www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Tue, 26 Mar 2019 06:33:51 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/03/26 06:33:49

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.394&r2=1.395
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.491&r2=1.492
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.52&r2=1.53

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- de.po       23 Mar 2019 10:31:40 -0000      1.52
+++ de.po       26 Mar 2019 10:33:48 -0000      1.53
@@ -5402,6 +5402,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- es.po       23 Mar 2019 10:31:40 -0000      1.69
+++ es.po       26 Mar 2019 10:33:48 -0000      1.70
@@ -3948,6 +3948,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- fr.po       23 Mar 2019 10:52:11 -0000      1.92
+++ fr.po       26 Mar 2019 10:33:48 -0000      1.93
@@ -4396,6 +4396,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- it.po       23 Mar 2019 10:31:41 -0000      1.52
+++ it.po       26 Mar 2019 10:33:48 -0000      1.53
@@ -5063,6 +5063,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- ja.po       23 Mar 2019 10:31:41 -0000      1.52
+++ ja.po       26 Mar 2019 10:33:48 -0000      1.53
@@ -4366,6 +4366,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-google.de-diff.html 17 Mar 2019 10:32:40 -0000      1.22
+++ malware-google.de-diff.html 26 Mar 2019 10:33:48 -0000      1.23
@@ -322,8 +322,8 @@
     let Google monitor their phone use, and all internet use</em></ins></span> 
in <span class="removed"><del><strong>popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>their
     homes, for an extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is not a malicious functionality of a program with some other
-    purpose; this</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>the software's sole purpose,</em></ins></span> and
+    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>not a malicious functionality of a program with some 
other
+    purpose; this is the software's sole purpose,</em></ins></span> and
       <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
 
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
       follow</strong></del></span> <span class="inserted"><ins><em>Google says 
so. But
@@ -353,34 +353,56 @@
   &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span> <span 
class="inserted"><ins><em>card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
        sends</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software</em></ins></span> Google <span 
class="removed"><del><strong>every URL typed in&lt;/a&gt;, one 
key</strong></del></span> <span class="inserted"><ins><em>uses to spy on 
students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives</em></ins></span> at <span 
class="inserted"><ins><em>the School Board to refuse the
+    budget unless the school initiates</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201609140"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable</em></ins></span> Google <span 
class="removed"><del><strong>every URL typed in&lt;/a&gt;, one key 
at</strong></del></span> <span class="inserted"><ins><em>Maps and location 
tracking, you must
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
     disable Google Play itself to completely stop the tracking.  This is
     yet another example of nonfree software pretending to obey the user,
-    when it's actually doing something else.  Such</em></ins></span> a <span 
class="removed"><del><strong>time.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>thing would be almost
+    when it's actually doing something else.  Such a thing would be almost
     unthinkable with free software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507280"&gt;
     &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
+    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
+  &lt;li id="M201506180"&gt;
     &lt;p&gt;Google</em></ins></span> Chrome includes a module that &lt;a
     
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
     activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
@@ -577,7 +599,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/17 10:32:40 $
+$Date: 2019/03/26 10:33:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-google.de.po        17 Mar 2019 10:32:40 -0000      1.37
+++ malware-google.de.po        26 Mar 2019 10:33:48 -0000      1.38
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -678,6 +678,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- malware-google.es.po        18 Mar 2019 09:57:23 -0000      1.3
+++ malware-google.es.po        26 Mar 2019 10:33:48 -0000      1.4
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
 "PO-Revision-Date: 2019-03-18 10:49+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -542,6 +543,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-google.fr.po        17 Mar 2019 16:01:34 -0000      1.59
+++ malware-google.fr.po        26 Mar 2019 10:33:48 -0000      1.60
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
 "PO-Revision-Date: 2019-03-17 17:00+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -544,6 +545,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-google.pot  17 Mar 2019 10:32:40 -0000      1.33
+++ malware-google.pot  26 Mar 2019 10:33:48 -0000      1.34
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -383,6 +383,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a "
+"href=\"https://www.eff.org/wp/school-issued-devices-and-student-privacy\";> "
+"collecting far more data on students than is necessary, and store it "
+"indefinitely</a>. Parents and students complain about the lack of "
+"transparency on the part of both the educational services and the schools, "
+"the difficulty of opting out of these services, and the lack of proper "
+"privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a "
 
"href=\"http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google\";>logs
 "
 "all conversations</a>."

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-google.ru.po        18 Mar 2019 06:31:56 -0000      1.79
+++ malware-google.ru.po        26 Mar 2019 10:33:48 -0000      1.80
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:26+0000\n"
 "PO-Revision-Date: 2018-10-05 09:03+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -542,6 +543,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- nl.po       23 Mar 2019 10:31:41 -0000      1.52
+++ nl.po       26 Mar 2019 10:33:48 -0000      1.53
@@ -3597,6 +3597,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- pl.po       23 Mar 2019 10:31:41 -0000      1.52
+++ pl.po       26 Mar 2019 10:33:48 -0000      1.53
@@ -3110,6 +3110,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- pot 23 Mar 2019 10:31:41 -0000      1.52
+++ pot 26 Mar 2019 10:33:48 -0000      1.53
@@ -2946,6 +2946,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-surveillance.de-diff.html       17 Mar 2019 10:32:41 -0000      
1.55
+++ proprietary-surveillance.de-diff.html       26 Mar 2019 10:33:48 -0000      
1.56
@@ -706,7 +706,7 @@
       requested.&lt;/dd&gt;
 
     &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</strong></del></span>
+    &lt;dd&gt;Injects JavaScript code into</strong></del></span>
     <span class="inserted"><ins><em>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means &ldquo;please
     don't ask where.&rdquo;&lt;/p&gt;
 
@@ -947,181 +947,101 @@
     &lt;p&gt;Facebook offered a convenient proprietary
     library for building mobile apps, which also &lt;a
     href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data</em></ins></span> to <span 
class="removed"><del><strong>the
-      users. The stated purpose</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="inserted"><ins><em>companies built apps that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>JS injection is</strong></del></span> 
<span class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>display
-      ads. Uses roughly 5 tracking libraries. Also, it 
redirects</strong></del></span> <span class="inserted"><ins><em>Facebook as 
well.&lt;/p&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built apps that
+    way and released them, apparently not realizing that all the personal
+    data they collected would go to Facebook as well.&lt;/p&gt;
 
