # | secret NSA key in Windows</a>, whose functions we don't know.
@@ -1174,11 +1174,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/";
 "http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>Windows "
@@ -1208,7 +1208,7 @@
 #. type: Content of: <ul><li><p>
 # | <a
 # | 
[-href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown\";>-]
-# | 
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>+}
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
 # | Windows 8 on &ldquo;mobile devices&rdquo; [-is-] {+(now defunct) was+} a
 # | [-jail</a>: it censors the user's choice of application programs.-]
 # | {+jail</a>.+}
@@ -1218,9 +1218,9 @@
 #| "app-store-lockdown\"> Windows 8 on &ldquo;mobile devices&rdquo; is a "
 #| "jail</a>: it censors the user's choice of application programs."
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 "app-store-lockdown\">Windows 8 sui &ldquo;dispositivi mobili&rdquo; è una "

Index: proprietary/po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-microsoft.ja-diff.html       6 Mar 2019 09:30:54 
-0000       1.45
+++ proprietary/po/malware-microsoft.ja-diff.html       17 Mar 2019 10:32:40 
-0000      1.46
@@ -149,7 +149,7 @@
 
   &lt;li id="M201112080.1"&gt;
     &lt;p&gt;Windows 8</em></ins></span> also has a back door for <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
+    
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
     remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;You might well decide to let a security service that you trust
@@ -198,7 +198,7 @@
 &lt;h3 id="insecurity"&gt;Microsoft Insecurity&lt;/h3&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet</strong></del></span>
+    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and Edge&lt;/a&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;p&gt;These bugs are/were not intentional, 
so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -216,7 +216,7 @@
   &lt;li id="M201608020"&gt;
     &lt;p&gt;A &lt;a
     
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
-    in Internet</em></ins></span> Explorer and Edge&lt;/a&gt; allows an 
attacker to retrieve
+    in Internet Explorer and Edge&lt;/a&gt;</em></ins></span> allows an 
attacker to retrieve
     Microsoft account credentials, if the user is tricked into visiting
     a malicious link.&lt;/p&gt;
   &lt;/li&gt;
@@ -287,7 +287,7 @@
    <span class="removed"><del><strong>10,</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt;
     on computers that were running Windows 7 and 8, 
Microsoft</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
    find</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
     repeatedly switched on a flag</em></ins></span> that <span 
class="inserted"><ins><em>urged users to
     &ldquo;upgrade&rdquo; to Windows 10&lt;/a&gt; when</em></ins></span> they 
<span class="removed"><del><strong>are denied</strong></del></span> <span 
class="inserted"><ins><em>had turned
     it off, in</em></ins></span> the <span 
class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>hope that some day they would fail</em></ins></span> 
to <span class="removed"><del><strong>cancel or even postpone the
@@ -476,7 +476,7 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201507150"&gt;
     &lt;p&gt;Microsoft Office forces users &lt;a
-    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
     subscribe</em></ins></span> to <span class="removed"><del><strong>qualify 
 for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Microsoft committing
 interference.&lt;/p&gt;
@@ -712,7 +712,7 @@
     &lt;p&gt;Spyware in older versions of Windows: &lt;a
     
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
     Windows Update snoops on</em></ins></span> the <span 
class="removed"><del><strong>same malware would later be 
introduced</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. &lt;a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;
     Windows 8.1 snoops on local searches&lt;/a&gt;. And there's a &lt;a
     href="http://www.marketoracle.co.uk/Article40836.html"&gt; secret NSA
     key</em></ins></span> in <span 
class="removed"><del><strong>MacOS.)&lt;/p&gt;&lt;/li&gt;</strong></del></span> 
<span class="inserted"><ins><em>Windows&lt;/a&gt;, whose functions we don't 
know.&lt;/p&gt;
@@ -740,7 +740,7 @@
 
   &lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
     Windows 8 on &ldquo;mobile devices&rdquo; <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span 
class="removed"><del><strong>jail&lt;/a&gt;: it censors the
   user's choice of application 
programs.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
     <span class="inserted"><ins><em>jail&lt;/a&gt;.&lt;/p&gt;
@@ -836,7 +836,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary/po/malware-microsoft.ja.po      6 Mar 2019 09:30:54 -0000       
1.112
+++ proprietary/po/malware-microsoft.ja.po      17 Mar 2019 10:32:40 -0000      
1.113
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -237,9 +237,9 @@
 #| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
 #| "has a back door for remotely deleting apps</a>."
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/";
 
"microsoft--we-can-remotely-delete-windows-8-apps.html\">ウィンドウズ8もé
 éš”操"
@@ -395,12 +395,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -663,9 +663,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -958,11 +958,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "ウィンドウズ8のスパイウェア: <a href=\"https://web.archive.org/";
 "web/20160313105805/http://www.theregister.co.uk/2003/02/28/";
@@ -997,9 +997,9 @@
 #| "app-store-lockdown\"> Windows 8 on &ldquo;mobile devices&rdquo; is a "
 #| "jail</a>: it censors the user's choice of application programs."
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 
"app-store-lockdown\">「モバイルデバイス」のウィンドウズ8は牢獄です</a>:
 ユー"

Index: proprietary/po/malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/malware-microsoft.pot        6 Mar 2019 09:30:54 -0000       
1.76
+++ proprietary/po/malware-microsoft.pot        17 Mar 2019 10:32:40 -0000      
1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -164,7 +164,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Windows 8 also has a back door for <a "
-"href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>
 "
+"href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>
 "
 "remotely deleting apps</a>."
 msgstr ""
 
@@ -281,7 +281,7 @@
 "href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the "
 "download of Windows 10</a> on computers that were running Windows 7 and 8, "
 "Microsoft <a "
-"href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>
 "
+"href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>
 "
 "repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to "
 "Windows 10</a> when they had turned it off, in the hope that some day they "
 "would fail to say no.  To do this, Microsoft used <a "
@@ -454,7 +454,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a "
-"href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to
 "
+"href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to
 "
 "subscribe to Office 365 to be able to create/edit documents</a>."
 msgstr ""
 
@@ -631,7 +631,7 @@
 "Spyware in older versions of Windows: <a "
 "href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";> 
"
 "Windows Update snoops on the user</a>. <a "
-"href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>
 "
+"href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>
 "
 "Windows 8.1 snoops on local searches</a>. And there's a <a "
 "href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
 "Windows</a>, whose functions we don't know."
@@ -658,7 +658,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "<a "
-"href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>
 "
+"href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>
 "
 "Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>."
 msgstr ""
 

Index: proprietary/po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary/po/malware-microsoft.ru.po      6 Mar 2019 16:59:37 -0000       
1.198
+++ proprietary/po/malware-microsoft.ru.po      17 Mar 2019 10:32:40 -0000      
1.199
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-11-20 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -218,10 +219,19 @@
 "признанные эксперты по безопасности."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# | 
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "В Windows 8 есть также лазейка для <a 
href=\"http://www.computerworld.com/";
 "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
@@ -389,15 +399,38 @@
 "ее непросто."
 
 #. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "После <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -655,11 +688,21 @@
 msgstr "Подписка"
 
 #. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office принуждает пользователей <a 
href=\"https://www.";
 "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
@@ -919,14 +962,31 @@
 "user-data\"> специально для того, чтобы 
шпионить</a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Программы-шпионы в старых версиях Windows: <a 
href=\"https://www.theregister.";
 "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update 
подглядывает "
@@ -963,10 +1023,19 @@
 "состоит в том, что есть простой способ 
выйти из режима S."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 "app-store-lockdown\"> Windows 8 на &ldquo;мобильных 
устройствах&rdquo; (ныне "

Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-mobiles.de-diff.html 9 Mar 2019 17:02:55 -0000       
1.45
+++ proprietary/po/malware-mobiles.de-diff.html 17 Mar 2019 10:32:40 -0000      
1.46
@@ -1214,7 +1214,7 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
     Windows 8 <span class="removed"><del><strong>are tyrants&lt;/a&gt;. &lt;a
   
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows
   8</strong></del></span> on &ldquo;mobile devices&rdquo; <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span 
class="removed"><del><strong>jail.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
@@ -1295,7 +1295,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.de.po        9 Mar 2019 17:02:55 -0000       
1.102
+++ proprietary/po/malware-mobiles.de.po        17 Mar 2019 10:32:40 -0000      
1.103
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1979,10 +1979,19 @@
 msgstr "Smartphone-Gefängnisse"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"https://www.itworld.com/article/2832657/operating-systems/";
 "microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "

Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/malware-mobiles.es.po        11 Mar 2019 10:12:20 -0000      
1.110
+++ proprietary/po/malware-mobiles.es.po        17 Mar 2019 10:32:40 -0000      
1.111
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -1745,10 +1746,19 @@
 msgstr "Los móviles como prisiones"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Windows 8 en los «dispositivos móviles» 
(ya "

Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/malware-mobiles.fr.po        9 Mar 2019 18:22:39 -0000       
1.131
+++ proprietary/po/malware-mobiles.fr.po        17 Mar 2019 10:32:40 -0000      
1.132
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-09 19:11+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -1747,10 +1748,19 @@
 msgstr "Prisons"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobiles 
» "

Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/malware-mobiles.it-diff.html 9 Mar 2019 17:02:55 -0000       
1.50
+++ proprietary/po/malware-mobiles.it-diff.html 17 Mar 2019 10:32:40 -0000      
1.51
@@ -1241,7 +1241,7 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
     Windows 8 <span class="removed"><del><strong>are tyrants&lt;/a&gt;. &lt;a
   
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows
   8</strong></del></span> on &ldquo;mobile devices&rdquo; <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span 
class="removed"><del><strong>jail.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
@@ -1322,7 +1322,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.it.po        9 Mar 2019 17:02:55 -0000       
1.102
+++ proprietary/po/malware-mobiles.it.po        17 Mar 2019 10:32:40 -0000      
1.103
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1827,7 +1827,7 @@
 # | <a
 # | [-href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/\";>Mobile
 # | devices that come with-]
-# | 
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>+}
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
 # | Windows 8 [-are tyrants</a>. <a
 # | 
href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>Windows
 # | 8-] on &ldquo;mobile devices&rdquo; [-is-] {+(now defunct) was+} a
@@ -1840,9 +1840,9 @@
 #| "metro-app-store-lock-down.html\">Windows 8 on &ldquo;mobile "
 #| "devices&rdquo; is a jail.</a>"
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/\";>I "
 "dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>. <a "

Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/malware-mobiles.ja-diff.html 9 Mar 2019 17:02:55 -0000       
1.64
+++ proprietary/po/malware-mobiles.ja-diff.html 17 Mar 2019 10:32:40 -0000      
1.65
@@ -1086,7 +1086,7 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201210080"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
+    
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
     Windows 8 <span class="removed"><del><strong>are tyrants&lt;/a&gt;. &lt;a
   
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows
   8</strong></del></span> on &ldquo;mobile devices&rdquo; <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span 
class="removed"><del><strong>jail.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
@@ -1167,7 +1167,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/malware-mobiles.ja.po        9 Mar 2019 17:02:55 -0000       
1.90
+++ proprietary/po/malware-mobiles.ja.po        17 Mar 2019 10:32:40 -0000      
1.91
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1497,9 +1497,9 @@
 #| "metro-app-store-lock-down.html\">Windows 8 on &ldquo;mobile "
 #| "devices&rdquo; is a jail.</a>"
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a 
href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/\";>ウィン"
 
"ドウズ8と一緒に来るモバイル・デバイスは暴君です</a>。<a
 href=\"http://www.";

Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/malware-mobiles.pot  9 Mar 2019 17:02:55 -0000       1.68
+++ proprietary/po/malware-mobiles.pot  17 Mar 2019 10:32:40 -0000      1.69
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1168,7 +1168,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "<a "
-"href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>
 "
+"href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>
 "
 "Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>."
 msgstr ""
 

Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/malware-mobiles.ru.po        9 Mar 2019 18:05:21 -0000       
1.165
+++ proprietary/po/malware-mobiles.ru.po        17 Mar 2019 10:32:40 -0000      
1.166
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-12-02 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -1729,10 +1730,19 @@
 msgstr "Тюрьмы"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 "app-store-lockdown\"> Windows 8 на &ldquo;мобильных 
устройствах&rdquo; (ныне "