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the
-      <span class="removed"><del><strong>user's traffic through valueclick.com 
(an advertising
-      website).&lt;/dd&gt;
-
-    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902140"&gt;
     &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers</strong></del></span>
-    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. 
As</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>March 2019, nearly
-    78,000</em></ins></span> have
-      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>been 
analyzed,</em></ins></span> of <span class="inserted"><ins><em>which 24,000 
(31%) transmit</em></ins></span> the <span class="removed"><del><strong>app does
-      JavaScript injection for tracking</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%) transmit the &lt;a
     href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
-  &lt;/dl&gt;
-&lt;/li&gt;
-&lt;li&gt;
-  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A 
study in 2015&lt;/a&gt; found that 90%</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>top-ranked gratis
-  proprietary Android apps contained recognizable</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape</em></ins></span> tracking <span 
class="removed"><del><strong>libraries. For 
-  the paid proprietary apps,</strong></del></span> <span 
class="inserted"><ins><em>by resetting it.&lt;/p&gt;
+    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking by resetting it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>only 60%.&lt;/p&gt;
-
-  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
-  but most</strong></del></span> <span class="inserted"><ins><em>in no hurry 
to take action. This proves
-    that the policies</em></ins></span> of <span 
class="removed"><del><strong>them</strong></del></span> <span 
class="inserted"><ins><em>a development platform</em></ins></span> are <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>ineffective at
-    preventing nonfree software developers from including 
malware</em></ins></span> in <span class="removed"><del><strong>fact
-  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
-  It also uses the ugly word &ldquo;monetize&rdquo;. A good replacement
-  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
-  perfectly.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apps</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>BART</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop
 on users&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;With free software apps, users could &lt;em&gt;make sure&lt;/em&gt; 
that they don't snoop.&lt;/p&gt;
-  &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;A study found 234 Android</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo;</em></ins></span> apps 
that <span class="removed"><del><strong>track users by</strong></del></span> 
<span class="inserted"><ins><em>used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them</em></ins></span> to <span 
class="removed"><del><strong>ultrasound</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,
+    them to phishing sites that stole their credentials. Furthermore,
     the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
-    haven't yet, but they should also stay away</em></ins></span> from <span 
class="removed"><del><strong>beacons placed</strong></del></span> <span 
class="inserted"><ins><em>nonfree apps</em></ins></span> in <span 
class="removed"><del><strong>stores or played by TV programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>general. &lt;em&gt;All&lt;/em&gt; nonfree 
apps carry a potential risk because
-    there is no easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    haven't yet, but they should also stay away from nonfree apps in
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Pairs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation</em></ins></span> of <span 
class="removed"><del><strong>Android</strong></del></span> <span 
class="inserted"><ins><em>the 150 most popular
-    gratis VPN</em></ins></span> apps <span class="removed"><del><strong>can 
collude</strong></del></span> <span class="inserted"><ins><em>in Google Play 
found that &lt;a
+  &lt;li id="M201902010"&gt;
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span class="removed"><del><strong>transmit 
users' personal
-       data</strong></del></span> <span class="inserted"><ins><em>protect 
their users’ privacy&lt;/a&gt; due</em></ins></span> to <span 
class="removed"><del><strong>servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had</em></ins></span> found
-       <span class="removed"><del><strong>tens of thousands of 
pairs</strong></del></span> that <span 
class="removed"><del><strong>collude&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends app developers</strong></del></span> 
&lt;a
-<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>users that install the 
app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span>
-    the <span class="removed"><del><strong>&ldquo;consent&rdquo; of users is 
not enough
-to legitimize actions like this.  At this point, most 
users</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN 
apps</em></ins></span> have
-<span class="removed"><del><strong>stopped reading the &ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what</strong></del></span> <span class="inserted"><ins><em>these articles talk 
about &ldquo;free
-    apps.&rdquo; These apps are gratis, but</em></ins></span> they are <span 
class="removed"><del><strong>&ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.&lt;/p&gt;
-
-&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;em&gt;not&lt;/em&gt; &lt;a
-    href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Google Play (a component of Android)</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201901050"&gt;
-    &lt;p&gt;The Weather Channel app</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored</em></ins></span> users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half of
+    the top 10 gratis VPN apps have lousy privacy policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It is unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
+    
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
+    stored users' locations to the company's server&lt;/a&gt;. The company is
+    being sued, demanding that it notify the users of what it will do
+    with the data.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> the <span 
class="removed"><del><strong>tracking.  This</strong></del></span> <span 
class="inserted"><ins><em>company's server&lt;/a&gt;. The 
company</em></ins></span> is
-    <span class="removed"><del><strong>yet another 
example</strong></del></span>
-    <span class="inserted"><ins><em>being sued, demanding that it notify the 
users</em></ins></span> of <span class="removed"><del><strong>nonfree software 
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what 
it will do
-    with</em></ins></span> the <span class="removed"><del><strong>user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
-    unthinkable</strong></del></span> <span class="inserted"><ins><em>side 
issue. What the company does</em></ins></span>
-    with <span class="removed"><del><strong>free 
software.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
data is a secondary issue. The principal wrong here is that
+    &lt;p&gt;I think that lawsuit is about a side issue. What the company does
+    with the data is a secondary issue. The principal wrong here is that
     the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt;</em></ins></span> 
-  &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 
73%</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40%</em></ins></span> of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>gratis</em></ins></span> Android apps &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral and location information&lt;/a&gt; of their users with third 
parties.&lt;/p&gt;
+    tracking people's locations.&lt;/p&gt; 
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions</em></ins></span> to <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps &lt;a
+    
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Often they send</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
-  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found</strong></del></span> <span class="inserted"><ins><em>machine's 
&ldquo;advertising ID,&rdquo; so that
+    &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
     Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
-    the user's activities</em></ins></span> in the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way 
to</strong></del></span> <span class="inserted"><ins><em>app; others 
only</em></ins></span> say
-  <span class="removed"><del><strong>&ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;The article takes for granted</strong></del></span> that the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate,</strong></del></span> <span class="inserted"><ins><em>user is
-    using that app,</em></ins></span> but <span class="inserted"><ins><em>that 
alone</em></ins></span> is <span class="inserted"><ins><em>often quite 
informative.&lt;/p&gt;
+    the user's activities in the app; others only say that the user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
@@ -1130,227 +1050,149 @@
   &lt;li id="M201810244"&gt;
     &lt;p&gt;Some Android apps &lt;a
     
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track the phones of users</em></ins></span> that <span 
class="removed"><del><strong>valid?  Software developers</strong></del></span> 
have <span class="removed"><del><strong>no right to
-  analyze what</strong></del></span> <span class="inserted"><ins><em>deleted 
them&lt;/a&gt;.&lt;/p&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when</em></ins></span> users <span 
class="removed"><del><strong>are doing or how.  &ldquo;Analytics&rdquo; tools 
that snoop are
-  just as wrong as any</strong></del></span> <span 
class="inserted"><ins><em>disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are</em></ins></span> other <span 
class="removed"><del><strong>snooping.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span 
class="inserted"><ins><em>ways</em></ins></span> to <span 
class="removed"><del><strong>100</strong></del></span> <span 
class="inserted"><ins><em>turn off the other kinds of location
+    &lt;p&gt;There are other ways to turn off the other kinds of location
     tracking, but most users will be tricked by the misleading 
control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
-    the user's movements</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>listens 
through</em></ins></span> the <span 
class="removed"><del><strong>average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app &lt;a
+    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks
+    the user's movements and listens through the 
microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>present in some 
Android devices when they are sold.
-      Some Motorola phones modify Android</strong></del></span> <span 
class="inserted"><ins><em>no way</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data</strong></del></span> <span 
class="inserted"><ins><em>save
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
     a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>care much less about sports, you will benefit 
in
-    many ways. This is one more.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>any file 
on</strong></del></span> <span class="inserted"><ins><em>snoop
-    and collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span class="removed"><del><strong>system.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-
-&lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnMobiles"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>Mobiles&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>iThings&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+  &lt;li id="M201804160"&gt;
+    &lt;p&gt;More than &lt;a
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="inserted"><ins><em>freedom, Android users
-    need to get rid of</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make 
it</strong></del></span> <span class="inserted"><ins><em>proprietary 
software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching</em></ins></span>
 to <span class="removed"><del><strong>study how iOS cr...apps spy on 
users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span 
class="inserted"><ins><em>Replicant&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>Bluetooth</strong></del></span> the
-      <span class="removed"><del><strong>obvious way</strong></del></span> 
<span class="inserted"><ins><em>proprietary apps by getting apps from the free 
software
-    only</em></ins></span> &lt;a
- <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
-      doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want to be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://f-droid.org/"&gt;F-Droid 
store&lt;/a&gt; that &lt;a
+    their users.  To protect their privacy and freedom, Android users
+    need to get rid of the proprietary software&mdash;both proprietary
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    and the proprietary apps by getting apps from the free software
+    only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
-    the user if an app contains 
anti-features&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201804020"&gt;
-    &lt;p&gt;Grindr collects information about</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;</em></ins></span>
-    which <span class="removed"><del><strong>would mean no 
way</strong></del></span> <span class="inserted"><ins><em>users are 
HIV-positive, then provides the information</em></ins></span> to <span 
class="removed"><del><strong>use it without having your fingerprints
-      taken. Users would</strong></del></span>
-    <span class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201804020"&gt;
+    &lt;p&gt;Grindr collects information about &lt;a
+    
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;
+    which users are HIV-positive, then provides the information to
+    companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not</em></ins></span> have <span 
class="removed"><del><strong>no way</strong></del></span> <span 
class="inserted"><ins><em>so much information about its users.
+    &lt;p&gt;Grindr should not have so much information about its users.
     It could be designed so that users communicate such info to each
-    other but not</em></ins></span> to <span class="removed"><del><strong>tell 
whether</strong></del></span> the <span class="removed"><del><strong>phone is 
snooping</strong></del></span> <span class="inserted"><ins><em>server's 
database.&lt;/p&gt;
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>users even more than users expected. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
+    spy on users even more than users expected. It &lt;a
+    
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
     &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers</em></ins></span> can
-        <span class="removed"><del><strong>get them from 
there.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    is pervasive and sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
-    networks&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    networks&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
iMessage</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708270"&gt;
-    &lt;p&gt;The Sarahah</em></ins></span> app <span 
class="removed"><del><strong>on iThings</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-    uploads all</em></ins></span> phone <span 
class="removed"><del><strong>number</strong></del></span> <span 
class="inserted"><ins><em>numbers and email addresses&lt;/a&gt; in user's 
address
-    book to developer's server.  Note</em></ins></span> that <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>user types into it&lt;/a&gt;; the server records 
these numbers for at least 30
-        days.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>words
+  &lt;li id="M201708270"&gt;
+    &lt;p&gt;The Sarahah app &lt;a
+    
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+    uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+    book to developer's server.  Note that this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-    referring to zero price.&lt;/p&gt;</em></ins></span>
+    referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users cannot make an 
Apple ID</strong></del></span>
+  &lt;li id="M201707270"&gt;
+    &lt;p&gt;20 dishonest Android apps recorded &lt;a
+    
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
+    calls and sent them and text messages and emails to 
snoopers&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201707270"&gt;
-    &lt;p&gt;20 dishonest Android apps recorded</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts"&gt;phone
-    calls and sent them and text messages and emails</em></ins></span> to 
<span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address</strong></del></span> <span 
class="inserted"><ins><em>snoopers&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Google did not intend to make these apps spy; on the contrary, it
-    worked in various ways to prevent that,</em></ins></span> and <span 
class="removed"><del><strong>receiving</strong></del></span> <span 
class="inserted"><ins><em>deleted these apps after
+    &lt;p&gt;Google did not intend to make these apps spy; 
on</em></ins></span> the <span class="removed"><del><strong>HTML pages 
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
+    worked in various ways</em></ins></span> to <span 
class="inserted"><ins><em>prevent that, and deleted these apps after
     discovering what they did. So we cannot blame Google specifically
-    for</em></ins></span> the <span class="removed"><del><strong>code Apple
-      sends to it.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
+    for</em></ins></span> the
+      <span class="removed"><del><strong>users. The stated 
purpose</strong></del></span> <span 
class="inserted"><ins><em>snooping</em></ins></span> of <span 
class="inserted"><ins><em>these apps.&lt;/p&gt;
 
-    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>most 
popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral</strong></del></span> <span class="inserted"><ins><em>other 
hand, Google redistributes nonfree Android apps,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of their <span 
class="removed"><del><strong>users with third parties.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;On</em></ins></span> the <span class="removed"><del><strong>JS 
injection is to display
+      ads. Uses roughly 5 tracking libraries. Also, it redirects the
+      user's traffic through valueclick.com (an advertising
+      website).&lt;/dd&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers all the 
photos and
-      videos they make.&lt;/p&gt;
+    &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+    &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
+      roughly 5 tracking libraries. Developers</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
+    nonfree. It also distributes its own nonfree apps, such as Google Play,
+    &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
+    are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you take,
-      and keeps them up to date on all your devices.
-      Any edits you make are automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+    &lt;p&gt;Could Google</em></ins></span> have
+      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+    cheating? There is no systematic way for Google, or Android users,
+    to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>being
-    nonfree. It also distributes its own nonfree apps, such</em></ins></span> 
as <span class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud 
feature is</strong></del></span> <span class="inserted"><ins><em>Google 
Play,</em></ins></span>
-    &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033"&gt;activated
 by the
-      startup</strong></del></span> <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
-    are malicious&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google could demand</em></ins></span> the <span 
class="removed"><del><strong>app does
+      JavaScript injection</strong></del></span> <span 
class="inserted"><ins><em>source code</em></ins></span> for <span 
class="removed"><del><strong>tracking</strong></del></span> <span 
class="inserted"><ins><em>these apps,</em></ins></span> and <span 
class="removed"><del><strong>display ads.&lt;/dd&gt;
+  &lt;/dl&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;&lt;a 
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A</strong></del></span>
 study
+    <span class="inserted"><ins><em>the source code somehow to determine 
whether they mistreat users</em></ins></span> in <span 
class="removed"><del><strong>2015&lt;/a&gt; found that 90%</strong></del></span>
+    <span class="inserted"><ins><em>various ways. If it did a good 
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or 
less
+    prevent such snooping, except when</em></ins></span> the <span 
class="removed"><del><strong>top-ranked gratis
+  proprietary Android apps contained recognizable tracking libraries. 
For</strong></del></span> <span class="inserted"><ins><em>app developers are 
clever
+    enough to outsmart</em></ins></span> the <span 
class="removed"><del><strong>paid proprietary</strong></del></span> <span 
class="inserted"><ins><em>checking.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="removed"><del><strong>iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
+    &lt;p&gt;But since Google itself develops malicious</em></ins></span> 
apps, <span class="removed"><del><strong>it was only 60%.&lt;/p&gt;
 