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/nl.po        13 Mar 2019 11:00:59 -0000      1.49
+++ proprietary/po/nl.po        17 Mar 2019 10:32:40 -0000      1.50
@@ -2301,9 +2301,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3327,9 +3327,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 
@@ -3803,9 +3803,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3931,12 +3931,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -4112,9 +4112,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -4288,11 +4288,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -4314,9 +4314,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -6887,13 +6887,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -6920,9 +6920,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 
 #. type: Content of: <title>

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/pl.po        13 Mar 2019 11:00:59 -0000      1.49
+++ proprietary/po/pl.po        17 Mar 2019 10:32:40 -0000      1.50
@@ -1870,9 +1870,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2874,9 +2874,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 
@@ -3305,9 +3305,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3410,12 +3410,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -3580,9 +3580,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3754,11 +3754,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3780,9 +3780,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -6396,13 +6396,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -6429,9 +6429,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 
 #. type: Content of: <title>

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/pot  13 Mar 2019 11:00:59 -0000      1.49
+++ proprietary/po/pot  17 Mar 2019 10:32:40 -0000      1.50
@@ -1732,9 +1732,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2710,9 +2710,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 
@@ -3131,9 +3131,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3236,12 +3236,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -3406,9 +3406,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3580,11 +3580,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3606,9 +3606,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -5886,13 +5886,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -5919,9 +5919,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-back-doors.de-diff.html  6 Mar 2019 09:30:54 
-0000       1.22
+++ proprietary/po/proprietary-back-doors.de-diff.html  17 Mar 2019 10:32:40 
-0000      1.23
@@ -164,7 +164,7 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;
     Some D-Link routers&lt;/a&gt; have a back door</em></ins></span> for <span 
class="removed"><del><strong>Macintosh &lt;a
       
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/"&gt;
       takes control</strong></del></span> <span 
class="inserted"><ins><em>changing settings in a
@@ -363,7 +363,8 @@
 
   &lt;li id="M201103070"&gt;</em></ins></span>
     &lt;p&gt;In Android, &lt;a
-    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+      <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;</em></ins></span>
     Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It was in a
     program called GTalkService, which seems since then to have been
     merged into Google Play.)&lt;/p&gt;
@@ -758,7 +759,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-back-doors.de.po 6 Mar 2019 09:30:54 -0000       
1.121
+++ proprietary/po/proprietary-back-doors.de.po 17 Mar 2019 10:32:40 -0000      
1.122
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -274,10 +274,20 @@
 "Smartphone und in Server-Konten ausschnüffeln, sondern auch ändern</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"//www.itworld.com/article/2705284/data-protection/backdoor-found-"
 "in-d-link-router-firmware-code.html\">Einige D-Link Router</a> haben eine "
@@ -610,7 +620,8 @@
 # <a href="#tn02" id="tn02-ref" class="transnote">[2]</a>
 #. type: Content of: <ul><li><p>
 # | In Android, <a
-# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
 # | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
 # | was in a program called GTalkService, which seems since then to have been
 # | merged into Google Play.)
@@ -622,9 +633,9 @@
 #| "GTalkService, which seems since then to have been merged into Google "
 #| "Play.)"
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"

Index: proprietary/po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-back-doors.fr.po 6 Mar 2019 10:29:15 -0000       
1.121
+++ proprietary/po/proprietary-back-doors.fr.po 17 Mar 2019 10:32:40 -0000      
1.122
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-06 11:28+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -232,10 +233,20 @@
 "security\">mais aussi les altérer</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> ont "
@@ -534,10 +545,23 @@
 "quelqu'un pour cela, et à qui."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "Dans Android, <a href=\"http://www.computerworld.com/article/2506557/";

Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/proprietary-back-doors.it-diff.html  6 Mar 2019 09:30:54 
-0000       1.49
+++ proprietary/po/proprietary-back-doors.it-diff.html  17 Mar 2019 10:32:40 
-0000      1.50
@@ -168,7 +168,7 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;
     Some D-Link routers&lt;/a&gt; have a</em></ins></span> back door <span 
class="removed"><del><strong>in the application 
processor,</strong></del></span> for
            <span class="removed"><del><strong>Xiaomi's use&lt;/a&gt;.&lt;/p&gt;
 
@@ -292,136 +292,135 @@
 
     &lt;p&gt;This seems to involve use of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
-    wiped</em></ins></span> a <span class="inserted"><ins><em>user's 
Kindle-Swindle and deleted her account&lt;/a&gt;, then
-    offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Do other ebook readers have</em></ins></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
-    don't know,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
+    wiped</em></ins></span> a <span class="removed"><del><strong>back door in 
Windows 7</strong></del></span> <span class="inserted"><ins><em>user's 
Kindle-Swindle</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Most mobile phones</strong></del></span> <span 
class="inserted"><ins><em>we</em></ins></span> have <span 
class="inserted"><ins><em>no way to find out.  There is no reason to
-    assume that they don't.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201011220"&gt;
-    &lt;p&gt;The iPhone has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, which has been used to</strong></del></span> 
<span class="inserted"><ins><em>door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+&lt;p&gt;Most mobile phones have a universal back door, which has been used to
+&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
 turn them malicious&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
-    enabling it without understanding.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
-    back <span class="removed"><del><strong>door&lt;/a&gt;. Nearly all
-models</strong></del></span> <span class="inserted"><ins><em>door that can 
make it cease to function&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article is full</em></ins></span> of <span 
class="removed"><del><strong>mobile phones</strong></del></span> <span 
class="inserted"><ins><em>confusions, errors and biases that 
we</em></ins></span> have
-    <span class="inserted"><ins><em>an obligation to expose, given that we are 
making</em></ins></span> a <span class="removed"><del><strong>universal back 
door</strong></del></span> <span class="inserted"><ins><em>link to 
them.&lt;/p&gt;
+A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
+models of mobile phones</strong></del></span> <span 
class="inserted"><ins><em>deleted her account&lt;/a&gt;, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
-    &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
-    any particular thing</em></ins></span> in <span 
class="inserted"><ins><em>its products. What it does enable</em></ins></span> 
the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
-    to <span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span> 
is <span class="removed"><del><strong>controlled
+    &lt;p&gt;Do other ebook readers</em></ins></span> have <span 
class="removed"><del><strong>a universal</strong></del></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>the modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
+    don't know, and we have no way</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
 by Coolpad.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Microsoft Windows has</strong></del></span> <span 
class="inserted"><ins><em>sue other companies if they do some particular thing 
in
-    their products.&lt;/li&gt;
-
-    &lt;li&gt;A company's policies about when to attack users 
through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back
-    door <span class="removed"><del><strong>through which
+&lt;p&gt;Microsoft Windows has a universal back door through which
 &lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on</strong></del></span> <span 
class="inserted"><ins><em>are beside</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.
+any change whatsoever can be imposed on the users&lt;/a&gt;.
 &lt;/p&gt;
 &lt;p&gt;More information on when
 &lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
 this was used&lt;/a&gt;.
 &lt;/p&gt;
-&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span 
class="removed"><del><strong>universal</strong></del></span> back door is <span 
class="removed"><del><strong>no longer hidden; all
+&lt;p&gt;In Windows 10, the universal back door</strong></del></span> <span 
class="inserted"><ins><em>find out.  There</em></ins></span> is no <span 
class="removed"><del><strong>longer hidden; all
 &ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>wrong in the
-    first place,</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+and immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-away from Windows 8 computers with TPM 2.0 due to potential back
-door capabilities of</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> the <span 
class="removed"><del><strong>TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span 
class="inserted"><ins><em>reason</em></ins></span> to <span 
class="removed"><del><strong>potential back
+door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The iPhone has a</strong></del></span> back door
-<span class="removed"><del><strong>&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is always wrong too. No software
-    developer should have</em></ins></span> that <span 
class="removed"><del><strong>allows Apple</strong></del></span> <span 
class="inserted"><ins><em>power over users.&lt;/li&gt;
+&lt;p&gt;The iPhone has a back door
+&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
+    <span class="inserted"><ins><em>assume</em></ins></span> that <span 
class="removed"><del><strong>allows Apple to remotely delete apps&lt;/a&gt; 
which Apple considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
+because of course we can trust Apple.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they 
don't.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;</em></ins></span>
+    &lt;p&gt;The iPhone has a back door for &lt;a
+    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+    enabling it without <span class="removed"><del><strong>understanding.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
+
+&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do</em></ins></span> some <span 
class="removed"><del><strong>data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should</em></ins></span> have <span 
class="removed"><del><strong>improved</strong></del></span> <span 
class="inserted"><ins><em>that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span 
class="inserted"><ins><em>refer</em></ins></span> to <span 
class="removed"><del><strong>have this power
-because</strong></del></span> <span class="inserted"><ins><em>sharing copies 
is a smear;
+    attacking ships. Using that word to refer to sharing copies is a smear;
     please don't smear sharing.&lt;/li&gt;
 
-    &lt;li&gt;&lt;p&gt;The idea</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The iPhone has</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is</em></ins></span> a 
<span class="removed"><del><strong>back door for</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
     that have nothing in common&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
-    generalization is a separate absurdity.</em></ins></span> It's <span 
class="removed"><del><strong>not always enabled, but 
users</strong></del></span> <span class="inserted"><ins><em>like calling the 
cops
-    because neighbors' kids</em></ins></span> are <span 
class="removed"><del><strong>led into enabling</strong></del></span> <span 
class="inserted"><ins><em>playing on your front yard, and saying
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
-    to the boundary line, not even with a jackhammer, 
because</em></ins></span> it <span class="removed"><del><strong>without 
understanding.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apple can,</strong></del></span> <span class="inserted"><ins><em>is 
an
-    abstraction</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>can't be affected by physical 
action.&lt;/p&gt;&lt;/li&gt;
+    to the boundary line, not even</em></ins></span> with <span 
class="inserted"><ins><em>a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -458,36 +457,28 @@
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;</em></ins></span>
-    &lt;p&gt;In Android, &lt;a
-    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+    &lt;p&gt;In Android, &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;</em></ins></span>
     Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> in a
     program called <span class="removed"><del><strong>GTalkService).
 &lt;/p&gt;
 
-&lt;p&gt;
-Google can also
-&lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
-seems,</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems</em></ins></span> since <span class="removed"><del><strong>that 
article,</strong></del></span> <span 
class="inserted"><ins><em>then</em></ins></span> to have been
-    merged into Google <span 
class="removed"><del><strong>Play).</strong></del></span> <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems since then to have been
+    merged into</em></ins></span> Google <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
 
-    &lt;p&gt;Google can also &lt;a
+    &lt;p&gt;Google</em></ins></span> can also &lt;a
     
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through 
GTalkService.</em></ins></span>  This is
-    not equivalent to a universal back <span 
class="removed"><del><strong>door, but permits various
-dirty tricks.
-&lt;/p&gt;
-
-&lt;p&gt;
-Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
+    forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
+seems, since</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.  This is
+    not equivalent to a universal back door, but permits various dirty
     tricks.&lt;/p&gt;
 
     &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-    malicious so far, the point is that nobody should have such power,
+    malicious so far, the point is</em></ins></span> that <span 
class="removed"><del><strong>article,</strong></del></span> <span 
class="inserted"><ins><em>nobody should have such power,
     which could also be used maliciously.  You might well decide to
     let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    it considers malicious.  But there is no excuse for allowing 
it</em></ins></span> to
+    <span class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt; the programs, 
and you should</em></ins></span> have <span class="removed"><del><strong>been 
merged</strong></del></span> <span class="inserted"><ins><em>the right to decide
     who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -518,8 +509,9 @@
     &lt;p&gt;The Furby Connect has a &lt;a
     
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    listening device, remote changes to the code could surely convert 
it</em></ins></span>
+    into <span class="removed"><del><strong>Google Play).
+This is</strong></del></span> <span class="inserted"><ins><em>one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711010"&gt;
@@ -537,9 +529,9 @@
     this limit.&lt;/p&gt;
 
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
-    whole battery capacity did not do them any harm, the same back
+    whole battery capacity did</em></ins></span> not <span 
class="removed"><del><strong>equivalent</strong></del></span> <span 
class="inserted"><ins><em>do them any harm, the same back
     door would permit Tesla (perhaps under the command of some
-    government) to remotely order the car to use none of its battery. Or
+    government) to remotely order the car</em></ins></span> to <span 
class="inserted"><ins><em>use none of its battery. Or
     perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -592,7 +584,12 @@
   &lt;li id="M201412180"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-    A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
+    A Chinese version of Android has</em></ins></span> a universal back <span 
class="removed"><del><strong>door, but permits various
+dirty tricks.
+&lt;/p&gt;
+
+&lt;p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;. Nearly
     all models</em></ins></span> of <span class="removed"><del><strong>this 
power has not been
 malicious so far, the point is that nobody should</strong></del></span> <span 
class="inserted"><ins><em>mobile phones</em></ins></span> have <span 
class="removed"><del><strong>such power,
 which could also be used maliciously.  You might well decide to 
let</strong></del></span> a
@@ -688,8 +685,8 @@
     &lt;p&gt;Dell computers, shipped with
     Windows, had a bogus root certificate</em></ins></span> that <span 
class="removed"><del><strong>would give access</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;
-    allowed anyone (not just Dell)</em></ins></span> to <span 
class="inserted"><ins><em>remotely authorize any software to
-    run&lt;/a&gt; on</em></ins></span> the
+    allowed anyone (not just Dell) to remotely authorize any 
software</em></ins></span> to
+    <span class="inserted"><ins><em>run&lt;/a&gt; on</em></ins></span> the
 <span class="removed"><del><strong>customer's data.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -833,7 +830,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/proprietary-back-doors.it.po 6 Mar 2019 09:30:54 -0000       
1.114
+++ proprietary/po/proprietary-back-doors.it.po 17 Mar 2019 10:32:40 -0000      
1.115
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -269,10 +269,20 @@
 "modificare</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\"> Alcuni router D-Link</a> hanno "
@@ -611,7 +621,8 @@
 
 #. type: Content of: <ul><li><p>
 # | In Android, <a
-# | 
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
 # | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
 # | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
 # | which seems since then to have been merged into Google Play.)+}
@@ -622,9 +633,9 @@
 #| "has a back door to remotely delete apps.</a> (It is in a program called "
 #| "GTalkService)."
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";

Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-back-doors.ja-diff.html  6 Mar 2019 09:30:54 
-0000       1.45
+++ proprietary/po/proprietary-back-doors.ja-diff.html  17 Mar 2019 10:32:40 
-0000      1.46
@@ -167,7 +167,7 @@
 
   &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
+    
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html"&gt;
     Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
     dlink of an eye.&lt;/p&gt;
 
@@ -240,240 +240,197 @@
     remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>books erased 
was
+    &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
+
+    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>criticism by saying it
+    would delete books only following orders from</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
      remotely.&lt;/p&gt;
   &lt;/li&gt;
 &lt;li&gt;&lt;p&gt;
-Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local back door for 4 years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
-    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft</strong></del></span> <span class="inserted"><ins><em>books 
erased</em></ins></span> was <span class="removed"><del><strong>forcing 
them</strong></del></span>
-    <span class="inserted"><ins><em>&lt;cite&gt;1984&lt;/cite&gt;, by George 
Orwell.&lt;/p&gt;
-
-    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Microsoft was in fact &lt;a 
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span class="inserted"><ins><em>criticism by saying 
it
-    would delete books only following orders from the
-    state.  However,</em></ins></span> that <span 
class="removed"><del><strong>said whether to &ldquo;upgrade&rdquo; to Windows 
10 when users 
-    had turned</strong></del></span> <span class="inserted"><ins><em>policy 
didn't last.  In 2012</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions 
on</strong></del></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This seems to involve use of</strong></del></span>
+Mac OS X had an</strong></del></span>
+    <span class="inserted"><ins><em>state.  However, that policy didn't last.  
In 2012 it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
-    wiped</em></ins></span> a <span class="inserted"><ins><em>user's 
Kindle-Swindle and deleted her account&lt;/a&gt;, then
+    wiped a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Do other ebook readers have</em></ins></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
-    don't know,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Most mobile phones</strong></del></span> <span 
class="inserted"><ins><em>we</em></ins></span> have <span 
class="inserted"><ins><em>no way to find out.  There is no reason to
+    &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
+    don't know, and we have no way to find out.  There is no reason to
     assume that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201011220"&gt;
-    &lt;p&gt;The iPhone has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, which has been used to</strong></del></span> 
<span class="inserted"><ins><em>door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;The iPhone has a</em></ins></span> back door for <span 
class="removed"><del><strong>4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported that</strong></del></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
-    enabling it without understanding.&lt;/p&gt;</em></ins></span>
+    enabling it without understanding.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
-    back <span class="removed"><del><strong>door&lt;/a&gt;. Nearly all
-models</strong></del></span> <span class="inserted"><ins><em>door that can 
make it cease to function&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article is full</em></ins></span> of <span 
class="removed"><del><strong>mobile phones</strong></del></span> <span 
class="inserted"><ins><em>confusions, errors and biases that 
we</em></ins></span> have
-    <span class="inserted"><ins><em>an obligation to expose, given that we are 
making</em></ins></span> a <span class="removed"><del><strong>universal back 
door</strong></del></span> <span class="inserted"><ins><em>link to 
them.&lt;/p&gt;
+    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door</em></ins></span> that <span class="removed"><del><strong>run 
Windows 7</strong></del></span> <span class="inserted"><ins><em>can make it 
cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors</em></ins></span> and 
<span class="removed"><del><strong>8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span 
class="inserted"><ins><em>biases</em></ins></span> that <span 
class="removed"><del><strong>said whether</strong></del></span> <span 
class="inserted"><ins><em>we have
+    an obligation</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>expose, given that we are making a 
link</em></ins></span> to <span class="removed"><del><strong>Windows 10 when 
users 
+    had turned it off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
 
     &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
-    any particular thing</em></ins></span> in <span 
class="inserted"><ins><em>its products. What it does enable</em></ins></span> 
the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
-    to <span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span> 
is <span class="removed"><del><strong>controlled
-by Coolpad.
-&lt;/p&gt;
-&lt;/li&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a 
company</em></ins></span> to <span class="removed"><del><strong>permanently 
reject</strong></del></span> <span class="inserted"><ins><em>do
+    any particular thing in its products. What it does 
enable</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
+    to <span class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;Microsoft Windows has</strong></del></span> <span 
class="inserted"><ins><em>sue other companies if they do some particular thing 
in
+    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>do is sue other companies if they do some particular 
thing in
     their products.&lt;/li&gt;
 
-    &lt;li&gt;A company's policies about when to attack users 
through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back
-    door <span class="removed"><del><strong>through which
-&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on</strong></del></span> <span 
class="inserted"><ins><em>are beside</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when
-&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-this was used&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span 
class="removed"><del><strong>universal</strong></del></span> back door is <span 
class="removed"><del><strong>no longer hidden; all
-&ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>wrong in the
-    first place,</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
-&lt;/p&gt;
+    &lt;li&gt;A company's policies about when</em></ins></span> to <span 
class="removed"><del><strong>involve use of</strong></del></span> <span 
class="inserted"><ins><em>attack users through</em></ins></span> a back
+    door <span class="inserted"><ins><em>are beside the point. Inserting the 
back door is wrong</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>the
+    first place,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Windows 8's</strong></del></span> <span 
class="inserted"><ins><em>using the</em></ins></span> back <span 
class="removed"><del><strong>doors are so gaping</strong></del></span> <span 
class="inserted"><ins><em>door is always wrong too. No software
-    developer should have</em></ins></span> that <span 
class="inserted"><ins><em>power over users.&lt;/li&gt;
+&lt;p&gt;Most mobile phones have a universal</strong></del></span> <span 
class="inserted"><ins><em>using the</em></ins></span> back <span 
class="removed"><del><strong>door, which has been used</strong></del></span> 
<span class="inserted"><ins><em>door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word to refer to sharing copies is a smear;
+    attacking ships. Using that word</em></ins></span> to <span 
class="inserted"><ins><em>refer to sharing copies is a smear;
     please don't smear sharing.&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is a</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
+    total confusion. The term &ldquo;IP&rdquo; itself is a</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
     that have nothing in common&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
-    generalization is a separate absurdity. It's like 
calling</em></ins></span> the <span class="removed"><del><strong>German 
government has decided</strong></del></span> <span 
class="inserted"><ins><em>cops
+    generalization is a separate absurdity. It's like calling the cops
     because neighbors' kids are playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
-    to the boundary line, not even with a jackhammer, 
because</em></ins></span> it <span class="inserted"><ins><em>is an
-    abstraction and</em></ins></span> can't be <span 
class="removed"><del><strong>trusted&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>affected by 
physical action.&lt;/p&gt;&lt;/li&gt;
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The iPhone has a back door
-&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>allows Apple</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok</strong></del></span> <span 
class="inserted"><ins><em>the article</em></ins></span> for <span 
class="removed"><del><strong>Apple to have this power
-because</strong></del></span> <span class="inserted"><ins><em>the facts it 
presents. It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>surrendering 
to Netflix. The Netflix app &lt;a
+    moral weakness</em></ins></span> of <span 
class="inserted"><ins><em>surrendering to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The iPhone</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a back door <span class="removed"><del><strong>for
-&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
-it without understanding.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,
-    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for the state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
+  &lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary</em></ins></span> Android <span 
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door&lt;/a&gt;. Nearly all
+models of mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>door that &lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is used by 14,000 Android 
applications.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+  &lt;li id="M201112080"&gt;
     &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;,</em></ins></span> Windows 8 <span 
class="removed"><del><strong>also</strong></del></span> has a back door for 
<span class="inserted"><ins><em>&lt;a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
-    remotely deleting <span class="removed"><del><strong>apps&lt;/a&gt;.
-&lt;/p&gt;
+    door&lt;/a&gt;, Windows 8 has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>for &lt;a
+    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+    remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;
-You</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;You</em></ins></span> might well decide to let a security service 
that you trust
+    &lt;p&gt;You might well decide</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>let a security 
service that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
-    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
-    should have the right to decide <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this 
<span class="removed"><del><strong>way.
-&lt;/p&gt;
-
-&lt;p&gt;
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+    But there</em></ins></span> is <span 
class="removed"><del><strong>controlled
+by Coolpad.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>no excuse for 
&lt;em&gt;deleting&lt;/em&gt; the programs, and you
+    should have the right to decide whom (if anyone) to trust in this
+    way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Microsoft Windows</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;
     &lt;p&gt;In Android, &lt;a
-    
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> in a
-    program called <span class="removed"><del><strong>GTalkService).
-&lt;/p&gt;
+    
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"&gt;
+    Google</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>to remotely delete apps&lt;/a&gt;. (It was in a
+    program called GTalkService,</em></ins></span> which
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever</strong></del></span> <span 
class="inserted"><ins><em>seems since then to have been
+    merged into Google Play.)&lt;/p&gt;
 