-    &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>preventing apps from
-    cheating? There</em></ins></span> is <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>no systematic</em></ins></span> way <span 
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
-    to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>inspect executable 
proprietary apps to see what they do.&lt;/p&gt;
-
-    &lt;p&gt;Google could demand the source code for these apps, and study
-    the source code somehow to determine whether they mistreat users in
-    various ways. If</em></ins></span> it <span 
class="removed"><del><strong>still counts as</strong></del></span> <span 
class="inserted"><ins><em>did</em></ins></span> a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>good job</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>this, it could more or less
-    prevent such snooping, except when the app developers are clever
-    enough to outsmart the checking.&lt;/p&gt;
-
-    &lt;p&gt;But since Google itself develops malicious apps, we cannot trust
-    Google</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span> <span 
class="inserted"><ins><em>protect us. We must demand release</em></ins></span> 
of <span class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed 
to break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>source 
code</em></ins></span> to <span class="removed"><del><strong>get at them, but 
NSA</strong></del></span> <span class="inserted"><ins><em>the
-    public, so we</em></ins></span> can <span 
class="removed"><del><strong>access any of them through</strong></del></span> 
<span class="inserted"><ins><em>depend on each other.&lt;/p&gt;
+  &lt;p&gt;The article confusingly describes gratis apps as &ldquo;free&rdquo;,
+  but most of them are not in fact
+  &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.
+  It also uses</strong></del></span> <span class="inserted"><ins><em>we cannot 
trust
+    Google to protect us. We must demand release of source code 
to</em></ins></span> the <span class="removed"><del><strong>ugly word 
&ldquo;monetize&rdquo;. A good replacement
+  for that word is &ldquo;exploit&rdquo;; nearly always that will fit
+  perfectly.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>public, so we can depend on each 
other.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705230"&gt;
-    &lt;p&gt;Apps for BART</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Spyware in iThings:
-      the</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201705230"&gt;</em></ins></span>
+    &lt;p&gt;Apps for BART &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;snoop</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"&gt;
-    snoop on users&lt;/a&gt;.&lt;/p&gt;
+    snoop</em></ins></span> on users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
@@ -1358,376 +1200,371 @@
     &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users 
by</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in</em></ins></span> stores <span 
class="removed"><del><strong>determine exactly where the iThing is,
-      and get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>or played by TV
-    programs&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
+    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+    
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
+    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web sites</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704260"&gt;
-    &lt;p&gt;Faceapp appears</em></ins></span> to <span 
class="removed"><del><strong>track users, which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled</strong></del></span> <span class="inserted"><ins><em>do lots of 
surveillance, judging</em></ins></span> by <span 
class="removed"><del><strong>default&lt;/a&gt;.  (That article talks about iOS 
6, but</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  &lt;li id="M201704260"&gt;
+    &lt;p&gt;Faceapp appears to do lots of surveillance, judging by &lt;a
     
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-    how much access</em></ins></span> it
-      <span class="removed"><del><strong>is still true</strong></del></span> 
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in 
<span class="removed"><del><strong>iOS 7.)&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the 
device&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    how much access it demands to personal data in the 
device&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for</em></ins></span> its <span 
class="removed"><del><strong>geolocation&lt;/a&gt; by default, 
though</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,
+  &lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for &lt;a
+    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
     the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>this was done without the users' consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should</em></ins></span> be
-      <span class="removed"><del><strong>turned off.&lt;/p&gt;
+    would that make it acceptable? No way! It should be flat out &lt;a
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>flat out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;</em></ins></span>
+    &lt;p&gt;Pairs of Android apps can collude
+    to transmit users' personal data to servers. &lt;a
+    
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
+    study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal to design</em></ins></span>
-    the <span class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>app to</em></ins></span> snoop <span 
class="removed"><del><strong>on all the data in an iThing,
-      or it is totally incompetent.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;
-    &lt;p&gt;Pairs</em></ins></span> of <span class="removed"><del><strong>iOS 
seem to exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  Here is the
-      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
 
+  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
+    &lt;p&gt;Verizon</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not enough
+to legitimize actions like this.  At this point, most users have
+stopped reading the &ldquo;Terms and Conditions&rdquo;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.  Google should clearly
+and honestly identify the information</strong></del></span> it <span 
class="removed"><del><strong>collects</strong></del></span> <span 
class="inserted"><ins><em>will&lt;/a&gt; pre-install</em></ins></span>
+    on <span class="removed"><del><strong>users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span> 
Android apps <span class="removed"><del><strong>is pervasive and
-      sometimes very clever. Some trackers</strong></del></span> can <span 
class="inserted"><ins><em>collude
-    to transmit users' personal data to servers.</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
-    study found tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;p&gt;However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;Google Play (a component of Android) &lt;a
+    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks</strong></del></span> <span class="inserted"><ins><em>some of its 
phones. The app will give Verizon the same information
+    about</em></ins></span> the users' <span 
class="removed"><del><strong>movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, 
even</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets</em></ins></span> when 
<span class="inserted"><ins><em>they use
+    &lt;p&gt;Even if you disable</strong></del></span> <span 
class="inserted"><ins><em>searches that</em></ins></span> Google <span 
class="removed"><del><strong>Maps</strong></del></span> <span 
class="inserted"><ins><em>normally gets when they use
     its search engine.&lt;/p&gt;
 
-    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>app is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="inserted"><ins><em>spyware is
+    &lt;p&gt;Currently, the app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>location tracking, you</strong></del></span> 
<span class="inserted"><ins><em>the user</em></ins></span> must
+    <span class="removed"><del><strong>disable Google Play itself to 
completely stop</strong></del></span>
+    <span class="inserted"><ins><em>explicitly opt-in before</em></ins></span> 
the <span class="removed"><del><strong>tracking.  This is
+    yet another example</strong></del></span> <span 
class="inserted"><ins><em>app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>nonfree software 
pretending</strong></del></span> <span class="inserted"><ins><em>spyware is
     still spyware.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app &lt;a
     
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user</em></ins></span> data to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to <span class="removed"><del><strong>obey the 
user,
+    when it's actually doing something else.  Such</strong></del></span> a 
<span class="removed"><del><strong>thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Chinese company&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to turn the phones
-      on</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201611280"&gt;
+    &lt;p&gt;The Uber app tracks</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before</em></ins></span> and <span 
class="removed"><del><strong>off, listen to the microphone, retrieve 
geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+    movements before</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated 
to</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+  found in</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>contact list. This 
malware</strong></del></span> <span class="inserted"><ins><em>user's
-    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>designed to
-      disguise itself from investigation.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>inadequate as a protection against
+  &lt;p&gt;The article should not have described these apps as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+  &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>user's
+    consent&rdquo;</em></ins></span> for <span 
class="removed"><del><strong>granted that the usual analytics tools are
+  legitimate, but</strong></del></span> <span 
class="inserted"><ins><em>surveillance</em></ins></span> is <span 
class="removed"><del><strong>that valid?  Software developers have no right to
+  analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools that 
snoop are
+  just as wrong</strong></del></span> <span 
class="inserted"><ins><em>inadequate</em></ins></span> as <span 
class="removed"><del><strong>any other 
snooping.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
protection against
     massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Samsung phones come 
with</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Gratis Android apps 
(but not &lt;a href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
+      connect to 100</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps</strong></del></span>
+    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt;</em></ins></span> that <span 
class="removed"><del><strong>users can't 
delete&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>investigated the privacy</em></ins></span> and <span 
class="removed"><del><strong>they send so much data</strong></del></span> <span 
class="inserted"><ins><em>security of
-    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>their transmission is a
-      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;in spite of the promises</em></ins></span>
-    for <span class="removed"><del><strong>users.  Said transmission, not 
wanted or
-      requested</strong></del></span> <span class="inserted"><ins><em>privacy, 
security, and anonymity given</em></ins></span> by the <span 
class="removed"><del><strong>user, clearly must constitute 
spying</strong></del></span> <span 
class="inserted"><ins><em>majority</em></ins></span> of <span 
class="removed"><del><strong>some
-      kind.&lt;/p&gt;&lt;/li&gt;
+    research paper&lt;/a&gt; that investigated the privacy and security of
+    283 Android VPN apps concluded that &ldquo;in spite of the promises
+    for privacy, security,</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>anonymity given 
by</em></ins></span> the <span class="removed"><del><strong>average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware is present in some Android devices when they are 
sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data</strong></del></span> <span 
class="inserted"><ins><em>majority of VPN
+    apps&mdash;millions of users may be unawarely subject</em></ins></span> to 
<span class="removed"><del><strong>Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> <span 
class="inserted"><ins><em>poor security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following is</em></ins></span> a
+      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone
-      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries</em></ins></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Android phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us</strong></del></span> 
<span class="inserted"><ins><em>VPN
-    apps&mdash;millions of users may be unawarely subject to poor security
-    guarantees and abusive practices inflicted</em></ins></span> by <span 
class="inserted"><ins><em>VPN apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
-      reports that
-      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the 
<span class="removed"><del><strong>GPS and microphone in Android
-      phones</strong></del></span> <span class="inserted"><ins><em>research 
paper,
-    of some proprietary VPN apps that track users</em></ins></span> and <span 
class="removed"><del><strong>laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here is
-      &lt;a href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send</strong></del></span> 
<span class="inserted"><ins><em>infringe</em></ins></span> their <span 
class="removed"><del><strong>GPS location on
-      remote command</strong></del></span>
-    <span class="inserted"><ins><em>privacy:&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;dl class="compact"&gt;
-      &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX</em></ins></span> 
and <span class="inserted"><ins><em>Appflood,
-      meant to track</em></ins></span> users <span 
class="removed"><del><strong>cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says</strong></del></span> <span class="inserted"><ins><em>and 
show them targeted ads.&lt;/dd&gt;
+
+
+&lt;!-- #SpywareOnMobiles --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>NativeX and Appflood,
+      meant</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnMobiles"&gt;#SpywareOnMobiles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="inserted"><ins><em>show them targeted ads.&lt;/dd&gt;
 
       &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> <span class="inserted"><ins><em>has full access to 
users'
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span> <span class="inserted"><ins><em>has full 
access</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>users'
       text messages.&lt;/dd&gt;
 
-      &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs
+      &lt;dt&gt;DroidVPN</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests</em></ins></span> the
+      <span class="removed"><del><strong>obvious way &lt;a
+ 
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
+      doesn't really turn them off&lt;/a&gt;.
+      A more advanced way really does turn them off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Apple proposes
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way</strong></del></span> <span 
class="inserted"><ins><em>read logs
       for other apps and also core system logs. TigerVPN developers have
       confirmed this.&lt;/dd&gt;
 
       &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
-      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>have GPS.)&lt;/p&gt;
-  &lt;/li&gt;
+      &lt;dd&gt;Sends traffic</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>stores detailed logs and
+      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> the <span 
class="removed"><del><strong>phone is snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The nonfree Snapchat app's principal purpose 
is</strong></del></span> <span class="inserted"><ins><em>the UK government if 
requested.&lt;/dd&gt;
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>UK government if requested.&lt;/dd&gt;
 
       &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</em></ins></span> to <span 
class="removed"><del><strong>restrict</strong></del></span> the <span 
class="removed"><del><strong>use</strong></del></span>
-      <span class="inserted"><ins><em>users. The stated 
purpose</em></ins></span> of <span class="removed"><del><strong>data 
on</strong></del></span> the <span class="removed"><del><strong>user's 
computer, but it does surveillance
-      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span> <span class="inserted"><ins><em>JS 
injection is</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>display ads. Uses
-      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the user's <span class="removed"><del><strong>list</strong></del></span>
-      <span class="inserted"><ins><em>traffic through valueclick.com (an 
advertising website).&lt;/dd&gt;
-
-      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages 
returned</em></ins></span> to <span class="removed"><del><strong>Apple's 
servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number that</strong></del></span> the <span 
class="removed"><del><strong>user types into it&lt;/a&gt;;</strong></del></span>
+      <span class="inserted"><ins><em>users. The stated purpose 
of</em></ins></span> the <span class="removed"><del><strong>server records 
these numbers for at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>JS injection is</em></ins></span> to <span 
class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>display ads. Uses
+      roughly five tracking libraries. Also, it redirects</em></ins></span> 
the <span class="inserted"><ins><em>user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The moviepass</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> app <span 
class="inserted"><ins><em>have confirmed that
-      the non-premium version of the app does JavaScript injection for
-      tracking the user</em></ins></span> and <span 
class="removed"><del><strong>dis-service spy on users even more than users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going to a movie&lt;/a&gt;.
-    &lt;/p&gt;
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript</em></ins></span> code <span 
class="removed"><del><strong>Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Around 47%</strong></del></span> <span 
class="inserted"><ins><em>into HTML pages, and also uses roughly
+      five tracking libraries. Developers</em></ins></span> of <span 
class="inserted"><ins><em>this app have confirmed that</em></ins></span>
+      the <span class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral and location information&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>non-premium version</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered driving 
apps can</strong></del></span>
+  &lt;li&gt;&lt;p&gt;iThings automatically upload to Apple's servers 
all</strong></del></span> the <span 
class="removed"><del><strong>photos</strong></del></span> <span 
class="inserted"><ins><em>app does JavaScript injection for
+      tracking the user</em></ins></span> and
+      <span class="removed"><del><strong>videos they make.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud</strong></del></span> <span class="inserted"><ins><em>displaying 
ads.&lt;/dd&gt;
+    &lt;/dl&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The 
Sarahah</strong></del></span>
+  &lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo</em></ins></span> app &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>email 
addresses&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>suggests you to share the picture you take according 
to who is</em></ins></span>
-    in <span class="removed"><del><strong>user's address
-      book</strong></del></span> <span class="inserted"><ins><em>the 
frame.&lt;/p&gt;
+  &lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic</em></ins></span> Photo <span 
class="removed"><del><strong>Library stores every</strong></del></span> <span 
class="inserted"><ins><em>app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    scans your mobile phone's</em></ins></span> photo <span 
class="inserted"><ins><em>collections for known 
faces&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>video</strong></del></span> <span 
class="inserted"><ins><em>suggests</em></ins></span> you <span 
class="removed"><del><strong>take,</strong></del></span> <span 
class="inserted"><ins><em>to share the picture you take according to who is
+    in the frame.&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>developer's server.  Note that this article 
misuses</strong></del></span> <span class="inserted"><ins><em>require online 
access to some
-    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span class="inserted"><ins><em>pictures 
are likely to be
-    sent across the wire to Facebook's servers and face-recognition
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which means the pictures are likely to be
+    sent across the wire to Facebook's servers</em></ins></span> and <span 
class="removed"><del><strong>keeps</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
     algorithms.&lt;/p&gt;
 