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems since then to have been
-    merged into</em></ins></span> Google <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
-
-    &lt;p&gt;Google</em></ins></span> can also &lt;a
-    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google 
Play).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.</em></ins></span>  This is
-    not equivalent to a universal back door, but permits various dirty <span 
class="removed"><del><strong>tricks.
+    &lt;p&gt;Google</em></ins></span> can <span 
class="removed"><del><strong>be imposed on the users&lt;/a&gt;.
 &lt;/p&gt;
+&lt;p&gt;More information on when</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10, the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
+    not equivalent to a</em></ins></span> universal back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
+    tricks.&lt;/p&gt;
+
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
+    malicious so far, the point</em></ins></span> is <span 
class="removed"><del><strong>no longer hidden; all
+&ldquo;upgrades&rdquo; will</strong></del></span> <span 
class="inserted"><ins><em>that nobody should have such power,
+    which could also</em></ins></span> be <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
+and immediately imposed&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;
-Although</strong></del></span>
-    <span class="inserted"><ins><em>tricks.&lt;/p&gt;
-
-    &lt;p&gt;Although</em></ins></span> Google's &lt;em&gt;exercise&lt;/em&gt; 
of this power has not been
-    malicious so far, the point is that nobody should have such power,
-    which could also be used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for allowing it to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span>
-    <span class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt; the programs, 
and you should have the right to decide
-    who (if anyone) to trust in this way.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;Windows 8's back doors are so gaping</strong></del></span> <span 
class="inserted"><ins><em>used maliciously.  You might well decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; 
programs</em></ins></span> that
+<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
+the German government has decided</strong></del></span>
+    it <span class="removed"><del><strong>can't be trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>considers 
malicious.  But there is no excuse for allowing it to
+    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
+    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200808110"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
     &lt;p&gt;The iPhone has a back door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
     that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
-    this power because of course we can trust Apple.&lt;/p&gt;
+    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
+    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The iPhone has</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
@@ -482,82 +439,136 @@
   &lt;li id="M201812300"&gt;
     &lt;p&gt;New GM cars &lt;a
     href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
+    offer the feature of</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;Every nonfree program offers the user zero security against its
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Every nonfree program offers</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8</strong></del></span> <span class="inserted"><ins><em>user 
zero</em></ins></span> security <span 
class="removed"><del><strong>improvements&lt;/a&gt;; but</strong></del></span> 
<span class="inserted"><ins><em>against its
     developer. With this malfeature, GM has explicitly made things even
     worse.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
     listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711010"&gt;
-    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+Windows 8 also</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711010"&gt;
+    &lt;p&gt;Sony</em></ins></span> has <span 
class="inserted"><ins><em>brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered to a server that requires
+    with</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door for remotely deleting apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You might well decide</strong></del></span> <span 
class="inserted"><ins><em>door, and tethered</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> a <span 
class="removed"><del><strong>security service that you trust
+remotely &lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> that <span 
class="removed"><del><strong>it considers malicious.
+But there is no excuse for &lt;em&gt;deleting&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709090.1"&gt;
-    &lt;p&gt;Tesla used software to limit the part of the battery
-    that was available to customers in some cars, and &lt;a
+    &lt;p&gt;Tesla used software to limit</em></ins></span> the <span 
class="removed"><del><strong>programs, and you
+should have</strong></del></span> <span class="inserted"><ins><em>part 
of</em></ins></span> the <span class="removed"><del><strong>right to decide who 
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
+    that was available</em></ins></span> to <span 
class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
-    a universal back door in the software&lt;/a&gt; to temporarily increase
-    this limit.&lt;/p&gt;
+    a universal back door</em></ins></span> in <span 
class="inserted"><ins><em>the software&lt;/a&gt; to temporarily 
increase</em></ins></span>
+    this <span class="removed"><del><strong>way.
+&lt;/p&gt;
 
-    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
+&lt;p&gt;
+As these pages show, if you do want</strong></del></span> <span 
class="inserted"><ins><em>limit.&lt;/p&gt;
+
+    &lt;p&gt;While remotely allowing car 
&ldquo;owners&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>clean your computer</strong></del></span> <span 
class="inserted"><ins><em>use the
     whole battery capacity did not do them any harm, the same back
-    door would permit Tesla (perhaps under the command of some
-    government) to remotely order the car to use none of its battery. Or
-    perhaps to drive its passenger to a torture prison.&lt;/p&gt;
+    door would permit Tesla (perhaps under the command</em></ins></span> of 
<span class="removed"><del><strong>malware,</strong></del></span> <span 
class="inserted"><ins><em>some
+    government) to remotely order</em></ins></span> the <span 
class="removed"><del><strong>first software</strong></del></span> <span 
class="inserted"><ins><em>car</em></ins></span> to <span 
class="removed"><del><strong>delete is Windows or iOS.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use none of 
its battery. Or
+    perhaps to drive its passenger to a torture 
prison.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201702060.1"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
-    have a universal back door&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;In Android,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201702060.1"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
+Google has</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
+    have</em></ins></span> a <span class="inserted"><ins><em>universal back 
door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
     
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
-    a universal back door in the application processor, for Xiaomi's
+    a universal</em></ins></span> back door <span 
class="removed"><del><strong>to remotely delete apps.&lt;/a&gt;  
(It</strong></del></span> <span class="inserted"><ins><em>in the application 
processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
+    &lt;p&gt;This</em></ins></span> is <span 
class="inserted"><ins><em>separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door</em></ins></span> in <span 
class="inserted"><ins><em>the modem processor that the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft
-    Windows has a universal back door through which &lt;a
+    Windows has</em></ins></span> a <span class="removed"><del><strong>program
+called GTalkService).
+&lt;/p&gt;
+
+&lt;p&gt;
+Google</strong></del></span> <span class="inserted"><ins><em>universal back 
door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
-    any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
+    any change whatsoever</em></ins></span> can <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>be imposed on the users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This was &lt;a
-    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
-    that Microsoft used the same method to push the &lt;a
+    &lt;p&gt;This was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+forcibly</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+    reported in 2007&lt;/a&gt; for XP</em></ins></span> and <span 
class="removed"><del><strong>remotely install apps&lt;/a&gt; through 
GTalkService (which
+seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and 
it seems</em></ins></span>
+    that <span class="removed"><del><strong>article,</strong></del></span> 
<span class="inserted"><ins><em>Microsoft used the same 
method</em></ins></span> to <span class="removed"><del><strong>have been merged 
into Google Play).
+This is not equivalent</strong></del></span> <span 
class="inserted"><ins><em>push the &lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
-    Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
+    Windows 10 downgrade&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>computers running Windows 7 and 8.&lt;/p&gt;
 
-    &lt;p&gt;In Windows 10,</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>universal back door
-    is no longer hidden; all &ldquo;upgrades&rdquo; will be &lt;a
+    &lt;p&gt;In Windows 10, the</em></ins></span> universal back <span 
class="removed"><del><strong>door, but permits various
+dirty tricks.
+&lt;/p&gt;
+
+&lt;p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
+malicious so far, the point</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span>
+    is <span class="removed"><del><strong>that nobody should have such power,
+which could also</strong></del></span> <span class="inserted"><ins><em>no 
longer hidden; all &ldquo;upgrades&rdquo; will</em></ins></span> be <span 
class="removed"><del><strong>used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;
-    forcibly</em></ins></span> and <span class="removed"><del><strong>you 
should</strong></del></span> <span class="inserted"><ins><em>immediately 
imposed&lt;/a&gt;.&lt;/p&gt;
+    forcibly and immediately imposed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606060"&gt;
-    &lt;p&gt;The Amazon Echo appears to have a universal back door, since &lt;a
-    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
-    it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon Echo appears</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>have</em></ins></span> a
+<span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
+considers malicious.  But there is no excuse for 
allowing</strong></del></span> <span class="inserted"><ins><em>universal back 
door, since &lt;a
+    
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;</em></ins></span>
+    it
+<span class="removed"><del><strong>to &lt;em&gt;delete&lt;/em&gt; the 
programs, and you should</strong></del></span> <span 
class="inserted"><ins><em>installs &ldquo;updates&rdquo; 
automatically&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We</em></ins></span> have <span class="inserted"><ins><em>found 
nothing explicitly documenting</em></ins></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>lack of any way</em></ins></span>
     to
@@ -658,8 +669,8 @@
     &lt;p&gt;Dell computers, shipped with
     Windows, had a bogus root certificate</em></ins></span> that <span 
class="removed"><del><strong>would give access</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;
-    allowed anyone (not just Dell)</em></ins></span> to <span 
class="inserted"><ins><em>remotely authorize any software to
-    run&lt;/a&gt; on</em></ins></span> the
+    allowed anyone (not just Dell) to remotely authorize any 
software</em></ins></span> to
+    <span class="inserted"><ins><em>run&lt;/a&gt; on</em></ins></span> the
 <span class="removed"><del><strong>customer's data.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -803,7 +814,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/proprietary-back-doors.ja.po 6 Mar 2019 09:30:54 -0000       
1.93
+++ proprietary/po/proprietary-back-doors.ja.po 17 Mar 2019 10:32:40 -0000      
1.94
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -197,10 +197,15 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/darticle/2705284/data-protection/backdoor-";
 
"found-d-link-router-firmware-code.html\">いくつかのD-Linkのルータ</a>はバック"
@@ -510,9 +515,9 @@
 #| "has a back door to remotely delete apps.</a> (It is in a program called "
 #| "GTalkService)."
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "アンドロイドでは<a 
href=\"http://www.computerworld.com/article/2506557/";

Index: proprietary/po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary-back-doors.pot   6 Mar 2019 09:30:54 -0000       
1.63
+++ proprietary/po/proprietary-back-doors.pot   17 Mar 2019 10:32:40 -0000      
1.64
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -168,7 +168,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "<a "
-"href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>
 "
+"href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>
 "
 "Some D-Link routers</a> have a back door for changing settings in a dlink of "
 "an eye."
 msgstr ""
@@ -370,7 +370,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "In Android, <a "
-"href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>
 "
+"href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>
 "
 "Google has a back door to remotely delete apps</a>. (It was in a program "
 "called GTalkService, which seems since then to have been merged into Google "
 "Play.)"

Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/proprietary-back-doors.ru.po 6 Mar 2019 16:59:37 -0000       
1.168
+++ proprietary/po/proprietary-back-doors.ru.po 17 Mar 2019 10:32:41 -0000      
1.169
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -226,10 +227,20 @@
 "в учетных записях сервера, оно может и 
подменять их</a>."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\">В некоторых 
маршрутизаторах D-"
@@ -521,10 +532,23 @@
 "вообще)."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "В Android <a href=\"http://www.computerworld.com/article/2506557/security0/";

Index: proprietary/po/proprietary-interference.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-interference.de-diff.html        11 Feb 2019 
12:59:22 -0000      1.21
+++ proprietary/po/proprietary-interference.de-diff.html        17 Mar 2019 
10:32:41 -0000      1.22
@@ -188,7 +188,7 @@
 <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"&gt;
 nagging users obnoxiously</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing
 the download of Windows 10&lt;/a&gt;
     on computers that were running Windows 7</em></ins></span> and <span 
class="inserted"><ins><em>8, Microsoft &lt;a
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;</em></ins></span>
+    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;</em></ins></span>
     repeatedly <span class="inserted"><ins><em>switched on a flag that urged 
users to
     &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>install</strong></del></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
@@ -338,7 +338,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-interference.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-interference.de.po       11 Feb 2019 12:59:22 
-0000      1.59
+++ proprietary/po/proprietary-interference.de.po       17 Mar 2019 10:32:41 
-0000      1.60
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -254,12 +254,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-interference.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-interference.fr.po       12 Feb 2019 10:46:00 
-0000      1.73
+++ proprietary/po/proprietary-interference.fr.po       17 Mar 2019 10:32:41 
-0000      1.74
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-02-11 19:48+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: \n"
 
 #. type: Content of: <title>
@@ -267,15 +268,38 @@
 "sous Windows 10</a> et ne peut pas être désactivé facilement."
 
 #. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"

Index: proprietary/po/proprietary-interference.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-interference.ja-diff.html        11 Feb 2019 
12:59:23 -0000      1.30
+++ proprietary/po/proprietary-interference.ja-diff.html        17 Mar 2019 
10:32:41 -0000      1.31
@@ -179,7 +179,7 @@
 
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
 into replacing</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;forcing
 the download of Windows 10&lt;/a&gt;
     on computers that were running</em></ins></span> Windows 7 <span 
class="removed"><del><strong>with</strong></del></span> <span 
class="inserted"><ins><em>and 8, Microsoft &lt;a
-    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
     repeatedly switched on a flag that urged users to
     &ldquo;upgrade&rdquo; to</em></ins></span> Windows <span 
class="removed"><del><strong>10&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
@@ -324,7 +324,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/11 12:59:23 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-interference.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-interference.ja.po       11 Feb 2019 12:59:23 
-0000      1.54
+++ proprietary/po/proprietary-interference.ja.po       17 Mar 2019 10:32:41 
-0000      1.55
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:53+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -201,12 +201,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-interference.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.pot,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/proprietary-interference.pot 11 Feb 2019 12:59:23 -0000      
1.35
+++ proprietary/po/proprietary-interference.pot 17 Mar 2019 10:32:41 -0000      
1.36
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -187,7 +187,7 @@
 "href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the "
 "download of Windows 10</a> on computers that were running Windows 7 and 8, "
 "Microsoft <a "
-"href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>
 "
+"href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>
 "
 "repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to "
 "Windows 10</a> when they had turned it off, in the hope that some day they "
 "would fail to say no.  To do this, Microsoft used <a "

Index: proprietary/po/proprietary-interference.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary/po/proprietary-interference.ru.po       25 Feb 2019 09:37:05 
-0000      1.92
+++ proprietary/po/proprietary-interference.ru.po       17 Mar 2019 10:32:41 
-0000      1.93
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-10-14 06:11+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -269,15 +270,38 @@
 "ее непросто."
 