     &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="removed"><del><strong>zero price.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the service.&lt;/p&gt;</em></ins></span>
+    even if the user didn't &ldquo;upload&rdquo;</em></ins></span> them <span 
class="removed"><del><strong>up</strong></del></span> to <span 
class="removed"><del><strong>date on</strong></del></span> <span 
class="inserted"><ins><em>the service.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;</em></ins></span>
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
-    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening to or watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens</em></ins></span> all <span 
class="removed"><del><strong>your devices.
+      Any edits you make are automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data in the 
device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;(From</strong></del></span> <span class="inserted"><ins><em>the 
time,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/"&gt;Apple's
 iCloud
+      information&lt;/a&gt; as accessed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop</em></ins></span> on <span class="removed"><del><strong>24 Sep 
2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
+    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>what people are listening</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span> <span class="inserted"><ins><em>or watching&lt;/a&gt;. 
In addition,</em></ins></span>
+    it <span class="removed"><del><strong>still counts as a
+      surveillance functionality.&lt;/p&gt;
 
-   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the
-    user must explicitly opt-in before the app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
+    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span class="inserted"><ins><em>may be analyzing 
people's conversations</em></ins></span> to <span 
class="inserted"><ins><em>serve them with targeted
+    advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201604250"&gt;
-    &lt;p&gt;A</em></ins></span> pregnancy test controller application not 
only can &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+  &lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy</em></ins></span> on many sorts of data in the phone, and in server 
accounts,
-    it can alter them <span class="removed"><del><strong>too&lt;/a&gt;.
+    spy on</em></ins></span> many <span 
class="removed"><del><strong>celebrities&lt;/a&gt;. They needed to break Apple's
+      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>sorts</em></ins></span> of <span 
class="removed"><del><strong>them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> in <span 
class="removed"><del><strong>iThings:
+      the &lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>phone,</em></ins></span> and <span 
class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>in server 
accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio</em></ins></span> and 
<span class="removed"><del><strong>after</strong></del></span> <span 
class="inserted"><ins><em>TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps that include &lt;a
+    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on 
various</em></ins></span> sites
+    <span class="inserted"><ins><em>such as Facebook, Google+ and 
Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>app's 
functionality, was &lt;a
+    unrelated to the app's functionality, was &lt;a
     
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>user's 
consent&rdquo;</strong></del></span> <span class="inserted"><ins><em>500 most 
popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
+    to <span class="removed"><del><strong>track users, 
which</strong></del></span> <span class="inserted"><ins><em>say &ldquo;zero 
price&rdquo;</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;gratis.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;The article takes</em></ins></span> for <span 
class="removed"><del><strong>surveillance</strong></del></span> <span 
class="inserted"><ins><em>granted that the usual analytics tools are
-    legitimate, but</em></ins></span> is <span 
class="removed"><del><strong>inadequate as a protection against massive
-        surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps</strong></del></span> that <span 
class="removed"><del><strong>include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span 
class="inserted"><ins><em>takes for granted that the usual analytics tools are
+    legitimate,</em></ins></span> but <span 
class="removed"><del><strong>it</strong></del></span> is <span 
class="removed"><del><strong>still true in iOS 
7.)&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>that valid? 
Software developers have no right to
     analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that</em></ins></span> snoop <span class="removed"><del><strong>on what 
radio and TV programs</strong></del></span> are <span 
class="removed"><del><strong>playing nearby&lt;/a&gt;.  Also on what users post 
on various sites 
-      such</strong></del></span> <span 
class="inserted"><ins><em>just</em></ins></span> as <span 
class="removed"><del><strong>Facebook, Google+ and 
Twitter.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>wrong 
as any other snooping.&lt;/p&gt;</em></ins></span>
+    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iThing 
also</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of</em></ins></span> mobile <span 
class="removed"><del><strong>phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>applications, from Android</em></ins></span> and 
<span class="removed"><del><strong>suggests you to share the picture you take 
according to who
-      is in the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers</strong></del></span> <span 
class="inserted"><ins><em>iOS
-    respectively &lt;a href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt;</em></ins></span> of 
<span class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if the user didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>their 
users with
+    &lt;p&gt;More than 73% and 47% of mobile applications, from Android and iOS
+    respectively</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, though that can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
+    personal, behavioral and location information&lt;/a&gt; of their users with
     third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
-    &lt;p&gt;Like</em></ins></span> most &ldquo;music screaming&rdquo; 
disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit to increased snooping&lt;/a&gt;, and some are 
starting
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
+    based on proprietary malware (DRM</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>snooping). In August 2015 it</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit to increased snooping&lt;/a&gt;, 
and</em></ins></span> some <span class="removed"><del><strong>data from iPhones 
for</strong></del></span> <span class="inserted"><ins><em>are starting
     to realize that it is nasty.&lt;/p&gt;
 
-    &lt;p&gt;This article shows the &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;</em></ins></span>
+    &lt;p&gt;This article shows</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
     twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the <span 
class="removed"><del><strong>attitude</strong></del></span> <span 
class="inserted"><ins><em>attitude of the proprietary software industry
+    typical example of</em></ins></span> the <span 
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>attitude of</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>proprietary software industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1736,80 +1573,207 @@
   &lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
-    study in 2015&lt;/a&gt; found that 90% of the top-ranked gratis proprietary
+    study</em></ins></span> in <span class="removed"><del><strong>an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>2015&lt;/a&gt; 
found that 90% of the top-ranked gratis proprietary
     Android apps contained recognizable tracking libraries. For the paid
-    proprietary apps, it was only 60%.&lt;/p&gt;
+    proprietary apps,</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>was only 60%.&lt;/p&gt;
 