 #. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "После <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"

Index: proprietary/po/proprietary-jails.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-jails.de-diff.html       5 Jan 2019 11:31:35 
-0000       1.22
+++ proprietary/po/proprietary-jails.de-diff.html       17 Mar 2019 10:32:41 
-0000      1.23
@@ -255,8 +255,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201210080"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a
-    
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;
+    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;</em></ins></span>
     Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a
       <span 
class="removed"><del><strong>jail&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;</strong></del></span>
     <span class="inserted"><ins><em>jail&lt;/a&gt;.&lt;/p&gt;
@@ -328,7 +328,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/proprietary-jails.de.po      5 Jan 2019 11:31:35 -0000       
1.50
+++ proprietary/po/proprietary-jails.de.po      17 Mar 2019 10:32:41 -0000      
1.51
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -391,10 +391,19 @@
 "Möglichkeit, den S-Modus auszuschalten."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"https://www.itworld.com/article/2832657/operating-systems/";
 "microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "

Index: proprietary/po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-jails.es.po      18 Jan 2019 12:43:25 -0000      
1.48
+++ proprietary/po/proprietary-jails.es.po      17 Mar 2019 10:32:41 -0000      
1.49
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-01-18 13:37+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -365,10 +366,19 @@
 "salir del modo S."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Windows 8 para «dispositivos móviles» (ya 
"

Index: proprietary/po/proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/proprietary-jails.fr.po      5 Jan 2019 16:13:44 -0000       
1.55
+++ proprietary/po/proprietary-jails.fr.po      17 Mar 2019 10:32:41 -0000      
1.56
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-01-05 17:13+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 
 #. type: Content of: <title>
@@ -359,10 +360,19 @@
 "mode S."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobiles 
» "

Index: proprietary/po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-jails.it-diff.html       5 Jan 2019 11:31:35 
-0000       1.30
+++ proprietary/po/proprietary-jails.it-diff.html       17 Mar 2019 10:32:41 
-0000      1.31
@@ -322,7 +322,7 @@
   <span class="inserted"><ins><em>&lt;li id="M201210080"&gt;</em></ins></span>
     &lt;p&gt;&lt;a
 <span 
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;
     Windows</em></ins></span> 8 on &ldquo;mobile devices&rdquo; <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span 
class="removed"><del><strong>jail.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>jail&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -401,7 +401,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-jails.it.po      5 Jan 2019 11:31:35 -0000       
1.54
+++ proprietary/po/proprietary-jails.it.po      17 Mar 2019 10:32:41 -0000      
1.55
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:15+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -462,8 +462,9 @@
 
 #. type: Content of: <ul><li><p>
 # | <a
-# | 
href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>{+
-# | +}Windows 8 on &ldquo;mobile devices&rdquo; [-is-] {+(now defunct) was+} a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>Windows-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>
+# | Windows+} 8 on &ldquo;mobile devices&rdquo; [-is-] {+(now defunct) was+} a
 # | [-jail.</a>-] {+jail</a>.+}
 #, fuzzy
 #| msgid ""
@@ -471,9 +472,9 @@
 #| "microsoft-metro-app-store-lock-down.html\">Windows 8 on &ldquo;mobile "
 #| "devices&rdquo; is a jail.</a>"
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 "metro-app-store-lock-down.html\">Windows 8 sui &ldquo;dispositivi "

Index: proprietary/po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/proprietary-jails.ja-diff.html       5 Jan 2019 11:31:35 
-0000       1.29
+++ proprietary/po/proprietary-jails.ja-diff.html       17 Mar 2019 10:32:41 
-0000      1.30
@@ -233,7 +233,7 @@
   &lt;li id="M201210080"&gt;</em></ins></span>
     &lt;p&gt;&lt;a
 <span 
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;Windows</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"&gt;
     Windows</em></ins></span> 8 on &ldquo;mobile devices&rdquo; <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span 
class="removed"><del><strong>jail.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>jail&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -312,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-jails.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-jails.ja.po      5 Jan 2019 11:31:35 -0000       
1.42
+++ proprietary/po/proprietary-jails.ja.po      17 Mar 2019 10:32:41 -0000      
1.43
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:28+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -369,9 +369,9 @@
 #| "microsoft-metro-app-store-lock-down.html\">Windows 8 on &ldquo;mobile "
 #| "devices&rdquo; is a jail.</a>"
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
 
"metro-app-store-lockdown\">「モバイル・デバイス」上のウィンドウズ8は牢獄で"

Index: proprietary/po/proprietary-jails.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pot,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-jails.pot        5 Jan 2019 11:31:35 -0000       
1.26
+++ proprietary/po/proprietary-jails.pot        17 Mar 2019 10:32:41 -0000      
1.27
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -251,7 +251,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "<a "
-"href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>
 "
+"href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>
 "
 "Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary-jails.ru.po      25 Feb 2019 09:37:05 -0000      
1.74
+++ proprietary/po/proprietary-jails.ru.po      17 Mar 2019 10:32:41 -0000      
1.75
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-01-29 19:55+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Jails - GNU Project - Free Software Foundation"
@@ -357,10 +358,19 @@
 "состоит в том, что есть простой способ 
выйти из режима S."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 "app-store-lockdown\"> Windows 8 на &ldquo;мобильных 
устройствах&rdquo; (ныне "

Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-sabotage.de-diff.html    20 Feb 2019 15:30:47 
-0000      1.30
+++ proprietary/po/proprietary-sabotage.de-diff.html    17 Mar 2019 10:32:41 
-0000      1.31
@@ -462,7 +462,7 @@
     &lt;p&gt;Apple forced millions</em></ins></span> of <span 
class="removed"><del><strong>a back door in Windows 7 and 8.
 &lt;/p&gt;&lt;/li&gt;
 
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iThings to</em></ins></span> &lt;a
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iThings to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://discussions.apple.com/thread/7256669?tstart=0"&gt;download
     a system upgrade without asking the users&lt;/a&gt;. Apple did not
     forcibly install the upgrade but the downloading alone caused lots
@@ -470,8 +470,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201509220"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
-    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</em></ins></span>
     Lenovo stealthily installed crapware and spyware via
     BIOS&lt;/a&gt; on Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -677,7 +677,7 @@
 
     &lt;p&gt;In 2014, &lt;a
 <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;Oracle</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;
     Oracle</em></ins></span> insisted on continuing this <span 
class="removed"><del><strong>practice.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>practice&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -764,7 +764,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary/po/proprietary-sabotage.de.po   20 Feb 2019 15:30:47 -0000      
1.112
+++ proprietary/po/proprietary-sabotage.de.po   17 Mar 2019 10:32:41 -0000      
1.113
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:40+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -798,14 +798,32 @@
 "Reihe von Problemen."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"//www.computerworld.com/article/2984889/windows-pcs/lenovo-"
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "
@@ -1113,17 +1131,18 @@
 
 #. type: Content of: <ul><li><p>
 # | In 2014, <a
-# | 
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>Oracle-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
 #, fuzzy
 #| msgid ""
 #| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
 #| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 #| "\">Oracle insisted on continuing this practice.</a>"
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "201<ins>3</ins> <a href=\"//www.computerworld.com/article/2494794/malware-"
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\" "

Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/proprietary-sabotage.fr.po   21 Feb 2019 11:13:30 -0000      
1.131
+++ proprietary/po/proprietary-sabotage.fr.po   17 Mar 2019 10:32:41 -0000      
1.132
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-02-21 12:12+0100\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -676,14 +677,32 @@
 "force, mais le téléchargement lui-même a causé pas mal de problèmes."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"
@@ -910,10 +929,19 @@
 "mais nous le proposons comme référence factuelle."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>+}
+# | Oracle insisted on continuing this practice</a>.
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "En 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"

Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/proprietary-sabotage.it-diff.html    20 Feb 2019 15:30:48 
-0000      1.41
+++ proprietary/po/proprietary-sabotage.it-diff.html    17 Mar 2019 10:32:41 
-0000      1.42
@@ -436,12 +436,12 @@
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-&lt;a</strong></del></span> <span class="inserted"><ins><em>trouble.&lt;/p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>trouble.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509220"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
-    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</em></ins></span>
     Lenovo stealthily installed crapware and spyware via
     BIOS&lt;/a&gt; on Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -647,7 +647,7 @@
 
     &lt;p&gt;In 2014, &lt;a
 <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;Oracle</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;
     Oracle</em></ins></span> insisted on continuing this <span 
class="removed"><del><strong>practice.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>practice&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -735,7 +735,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/20 15:30:48 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary/po/proprietary-sabotage.it.po   20 Feb 2019 15:30:48 -0000      
1.106
+++ proprietary/po/proprietary-sabotage.it.po   17 Mar 2019 10:32:41 -0000      
1.107
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-07-06 22:45+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -650,14 +650,32 @@
 "avviso ha causato parecchi problemi."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -978,17 +996,18 @@
 
 #. type: Content of: <ul><li><p>
 # | In 2014, <a
-# | 
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>Oracle-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
 #, fuzzy
 #| msgid ""
 #| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
 #| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 #| "\">Oracle insisted on continuing this practice.</a>"
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "Nel 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
 "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"

Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-sabotage.ja-diff.html    20 Feb 2019 15:30:48 
-0000      1.43
+++ proprietary/po/proprietary-sabotage.ja-diff.html    17 Mar 2019 10:32:41 
-0000      1.44
@@ -416,12 +416,12 @@
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;
-&lt;a</strong></del></span> <span class="inserted"><ins><em>trouble.&lt;/p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>trouble.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201509220"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
-    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    &lt;p&gt;&lt;a
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;</em></ins></span>
     Lenovo stealthily installed crapware and spyware via
     BIOS&lt;/a&gt; on Windows installs.  Note that the specific
     sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -627,7 +627,7 @@
 
     &lt;p&gt;In 2014, &lt;a
 <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;Oracle</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html"&gt;
     Oracle</em></ins></span> insisted on continuing this <span 
class="removed"><del><strong>practice.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>practice&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -715,7 +715,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/20 15:30:48 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary/po/proprietary-sabotage.ja.po   20 Feb 2019 15:30:48 -0000      
1.97
+++ proprietary/po/proprietary-sabotage.ja.po   17 Mar 2019 10:32:41 -0000      
1.98
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -561,14 +561,23 @@
 "を強制しませんでしたが、ダウンロードだ
けで多くの問題を引き起こしました。"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "ウィンドウズのインストールで<a 
href=\"http://www.computerworld.com/";
 "article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"
@@ -831,9 +840,9 @@
 #| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
 #| "\">Oracle insisted on continuing this practice.</a>"
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "2014年、<a href=\"http://www.computerworld.com/article/2494794/malware-";
 
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">オ"

Index: proprietary/po/proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/proprietary-sabotage.pot     20 Feb 2019 15:30:48 -0000      
1.64
+++ proprietary/po/proprietary-sabotage.pot     17 Mar 2019 10:32:41 -0000      
1.65
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -447,7 +447,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "<a "
-"href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>
 "
+"href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>
 "
 "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
 "installs.  Note that the specific sabotage method Lenovo used did not affect "
 "GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
@@ -599,7 +599,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "In 2014, <a "
-"href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>
 "
+"href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>
 "
 "Oracle insisted on continuing this practice</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary/po/proprietary-sabotage.ru.po   25 Feb 2019 09:37:05 -0000      
1.170
+++ proprietary/po/proprietary-sabotage.ru.po   17 Mar 2019 10:32:41 -0000      
1.171
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-12-10 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -664,14 +665,32 @@
 "уже сама загрузка вызвала массу проблем."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -894,10 +913,19 @@
 "ссылаемся на нее как на свидетельство о 
факте."
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>+}
+# | Oracle insisted on continuing this practice</a>.
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "В 2014 году компания <a 
href=\"http://www.computerworld.com/article/2494794/";
 "malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java."

Index: proprietary/po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-subscriptions.de-diff.html       28 Feb 2019 
22:00:38 -0000      1.18
+++ proprietary/po/proprietary-subscriptions.de-diff.html       17 Mar 2019 
10:32:41 -0000      1.19
@@ -91,7 +91,8 @@
 
   &lt;li</em></ins></span> id="M201507150"&gt;
     &lt;p&gt;Microsoft Office forces users &lt;a
-    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    <span 
class="removed"><del><strong>href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to</em></ins></span>
     subscribe to Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -170,7 +171,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:38 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-subscriptions.de.po      28 Feb 2019 22:00:38 
-0000      1.22
+++ proprietary/po/proprietary-subscriptions.de.po      17 Mar 2019 10:32:41 
-0000      1.23
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -147,11 +147,21 @@
 "stellt eine Versuchung dar, Sabotage zu begehen."
 
 #. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/";
 "article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"

Index: proprietary/po/proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-subscriptions.fr.po      28 Feb 2019 22:17:16 
-0000      1.30
+++ proprietary/po/proprietary-subscriptions.fr.po      17 Mar 2019 10:32:41 
-0000      1.31
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-02-28 23:15+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -138,11 +139,21 @@
 "produits est une invitation au sabotage."
 
 #. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office force ses utilisateurs <a href=\"https://www.computerworld.";
 "com/article/2948755/windows-apps/office-for-windows-10-will-require-"

Index: proprietary/po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-subscriptions.ja-diff.html       28 Feb 2019 
22:00:38 -0000      1.25
+++ proprietary/po/proprietary-subscriptions.ja-diff.html       17 Mar 2019 
10:32:41 -0000      1.26
@@ -93,7 +93,7 @@
 
   &lt;li id="M201507150"&gt;
     &lt;p&gt;Microsoft Office forces users &lt;a
-    
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
+    
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html"&gt;to
     subscribe to Office 365 to be able to create/edit 
documents&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -173,7 +173,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/28 22:00:38 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-subscriptions.ja.po      28 Feb 2019 22:00:39 
-0000      1.16
+++ proprietary/po/proprietary-subscriptions.ja.po      17 Mar 2019 10:32:41 
-0000      1.17
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2016-09-16 09:36+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -116,9 +116,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary/po/proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-subscriptions.pot        28 Feb 2019 22:00:39 
-0000      1.16
+++ proprietary/po/proprietary-subscriptions.pot        17 Mar 2019 10:32:41 
-0000      1.17
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -104,7 +104,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a "
-"href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to
 "
+"href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to
 "
 "subscribe to Office 365 to be able to create/edit documents</a>."
 msgstr ""
 

Index: proprietary/po/proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-subscriptions.ru.po      1 Mar 2019 05:29:26 
-0000       1.37
+++ proprietary/po/proprietary-subscriptions.ru.po      17 Mar 2019 10:32:41 
-0000      1.38
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-06-23 09:13+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -138,11 +139,21 @@
 "совершить саботаж."
 
 #. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office принуждает пользователей <a 
href=\"https://www.";
 "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"

Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-surveillance.de-diff.html        13 Mar 2019 
11:00:59 -0000      1.54
+++ proprietary/po/proprietary-surveillance.de-diff.html        17 Mar 2019 
10:32:41 -0000      1.55
@@ -413,7 +413,7 @@
     &lt;p&gt;Spyware in older versions of Windows: &lt;a
     
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
     Windows Update snoops on the user&lt;/a&gt;. &lt;a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
     Windows 8.1 snoops on local <span 
class="removed"><del><strong>searches.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -531,7 +531,7 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201509220"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>emails to
       snoopers&lt;/a&gt;.&lt;/p&gt;
 
@@ -706,7 +706,7 @@
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into</strong></del></span>
+    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span>
     <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
@@ -853,33 +853,24 @@
   &lt;li id="M201307250"&gt;
     &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>HTML pages returned to</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201302150"&gt;
     &lt;p&gt;Google Play intentionally sends app developers &lt;a
-    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the
-      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span class="inserted"><ins><em>personal 
details</em></ins></span> of <span class="inserted"><ins><em>users that 
install</em></ins></span> the <span class="removed"><del><strong>JS injection 
is to display
-      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking</em></ins></span> the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses
-      roughly 5 tracking libraries. Developers</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo;</em></ins></span> of <span 
class="inserted"><ins><em>users is not enough to
-    legitimize actions like this.  At</em></ins></span> this <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>point, most users</em></ins></span> have
-      <span class="removed"><del><strong>confirmed</strong></del></span> <span 
class="inserted"><ins><em>stopped
-    reading the &ldquo;Terms and Conditions&rdquo;</em></ins></span> that 
<span class="inserted"><ins><em>spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough to
+    legitimize actions like this.  At this point, most users have stopped
+    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify</em></ins></span> the <span 
class="removed"><del><strong>non-premium version</strong></del></span> <span 
class="inserted"><ins><em>information it collects on users, 
instead</em></ins></span> of
-    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, instead of
+    hiding it in an obscurely worded EULA.&lt;/p&gt;
 
     &lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-    and other companies from getting this personal information 
in</em></ins></span> the <span class="removed"><del><strong>app 
does</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
@@ -897,15 +888,12 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain</em></ins></span> JavaScript <span 
class="removed"><del><strong>injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>code,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+  &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
     the e-reader used by most US libraries, &lt;a
     
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
@@ -914,7 +902,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found</strong></del></span> <span 
class="inserted"><ins><em>many e-readers&mdash;not only the Kindle: &lt;a
+    &lt;p&gt;Spyware in many e-readers&mdash;not only the Kindle: &lt;a
     href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
     report even which page the user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -940,25 +928,14 @@
     reports information to identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
-    &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>90%</strong></del></span> <span 
class="inserted"><ins><em>this is used for repression</em></ins></span> of 
<span class="removed"><del><strong>the top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>forbidden sharing
-    makes</em></ins></span> it <span class="removed"><del><strong>was only 
60%.&lt;/p&gt;
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes it even more vicious.&lt;/p&gt;
 
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>even more 
vicious.&lt;/p&gt;
-
-    &lt;p&gt;This illustrates that making unauthorized 
copies</em></ins></span> of <span class="removed"><del><strong>them 
are</strong></del></span> <span class="inserted"><ins><em>nonfree software
-    is</em></ins></span> not <span class="removed"><del><strong>in fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses</strong></del></span> <span class="inserted"><ins><em>a cure 
for</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>that word 
is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This illustrates that making unauthorized copies of nonfree 
software
+    is not a cure for the injustice of nonfree software. It may avoid
+    paying for the nasty thing, but cannot make it less nasty.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
@@ -968,116 +945,142 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library</em></ins></span> for <span class="removed"><del><strong>BART
-    &lt;a 
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software</strong></del></span> <span 
class="inserted"><ins><em>building mobile</em></ins></span> apps, <span 
class="removed"><del><strong>users could &lt;em&gt;make 
sure&lt;/em&gt;</strong></del></span> <span class="inserted"><ins><em>which 
also &lt;a
+    library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
-    way and released them, apparently not realizing</em></ins></span> that 
<span class="inserted"><ins><em>all the personal
-    data</em></ins></span> they <span class="removed"><del><strong>don't 
snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>collected would go to Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no</em></ins></span> one can <span 
class="removed"><del><strong>only hope that they 
don't.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>trust a 
nonfree program, not even the
-    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
+      users. The stated purpose</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="inserted"><ins><em>companies built apps that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>JS injection is</strong></del></span> 
<span class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>display
+      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span class="inserted"><ins><em>Facebook as 
well.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps that track users 
by</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-       to ultrasound from beacons placed in stores or played by TV 
programs&lt;/a&gt;.
-       &lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the
+      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
+      website).&lt;/dd&gt;
 
-&lt;/li&gt;
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span>
+    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Pairs of</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; 
how</em></ins></span> Android apps <span class="removed"><del><strong>can 
collude to transmit</strong></del></span> <span class="inserted"><ins><em>use 
and
-    misuse</em></ins></span> users' personal
-       <span class="removed"><del><strong>data to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;. As</em></ins></span> of <span 
class="removed"><del><strong>thousands</strong></del></span> <span 
class="inserted"><ins><em>March 2019, nearly
-    78,000 have been analyzed,</em></ins></span> of <span 
class="removed"><del><strong>pairs that collude&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span class="removed"><del><strong>also uses
+      roughly 5 tracking libraries. Developers</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. 
As</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>March 2019, nearly
+    78,000</em></ins></span> have
+      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>been 
analyzed,</em></ins></span> of <span class="inserted"><ins><em>which 24,000 
(31%) transmit</em></ins></span> the <span class="removed"><del><strong>app does
+      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
 &lt;/li&gt;
-
 &lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span> 
<span class="inserted"><ins><em>which 24,000 (31%) transmit 
the</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and &lt;a
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>personal details</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape</em></ins></span> tracking <span 
class="removed"><del><strong>libraries. For 
+  the paid proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>by resetting it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>only 60%.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent 
violation</em></ins></span> of <span 
class="removed"><del><strong>users</strong></del></span>
-    <span class="inserted"><ins><em>Google's policies. But it 
seems</em></ins></span> that <span class="removed"><del><strong>install the 
app&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most</strong></del></span> <span class="inserted"><ins><em>in no hurry 
to take action. This proves
+    that the policies</em></ins></span> of <span 
class="removed"><del><strong>them</strong></del></span> <span 
class="inserted"><ins><em>a development platform</em></ins></span> are <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
+    preventing nonfree software developers from including 
malware</em></ins></span> in <span class="removed"><del><strong>fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Google wasn't aware</em></ins></span> of <span 
class="removed"><del><strong>users is not enough</strong></del></span> <span 
class="inserted"><ins><em>it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="removed"><del><strong>legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>take action. This 
proves
-    that the policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
-    their programs.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span 
class="inserted"><ins><em>a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps</em></ins></span> 
that <span class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.</strong></del></span> <span 
class="inserted"><ins><em>used to
-    be on</em></ins></span> Google <span class="removed"><del><strong>should 
clearly</strong></del></span> <span class="inserted"><ins><em>Play had one or 
more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>honestly identify the information it 
collects</strong></del></span> <span class="inserted"><ins><em>often malicious 
ads</em></ins></span> on users, <span 
class="removed"><del><strong>instead</strong></del></span> <span 
class="inserted"><ins><em>and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface</em></ins></span> of <span 
class="removed"><del><strong>hiding it in an obscurely worded EULA.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Apps</strong></del></span>
 
-&lt;p&gt;However,</strong></del></span> <span class="inserted"><ins><em>most 
of them was designed</em></ins></span> to <span 
class="removed"><del><strong>truly protect people's privacy, we must prevent 
Google
-and other companies</strong></del></span> <span class="inserted"><ins><em>make 
uninstallation
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>BART</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
+  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A study found 234 Android</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo;</em></ins></span> apps 
that <span class="removed"><del><strong>track users by</strong></del></span> 
<span class="inserted"><ins><em>used to
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them</em></ins></span> to <span 
class="removed"><del><strong>ultrasound</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away</em></ins></span> from <span 
class="removed"><del><strong>getting this personal 
information</strong></del></span> <span class="inserted"><ins><em>nonfree 
apps</em></ins></span> in <span class="removed"><del><strong>the first
-place!&lt;/p&gt;</strong></del></span>
+    haven't yet, but they should also stay away</em></ins></span> from <span 
class="removed"><del><strong>beacons placed</strong></del></span> <span 
class="inserted"><ins><em>nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>stores or played by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
     there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;Pairs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</strong></del></span> the <span class="removed"><del><strong>users' 
movements without their permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable</strong></del></span> <span class="inserted"><ins><em>150 most 
popular
-    gratis VPN apps in</em></ins></span> Google Play <span 
class="removed"><del><strong>itself</strong></del></span> <span 
class="inserted"><ins><em>found that &lt;a
+    &lt;p&gt;An investigation</em></ins></span> of <span 
class="removed"><del><strong>Android</strong></del></span> <span 
class="inserted"><ins><em>the 150 most popular
+    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>can 
collude</strong></del></span> <span class="inserted"><ins><em>in Google Play 
found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    25% fail</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
+       data</strong></del></span> <span class="inserted"><ins><em>protect 
their users’ privacy&lt;/a&gt; due</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
-    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
-    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had</em></ins></span> found
+       <span class="removed"><del><strong>tens of thousands of 
pairs</strong></del></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span> 
&lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>users that install the 
app&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Merely asking</strong></del></span>
+    the <span class="removed"><del><strong>&ldquo;consent&rdquo; of users is 
not enough
+to legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps</em></ins></span> have
+<span class="removed"><del><strong>stopped reading the &ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what</strong></del></span> <span class="inserted"><ins><em>these articles talk 
about &ldquo;free
+    apps.&rdquo; These apps are gratis, but</em></ins></span> they are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
+
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;not&lt;/em&gt; &lt;a
+    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app &lt;a
-    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The 
company</em></ins></span> is
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The 
company</em></ins></span> is
     <span class="removed"><del><strong>yet another 
example</strong></del></span>
     <span class="inserted"><ins><em>being sued, demanding that it notify the 
users</em></ins></span> of <span class="removed"><del><strong>nonfree software 
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what 
it will do
     with</em></ins></span> the <span class="removed"><del><strong>user,
@@ -1117,107 +1120,110 @@
   <span class="removed"><del><strong>&ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
 