     &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them are not in fact &lt;a
+    &ldquo;free&rdquo;, but most</em></ins></span> of <span 
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span 
class="inserted"><ins><em>them are not in fact &lt;a
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>that 
word</em></ins></span>
+    is <span class="removed"><del><strong>the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis Android apps (but not &lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;) connect to 100 
&lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on the average.&lt;/p&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="removed"><del><strong>is pervasive and
+      sometimes very clever. Some trackers can</strong></del></span> <span 
class="inserted"><ins><em>(but not</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Android tracks location for Google</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
+    and advertising&lt;/a&gt; URLs, on</em></ins></span> the <span 
class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>average.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504060"&gt;
-    &lt;p&gt;Widely used &lt;a
-    
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
-    the snooping done by the phone company, and perhaps by the OS in
-    the phone.&lt;/p&gt;
-
-    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="inserted"><ins><em>whether</em></ins></span> the <span 
class="removed"><del><strong>proprietary software industry towards
-      those they have subjugated.&lt;/p&gt;
-
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app developers
-    get users to say &ldquo;I agree&rdquo;. That is no excuse for
-    malware.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Widely used</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+    QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</em></ins></span> to <span class="removed"><del><strong>Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done</em></ins></span> by 
<span class="removed"><del><strong>sending hidden text messages which enable 
them to turn</strong></del></span> the <span class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>phone 
company,</em></ins></span> and <span class="removed"><del><strong>off, listen 
to</strong></del></span> <span class="inserted"><ins><em>perhaps 
by</em></ins></span> the <span class="removed"><del><strong>microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>OS in</em></ins></span>
+    the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted by</em></ins></span> the <span 
class="removed"><del><strong>contact list. This malware is designed to
+      disguise itself from investigation.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that</strong></del></span> <span class="inserted"><ins><em>question of whether 
the app developers
+    get</em></ins></span> users <span class="removed"><del><strong>can't 
delete&lt;/a&gt;,
+      and they send so much data that their transmission</strong></del></span> 
<span class="inserted"><ins><em>to say &ldquo;I agree&rdquo;. 
That</em></ins></span> is <span class="removed"><del><strong>a
+      substantial expense</strong></del></span> <span 
class="inserted"><ins><em>no excuse</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
+      requested by the user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A Motorola phone
+      &lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens</strong></del></span>
+    <span class="inserted"><ins><em>malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201411260"&gt;
+    &lt;p&gt;Many proprietary apps</em></ins></span> for <span 
class="removed"><del><strong>voice all</strong></del></span> <span 
class="inserted"><ins><em>mobile devices
+    report which other apps</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
-    &lt;p&gt;Many</em></ins></span> proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>user has installed.  &lt;a
     href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;
+    is doing this</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us by</strong></del></span> a 
<span class="removed"><del><strong>paywall)
+      reports</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
+      the FBI can remotely activate the GPS and microphone in Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>at least</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS location on
+      remote command</strong></del></span> <span 
class="inserted"><ins><em>visible</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:</strong></del></span> 
<span class="inserted"><ins><em>optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
-    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
-    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201401150.1"&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
+    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312270"&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is to restrict the
-    use of data on the user's computer, but it does surveillance too: &lt;a
-    
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
+    &lt;p&gt;The</em></ins></span> nonfree Snapchat app's principal purpose is 
to restrict the
+    use of data on the user's computer, but <span 
class="removed"><del><strong>it does surveillance
+      too: &lt;a 
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
     it tries to get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
+      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
+    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Sarahah app 
+      &lt;a 
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;
+       &lt;/li&gt;
+
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span> <span class="inserted"><ins><em>it does surveillance 
too:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;</em></ins></span>
+    it <span class="removed"><del><strong>demands</strong></del></span> <span 
class="inserted"><ins><em>tries</em></ins></span> to <span 
class="removed"><del><strong>personal data in</strong></del></span> <span 
class="inserted"><ins><em>get</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's list of other people's phone
+    numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app &lt;a
-    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve sending personal data to the app developer but did not ask
-    about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
-    surveillance: why should a flashlight app send any information to
-    anyone? A free software flashlight app would not.&lt;/p&gt;
+    &lt;p&gt;The FTC criticized this</em></ins></span> app <span 
class="removed"><del><strong>that</strong></del></span> <span 
class="inserted"><ins><em>because</em></ins></span> it <span 
class="removed"><del><strong>will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about</strong></del></span> <span 
class="inserted"><ins><em>asked</em></ins></span> the <span 
class="removed"><del><strong>users' searches that Google normally gets when
+   they use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>user to
+    approve sending personal data to</em></ins></span> the app <span 
class="removed"><del><strong>is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span> 
<span class="inserted"><ins><em>developer but did not ask
+    about sending it to other companies.  This shows</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>weakness 
of</em></ins></span>
+    the <span class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo; to
+    surveillance: why should a flashlight</em></ins></span> app <span 
class="removed"><del><strong>takes effect. However, the</strong></del></span> 
<span class="inserted"><ins><em>send any information to
+    anyone? A free software flashlight</em></ins></span> app <span 
class="removed"><del><strong>remains spyware&mdash;an &ldquo;optional&rdquo; 
piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>would not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC</em></ins></span> says most mobile apps for children don't 
respect privacy: &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1823,8 +1787,9 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains &lt;a
-    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
     Microsoft changed Skype &lt;a
     
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;
@@ -1840,75 +1805,100 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It &lt;a
+    is found in</em></ins></span> many <span 
class="removed"><del><strong>sorts of</strong></del></span> <span 
class="inserted"><ins><em>proprietary games. It &lt;a
     
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends it to third 
parties&lt;/a&gt;.&lt;/p&gt;
+    tracks</em></ins></span> data <span class="removed"><del><strong>in the 
phone,</strong></del></span> <span class="inserted"><ins><em>on users' 
computers</em></ins></span> and <span class="removed"><del><strong>in server 
accounts,</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span> it <span 
class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>to third 
parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update to the massive
+    program along with an update to</em></ins></span> the <span 
class="inserted"><ins><em>massive
     multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
     
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    to snoop on all open processes running on its</em></ins></span> user's 
<span class="removed"><del><strong>consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    &lt;p&gt;The driver</em></ins></span> for <span 
class="removed"><del><strong>surveillance is inadequate 
as</strong></del></span> a <span class="removed"><del><strong>protection 
against massive
+        surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>certain gaming keyboard</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
     information to China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps that 
include</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
-    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps</strong></del></span>
+    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles</em></ins></span> snoop on <span 
class="inserted"><ins><em>their users and report to</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span>
-    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
-
-    &lt;p&gt;A game console</em></ins></span> is <span 
class="removed"><del><strong>in addition to</strong></del></span> <span 
class="inserted"><ins><em>a computer, and you can't trust a computer with
-    a nonfree operating system.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
-    
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
+    video game consoles</em></ins></span> snoop on <span 
class="removed"><del><strong>what radio</strong></del></span> <span 
class="inserted"><ins><em>their users</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
+      are playing nearby&lt;/a&gt;.  Also on</strong></del></span> <span 
class="inserted"><ins><em>report to the
+    internet&lt;/a&gt;&mdash;even</em></ins></span> what <span 
class="inserted"><ins><em>their</em></ins></span> users <span 
class="removed"><del><strong>post on various sites 
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>weigh.&lt;/p&gt;
+
+    &lt;p&gt;A game console is a computer,</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you can't trust a computer with
+    a nonfree operating system.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+    collect a wide range of data about their users</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the picture you take 
according to who
+      is in</strong></del></span> <span class="inserted"><ins><em>their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that 
merge</em></ins></span> the <span class="removed"><del><strong>snooping 
done</strong></del></span> <span class="inserted"><ins><em>data
-    collected</em></ins></span> by <span class="removed"><del><strong>the 
phone company,</strong></del></span> <span class="inserted"><ins><em>various 
cr&hellip;apps</em></ins></span> and <span 
class="removed"><del><strong>perhaps</strong></del></span> <span 
class="inserted"><ins><em>sites made</em></ins></span> by <span 
class="removed"><del><strong>the OS in the
-      phone.&lt;/p&gt;
+    &lt;p&gt;Even nastier, they do it through ad networks that 
merge</em></ins></span> the <span class="removed"><del><strong>frame.&lt;/p&gt;
 