   &lt;p&gt;The article takes for granted</strong></del></span> that the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is
-    <span class="inserted"><ins><em>using</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers have no right to
-  analyze what users are doing or how.  &ldquo;Analytics&rdquo; 
tools</strong></del></span> <span class="inserted"><ins><em>app, 
but</em></ins></span> that <span class="removed"><del><strong>snoop are
-  just as wrong as any other snooping.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>alone is often quite informative.&lt;/p&gt;
+  legitimate,</strong></del></span> <span class="inserted"><ins><em>user is
+    using that app,</em></ins></span> but <span class="inserted"><ins><em>that 
alone</em></ins></span> is <span class="inserted"><ins><em>often quite 
informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
-    account.&lt;/p&gt;</em></ins></span>
+    account.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some</em></ins></span> Android apps <span 
class="removed"><del><strong>(but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect to 100</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
 and advertising&lt;/a&gt; URLs,
-      on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
-      Some Motorola</strong></del></span> phones <span 
class="removed"><del><strong>modify</strong></del></span> <span 
class="inserted"><ins><em>of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers</strong></del></span> 
have <span class="removed"><del><strong>no right to
+  analyze what</strong></del></span> <span class="inserted"><ins><em>deleted 
them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on</em></ins></span> Android <span 
class="removed"><del><strong>to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>are doing or how.  &ldquo;Analytics&rdquo; tools 
that snoop are
+  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>turn off the other kinds of location
-    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;There are</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>turn off the other kinds of location
+    tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201806110"&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>listens 
through</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
+
+    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>present in some 
Android devices when they are sold.
+      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to
+      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span> <span 
class="inserted"><ins><em>save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
+
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>care much less about sports, you will benefit 
in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
       hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file 
on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>any file 
on</strong></del></span> <span class="inserted"><ins><em>snoop
+    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
-
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span> <span class="inserted"><ins><em>implements 
DRM, too&mdash;that there is no way</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
-      would require circumventing</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+    source code they cannot look at.  The other apps might be snooping
+    in other ways.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy</em></ins></span> and <span 
class="inserted"><ins><em>freedom, Android users
+    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make 
it</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
+    Android by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>study how iOS cr...apps spy on 
users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;In</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span class="removed"><del><strong>latest iThings 
system, &ldquo;turning off&rdquo; WiFi</strong></del></span> <span 
class="inserted"><ins><em>5,855 Android apps studied by researchers were found 
to snoop</em></ins></span>
-    and <span class="removed"><del><strong>Bluetooth</strong></del></span> 
<span class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  
40% of</em></ins></span> the
-      <span class="removed"><del><strong>obvious way &lt;a
- 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>Bluetooth</strong></del></span> the
+      <span class="removed"><del><strong>obvious way</strong></del></span> 
<span class="inserted"><ins><em>proprietary apps by getting apps from the free 
software
+    only</em></ins></span> &lt;a
+ <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
-    source code they cannot look at.  The other apps might be snooping
-    in other ways.&lt;/p&gt;
-
-    &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy and freedom, Android users
-    need</em></ins></span> to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>get 
rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
-    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
+      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -1333,78 +1339,84 @@
     Google</em></ins></span> to
       <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
       nude photos</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release</em></ins></span> 
of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed 
to break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>source 
code</em></ins></span> to <span class="removed"><del><strong>get at them, but 
NSA can access any of them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the &lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
+      security</strong></del></span> <span class="inserted"><ins><em>source 
code</em></ins></span> to <span class="removed"><del><strong>get at them, but 
NSA</strong></del></span> <span class="inserted"><ins><em>the
+    public, so we</em></ins></span> can <span 
class="removed"><del><strong>access any of them through</strong></del></span> 
<span class="inserted"><ins><em>depend on each other.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature</strong></del></span>
+  &lt;li id="M201705230"&gt;
+    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps</em></ins></span> for <span class="removed"><del><strong>web 
sites to track users, which is</strong></del></span> <span 
class="inserted"><ins><em>BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, but it
-      is still true in iOS 7.)&lt;/p&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:
+      the</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
     snoop on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt;</strong></del></span>
+  &lt;li id="M201705040"&gt;
+    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played</em></ins></span> by 
<span class="removed"><del><strong>default, though that can be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV
+    to ultrasound from beacons placed in</em></ins></span> stores <span 
class="removed"><del><strong>determine exactly where the iThing is,
+      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access it demands to personal</em></ins></span> data <span 
class="removed"><del><strong>from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>in</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+    how much access</em></ins></span> it
+      <span class="removed"><del><strong>is still true</strong></del></span> 
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in 
<span class="removed"><del><strong>iOS 7.)&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  
Specifically,</em></ins></span>
-    the <span class="removed"><del><strong>NSA snoop on 
all</strong></del></span> <span class="inserted"><ins><em>app would 
record</em></ins></span> the <span class="removed"><del><strong>data in an 
iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files users listen to
+    along with the headphone's unique serial number.&lt;/p&gt;
+
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
+    If the fine print of the app said that users gave consent for this,
+    would that make it acceptable? No way! It should</em></ins></span> be
+      <span class="removed"><del><strong>turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>names</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>the audio files users listen</em></ins></span> to 
<span class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here 
is</strong></del></span>
-    <span class="inserted"><ins><em>along with the headphone's unique serial 
number.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>flat out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of</em></ins></span> the <span 
class="inserted"><ins><em>app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
+    the <span class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>app to</em></ins></span> snoop <span 
class="removed"><del><strong>on all the data in an iThing,
+      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
+    &lt;p&gt;Pairs</em></ins></span> of <span class="removed"><del><strong>iOS 
seem to exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  Here is the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1413,10 +1425,7 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs of</em></ins></span> Android apps <span 
class="removed"><del><strong>is pervasive and
+  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span> 
Android apps <span class="removed"><del><strong>is pervasive and
       sometimes very clever. Some trackers</strong></del></span> can <span 
class="inserted"><ins><em>collude
     to transmit users' personal data to servers.</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
@@ -1985,8 +1994,8 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>woman came 
up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
+&lt;p&gt;Emo Phillips made</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The 
other day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
 said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
 don't know. You can't see</em></ins></span> out
       <span class="removed"><del><strong>who</strong></del></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
@@ -3290,7 +3299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/13 11:00:59 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- proprietary/po/proprietary-surveillance.de.po       13 Mar 2019 11:00:59 
-0000      1.269
+++ proprietary/po/proprietary-surveillance.de.po       17 Mar 2019 10:32:41 
-0000      1.270
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -852,7 +852,7 @@
 # | 
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
 # | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
 # | 
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
-# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
 # | Windows 8.1 snoops on local searches[-.-]</a>. And there's a <a
 # | href=\"http://www.marketoracle.co.uk/Article40836.html\";>{+ +}secret NSA
 # | key in Windows</a>, whose functions we don't know.
@@ -868,11 +868,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Spionageprogramme in Windows: <a href=\"http://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\" title=\"Windows Update keeps tabs "
@@ -1049,14 +1049,32 @@
 msgstr " "
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"https://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "

Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.392
retrieving revision 1.393
diff -u -b -r1.392 -r1.393
--- proprietary/po/proprietary-surveillance.fr.po       13 Mar 2019 13:14:42 
-0000      1.392
+++ proprietary/po/proprietary-surveillance.fr.po       17 Mar 2019 10:32:41 
-0000      1.393
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-03-13 14:13+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -617,14 +618,31 @@
 "a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Espions dans les anciennes versions de Windows : <a href=\"https://www.";
 "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
@@ -773,14 +791,32 @@
 "\">#SpywareInBIOS</a>)</span>"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"

Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-surveillance.it-diff.html        13 Mar 2019 
11:00:59 -0000      1.121
+++ proprietary/po/proprietary-surveillance.it-diff.html        17 Mar 2019 
10:32:41 -0000      1.122
@@ -410,7 +410,7 @@
     &lt;p&gt;Spyware in older versions of Windows: &lt;a
     
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
     Windows Update snoops on the user&lt;/a&gt;. &lt;a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
     Windows 8.1 snoops on local <span 
class="removed"><del><strong>searches.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -517,11 +517,10 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201509220"&gt;</em></ins></span>
     &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
 study in 2015&lt;/a&gt; found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    <span 
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware and spyware via
-    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of</strong></del></span> the <span 
class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable tracking libraries. For 
-  the paid proprietary apps, it was only 60%.&lt;/p&gt;
+    BIOS&lt;/a&gt; on Windows installs.  Note</em></ins></span> that <span 
class="removed"><del><strong>90% of the top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> the <span class="removed"><del><strong>paid 
proprietary apps, it was only 60%.&lt;/p&gt;
 
   &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
   but most of them are</strong></del></span> <span 
class="inserted"><ins><em>specific
@@ -1993,22 +1992,22 @@
        was sued for collecting lots of personal information about how
        people used it&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span>
+    &lt;p&gt;The company's statement</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span class="removed"><del><strong>data 
may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>user watches, and</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a
-      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>404 error
-    really means nothing;</em></ins></span> the <span 
class="inserted"><ins><em>server could save that</em></ins></span> data <span 
class="removed"><del><strong>broker would have been able to figure out
-      who</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
+    reports what the user watches, and the switch to turn this off has
+    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span 
class="inserted"><ins><em>transmission reports a 404 error
+    really means nothing; the server could save that</em></ins></span> data 
<span class="removed"><del><strong>may be
+      true, but</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;LG later said</em></ins></span> it had <span 
class="removed"><del><strong>sold the data to</strong></del></span> <span 
class="inserted"><ins><em>installed</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>figure out
+      who the user was.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
     product could spy</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
@@ -3050,7 +3049,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/13 11:00:59 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- proprietary/po/proprietary-surveillance.it.po       13 Mar 2019 11:00:59 
-0000      1.282
+++ proprietary/po/proprietary-surveillance.it.po       17 Mar 2019 10:32:41 
-0000      1.283
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -855,7 +855,7 @@
 # | 
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>+}
 # | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
 # | 
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>-]
-# | 
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
 # | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
 # | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>
 # | secret NSA key in Windows</a>, whose functions we don't know.
@@ -872,11 +872,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/";
 "http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>Windows "
@@ -1038,14 +1038,32 @@
 "\">#SpywareInBIOS</a>)</span>"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "

Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/proprietary-surveillance.ja-diff.html        13 Mar 2019 
11:00:59 -0000      1.131
+++ proprietary/po/proprietary-surveillance.ja-diff.html        17 Mar 2019 
10:32:41 -0000      1.132
@@ -409,7 +409,7 @@
     &lt;p&gt;Spyware in older versions of Windows: &lt;a
     
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/"&gt;
     Windows Update snoops on the user&lt;/a&gt;. &lt;a
-    
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
+    
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"&gt;</em></ins></span>
     Windows 8.1 snoops on local <span 
class="removed"><del><strong>searches.&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -517,7 +517,7 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201509220"&gt;
     &lt;p&gt;&lt;a
-    
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+    
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
     Lenovo stealthily installed crapware</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2877,7 +2877,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/13 11:00:59 $
+$Date: 2019/03/17 10:32:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- proprietary/po/proprietary-surveillance.ja.po       13 Mar 2019 11:00:59 
-0000      1.255
+++ proprietary/po/proprietary-surveillance.ja.po       17 Mar 2019 10:32:42 
-0000      1.256
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -688,11 +688,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "ウィンドウズ8のスパイウェア: <a href=\"https://web.archive.org/";
 "web/20160313105805/http://www.theregister.co.uk/2003/02/28/";
@@ -843,14 +843,23 @@
 "\">#SpywareInBIOS</a>)</span>"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "ウィンドウズのインストールの際、<a 
href=\"http://www.computerworld.com/";
 "article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"

Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary/po/proprietary-surveillance.pot 13 Mar 2019 11:00:59 -0000      
1.203
+++ proprietary/po/proprietary-surveillance.pot 17 Mar 2019 10:32:42 -0000      
1.204
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -472,7 +472,7 @@
 "Spyware in older versions of Windows: <a "
 "href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";> 
"
 "Windows Update snoops on the user</a>. <a "
-"href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>
 "
+"href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>
 "
 "Windows 8.1 snoops on local searches</a>. And there's a <a "
 "href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
 "Windows</a>, whose functions we don't know."
@@ -573,7 +573,7 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "<a "
-"href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>
 "
+"href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>
 "
 "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
 "installs.  Note that the specific sabotage method Lenovo used did not affect "
 "GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "

Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.489
retrieving revision 1.490
diff -u -b -r1.489 -r1.490
--- proprietary/po/proprietary-surveillance.ru.po       13 Mar 2019 15:30:27 
-0000      1.489
+++ proprietary/po/proprietary-surveillance.ru.po       17 Mar 2019 10:32:42 
-0000      1.490
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -609,14 +610,31 @@
 "японского и китайского текста Baidu шпионят 
за своими пользователями</a>."
 
 #. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Программы-шпионы в старых версиях Windows: <a 
href=\"https://www.theregister.";
 "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update 
подглядывает "
@@ -761,14 +779,32 @@
 "\">#SpywareInBIOS</a>)</span>"
 
 #. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary/po/pt-br.po     14 Mar 2019 14:02:15 -0000      1.65
+++ proprietary/po/pt-br.po     17 Mar 2019 10:32:42 -0000      1.66
@@ -1892,9 +1892,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2995,9 +2995,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 
@@ -3439,9 +3439,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3552,12 +3552,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -3722,9 +3722,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3896,11 +3896,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3922,9 +3922,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -6504,13 +6504,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -6537,9 +6537,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 
 #. type: Content of: <title>

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary/po/ru.po        13 Mar 2019 15:13:00 -0000      1.111
+++ proprietary/po/ru.po        17 Mar 2019 10:32:42 -0000      1.112
@@ -2555,11 +2555,21 @@
 "Если продукт &ldquo;интеллектуален&rdquo; и его 
сделали не вы, он искусно "
 "служит своему производителю <em>против 
вас</em>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\";>-]
+# | 
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\";>+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
 "found-in-d-link-router-firmware-code.html\">В некоторых 
маршрутизаторах D-"
@@ -3133,12 +3143,13 @@
 "html#car-spying\"> manufacturers collect this data</a> as part of their own "
 "spying, then forward it to the government-run platform."
 msgstr ""
-"В Китае электромобили обязательно должны 
быть оборудованы терминалом, который "
-" <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\";> "
-"передает технические данные, в том числе и 
местоположение машины, на платформу, "
-"предоставленную государством</a>. На 
практике <a href=\"/proprietary/proprietary-surveillance."
-"html#car-spying\"> изготовители собирают эти 
данные</a> в процессе собственного "
-"шпионажа, а затем передают их на 
платформу, предоставленную государством."
+"В Китае электромобили обязательно должны 
быть оборудованы терминалом, "
+"который  <a 
href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca";
+"\"> передает технические данные, в том 
числе и местоположение машины, на "
+"платформу, предоставленную 
государством</a>. На практике <a href=\"/"
+"proprietary/proprietary-surveillance.html#car-spying\"> 
изготовители "
+"собирают эти данные</a> в процессе 
собственного шпионажа, а затем передают "
+"их на платформу, предоставленную 
государством."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -4008,11 +4019,24 @@
 "termsofservice.html\"> в разделе 4 лицензионного 
договора конечного "
 "пользователя</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# | 
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\";>+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 "В Android <a href=\"http://www.computerworld.com/article/2506557/security0/";
@@ -4640,11 +4664,20 @@
 "механизмом внедрения в компьютеры с 
помощью Microsoft, как утверждают "
 "признанные эксперты по безопасности."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# | 
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\";>+}
+# | remotely deleting apps</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 "В Windows 8 есть также лазейка для <a 
href=\"http://www.computerworld.com/";
 "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
@@ -4789,16 +4822,39 @@
 "радикально снижает быстродействие машин 
под Windows&nbsp;10</a>, а отключить "
 "ее непросто."
 
-#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>+}
+# | repeatedly switched on a flag that urged users to &ldquo;upgrade&rdquo; to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no.  To do this, Microsoft used <a
+# | 
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
+# | malware techniques</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no.  To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 "После <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -5055,12 +5111,22 @@
 msgid "Microsoft Subscriptions"
 msgstr "Подписка"
 
-#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# | 
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to-]
+# | 
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\";>to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 "Microsoft Office принуждает пользователей <a 
href=\"https://www.";
 "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
@@ -5319,15 +5385,32 @@
 "\"http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-";
 "user-data\"> специально для того, чтобы 
шпионить</a>."
 
-#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# | 
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
+# | Windows Update snoops on the user</a>. <a
+# | 
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>-]
+# | 
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\";>+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 "Программы-шпионы в старых версиях Windows: <a 
href=\"https://www.theregister.";
 "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update 
подглядывает "
@@ -5363,11 +5446,20 @@
 "windows-10-in-s-mode-faq\">режимом S</a>. Важное отличие 
от Windows 10 S "
 "состоит в том, что есть простой способ 
выйти из режима S."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+# | <a
+# | 
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\";>-]
+# | 
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\";>+}
+# | Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) was a jail</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#| "devices&rdquo; (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 "app-store-lockdown\"> Windows 8 на &ldquo;мобильных 
устройствах&rdquo; (ныне "
@@ -8701,15 +8793,33 @@
 "tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-"
 "people-evacuate/\"> могли задействовать только 
часть аккумуляторов</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# | 
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs.  Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs.  Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -8754,11 +8864,20 @@
 "Мы не согласны с точкой зрения автора этой 
статьи по этим вопросам, но мы "
 "ссылаемся на нее как на свидетельство о 
факте."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# | 
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\";>-]
+# | 
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\";>+}
+# | Oracle insisted on continuing this practice</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 "В 2014 году компания <a 
href=\"http://www.computerworld.com/article/2494794/";
 "malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java."
@@ -9727,6 +9846,126 @@
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
 #~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
+#~ "found-in-d-link-router-firmware-code.html\">В некоторых 
маршрутизаторах D-"
+#~ "Link</a> есть черный ход для моментального 
изменения настроек."
+
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "В Android <a href=\"http://www.computerworld.com/article/2506557/";
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> у Google "
+#~ "есть черный ход для удаления программ по 
сети</a> (он был в программе под "
+#~ "названием GTalkService, которую, видимо, 
включили в состав Google Play)."
+
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "В Windows 8 есть также лазейка для <a 
href=\"http://www.computerworld.com/";
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> удаления программ по сети</a>."
+
+#~ msgid ""
+#~ "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forcing the download of Windows 10</a> on computers that were running "
+#~ "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#~ "urged users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had "
+#~ "turned it off, in the hope that some day they would fail to say no.  To "
+#~ "do this, Microsoft used <a href=\"https://www.theregister.co.";
+#~ "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#~ "techniques</a>."
+#~ msgstr ""
+#~ "После <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">принудительной загрузки Windows 10</a> на 
компьютерах, которые "
+#~ "работали под Windows 7 и 8 компания Microsoft <a 
href=\"http://www.";
+#~ "computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-"
+#~ "for-massive-windows-10-upgrade-strategy.html\"> неоднократно 
включала "
+#~ "признак, который побуждал пользователей 
&ldquo;обновиться&rdquo; до "
+#~ "Windows 10</a>, когда они выключали его, 
надеясь на то, что когда-нибудь "
+#~ "они не откажутся. Для этого Microsoft 
применяла <a href=\"https://www.";
+#~ "theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"
+#~ "\"> технику вредоносных программ</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office принуждает пользователей <a 
href=\"https://www.";
+#~ "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+#~ "require-office-365-subscription-on-pcs-larger-tablets.html"
+#~ "\">подписываться на Office 365, чтобы получить 
возможность редактировать "
+#~ "документы</a>."
+
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister.";
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/";
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Программы-шпионы в старых версиях Windows: <a 
href=\"https://www.";
+#~ "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update "
+#~ "подглядывает за пользователем</a>. <a 
href=\"https://www.infoworld.com/";
+#~ "article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-"
+#~ "windows-8-1--blue-.html\">Windows 8.1 подглядывает за 
поиском по "
+#~ "компьютеру</a>. А еще <a 
href=\"http://www.marketoracle.co.uk/";
+#~ "Article40836.html\"> в Windows есть секретный ключ 
АНБ</a>, функции "
+#~ "которого нам неизвестны."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/";
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile "
+#~ "devices&rdquo; (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
+#~ "app-store-lockdown\"> Windows 8 на &ldquo;мобильных 
устройствах&rdquo; "
+#~ "(ныне покойная) была тюрьмой</a>."
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs.  Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo скрытно устанавливала программный х
лам через BIOS</a> при "
+#~ "установке Windows. Следует заметить, что тот 
конкретный метод саботажа, "
+#~ "который применили в Lenovo, неприменим для 
GNU/Linux; кроме того, &ldquo;"
+#~ "чистая&rdquo; установка Windows с нуля на самом 
деле не чиста, поскольку "
+#~ "<a href=\"/proprietary/malware-microsoft.html\">Microsoft 
устанавливает "
+#~ "при этом свои собственные вредоносные 
программы</a>."
+
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "В 2014 году компания <a href=\"http://www.computerworld.com/";
+#~ "article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--"
+#~ "crapware--with-java.html\"> Oracle упорно продолжала 
следовать этой "
+#~ "практике</a>."
+
+#~ msgid ""
 #~ "Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress "
 #~ "from one level to the next) slower and slower, designing complex tasks "
 #~ "that are difficult to get out of (e.g. World of Warkraft), or conversely "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/zh-tw.po     13 Mar 2019 11:01:00 -0000      1.49
+++ proprietary/po/zh-tw.po     17 Mar 2019 10:32:42 -0000      1.50
@@ -1827,9 +1827,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-";
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-";
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -2830,9 +2830,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/";
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-";
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
 "seems since then to have been merged into Google Play.)"
 msgstr ""
 
@@ -3258,9 +3258,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/";
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/";
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -3363,12 +3363,12 @@
 msgid ""
 "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
 "\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/";
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to &ldquo;upgrade&rdquo; to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no.  To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/";
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/";
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to &ldquo;"
+"upgrade&rdquo; to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no.  To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/";
 "microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
 msgstr ""
 
@@ -3533,9 +3533,9 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft Office forces users <a href=\"https://www.computerworld.com/";
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3707,11 +3707,11 @@
 msgid ""
 "Spyware in older versions of Windows: <a href=\"https://www.theregister.co.";
 "uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-";
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www.";
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-";
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/";
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -3733,9 +3733,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-";
-"metro-app-store-lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-";
+"lock-down.html\"> Windows 8 on &ldquo;mobile devices&rdquo; (now defunct) "
+"was a jail</a>."
 msgstr ""
 
 #. type: Content of: <h3>
@@ -6173,13 +6173,13 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs.  Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-";
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs.  "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a &ldquo;clean&rdquo; Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
 msgstr ""
 
 #. type: Content of: <ul><li><p>
@@ -6206,9 +6206,9 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-";
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-";
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
 msgstr ""
 
 #. type: Content of: <title>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]