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>different
+      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>data
+    collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question</strong></del></span> 
<span class="inserted"><ins><em>led to spend a lot</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
-      users</strong></del></span> <span class="inserted"><ins><em>money. They 
also
-    use a back door</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no 
excuse</strong></del></span> <span class="inserted"><ins><em>manipulate the 
game play</em></ins></span> for <span 
class="removed"><del><strong>malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>specific players.&lt;/p&gt;
+    &lt;p&gt;They use this data</em></ins></span> to <span 
class="removed"><del><strong>some
+      known-faces database, which means the pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>manipulate 
people</em></ins></span> to <span class="inserted"><ins><em>buy things, and 
hunt for
+    &ldquo;whales&rdquo; who can</em></ins></span> be
+      <span class="removed"><del><strong>sent across the 
wire</strong></del></span> <span 
class="inserted"><ins><em>led</em></ins></span> to <span 
class="removed"><del><strong>Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>spend a lot</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if the user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>money. They also
+    use a back door</em></ins></span> to <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>service.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
 
     &lt;p&gt;While the article describes gratis games, games that cost money
     can use the same tactics.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased 
snooping&lt;/a&gt;,</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies</em></ins></span> for <span class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span> <span class="inserted"><ins><em>companies, 
and</em></ins></span> the <span class="removed"><del><strong>user to
-      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>NSA takes advantage</em></ins></span>
-    to <span class="removed"><del><strong>the app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>spy through</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This shows the
-      weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>too&lt;/a&gt;.  Here's information on &lt;a
-    
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>some
+      are starting</strong></del></span> <span class="inserted"><ins><em>the 
NSA takes advantage</em></ins></span>
+    to <span class="removed"><del><strong>realize that</strong></del></span> 
<span class="inserted"><ins><em>spy through</em></ins></span> it <span 
class="removed"><del><strong>is nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.  Here's information 
on</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
@@ -1918,75 +1908,52 @@
 
   &lt;li id="M200510200"&gt;
     &lt;p&gt;Blizzard Warden is a hidden
-    &ldquo;cheating-prevention&rdquo; program that &lt;a
+    &ldquo;cheating-prevention&rdquo; program</em></ins></span> that <span 
class="removed"><del><strong>they present snooping as</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
     href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
-    spies on every process running on</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information</strong></del></span> <span 
class="inserted"><ins><em>gamer's computer and sniffs a
-    good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do with cheating.&lt;/p&gt;</em></ins></span>
+    spies on every process running on</em></ins></span> a <span 
class="removed"><del><strong>way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This is</strong></del></span> <span 
class="inserted"><ins><em>gamer's computer and sniffs</em></ins></span> a <span 
class="removed"><del><strong>typical example</strong></del></span>
+    <span class="inserted"><ins><em>good deal</em></ins></span> of
+      <span class="removed"><del><strong>the attitude</strong></del></span> 
<span class="inserted"><ins><em>personal data&lt;/a&gt;, including 
lots</em></ins></span> of <span class="removed"><del><strong>the proprietary 
software industry towards
+      those they</strong></del></span> <span 
class="inserted"><ins><em>activities which</em></ins></span>
+    have <span class="removed"><del><strong>subjugated.&lt;/p&gt;
+
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>nothing to do with 
cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many proprietary apps 
for mobile</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
-&lt;div <span class="removed"><del><strong>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>Connected Equipment&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201708280"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major</strong></del></span> <span 
class="inserted"><ins><em>bad</em></ins></span> security <span 
class="removed"><del><strong>vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen</strong></del></span> in <span 
class="removed"><del><strong>on a child's speech, and even speak
-      into the toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
+  &lt;li id="M201708280"&gt;
+    &lt;p&gt;The bad security in many Internet of Stings</em></ins></span> 
devices <span class="removed"><del><strong>report which other
+    apps the user has
+    installed.</strong></del></span> <span 
class="inserted"><ins><em>allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop</em></ins></span> on <span class="removed"><del><strong>its users 
through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    to snoop on the people</em></ins></span> that <span 
class="removed"><del><strong>at least</strong></del></span> <span 
class="inserted"><ins><em>use them&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded by a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
     
-    &lt;p&gt;Note</strong></del></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than free software which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>people</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>use them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>vibrator
-      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>data to</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>article uses the 
term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1994,613 +1961,608 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The 
other day a woman came up</em></ins></span> to <span 
class="removed"><del><strong>figure</strong></del></span> <span 
class="inserted"><ins><em>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see</em></ins></span> out
-      <span class="removed"><del><strong>who</strong></del></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>other way.&rdquo; Evidently that was
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
+said, &ldquo;Didn't I see you</em></ins></span> on <span 
class="inserted"><ins><em>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a 
total</strong></del></span> <span class="inserted"><ins><em>TV 
sees,&rdquo;&lt;/a&gt; in the own words</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>the company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    &lt;p&gt;Vizio TVs &lt;a
+    
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in the own words of the 
company's
+    CTO, and this data is sold to third parties.</em></ins></span> This is in 
<span class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>return for
     &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by</strong></del></span> <span class="inserted"><ins><em>him,
-    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>Vizio 
software is
-    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>scenes,</em></ins></span>
-    and <span class="inserted"><ins><em>there is no guarantee that all future 
updates will leave</em></ins></span> the <span class="removed"><del><strong>FBI 
could listen to these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;What is supposed to make this spying acceptable, 
according</em></ins></span> to <span class="inserted"><ins><em>him,
+    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>snooping done by</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
+    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>phone company,</strong></del></span> 
<span class="inserted"><ins><em>scenes,</em></ins></span>
+    and <span class="removed"><del><strong>perhaps by the OS 
in</strong></del></span> <span class="inserted"><ins><em>there is no guarantee 
that all future updates will leave</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+      &lt;p&gt;Don't be distracted by</strong></del></span>
     <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way</em></ins></span> to <span 
class="removed"><del><strong>spy on children and adults&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareOnSmartWatches --&gt;
-&lt;!-- WEBMASTERS:</strong></del></span> make sure <span 
class="removed"><del><strong>to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>it isn't spying</em></ins></span> on <span 
class="removed"><del><strong>&ldquo;Smart&rdquo; Watches&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;
-    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>you</em></ins></span> is <span 
class="removed"><del><strong>designed
-      &lt;a 
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
-    to <span class="removed"><del><strong>report its 
location</strong></del></span> <span class="inserted"><ins><em>disconnect it 
from the Internet, and use a terrestrial antenna
+    matter),</em></ins></span> the <span class="removed"><del><strong>question 
of whether</strong></del></span> <span class="inserted"><ins><em>easiest way to 
make sure it isn't spying on you is
+    to disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>app developers</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>someone else</strong></del></span> <span 
class="inserted"><ins><em>get your own router (which can
-    be an old computer running completely free software),</em></ins></span> 
and <span class="inserted"><ins><em>set up a
-    firewall</em></ins></span> to <span class="removed"><del><strong>transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; 
comes</strong></del></span> <span class="inserted"><ins><em>block connections 
to Vizio's servers. Or, as a last resort,
-    you can replace your TV</em></ins></span> with <span 
class="removed"><del><strong>an Android app</strong></del></span> <span 
class="inserted"><ins><em>another model.&lt;/p&gt;
+    if you are technically oriented, is to</em></ins></span> get
+      <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>your own router (which can
+    be an old computer running completely free software), and set up a
+    firewall</em></ins></span> to <span class="removed"><del><strong>say 
&ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or, as a last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> article <span 
class="removed"><del><strong>says this is a back door, but that could be a
-      misunderstanding.  However,</strong></del></span> <span 
class="inserted"><ins><em>for the facts</em></ins></span> it <span 
class="inserted"><ins><em>presents. It</em></ins></span>
-    is <span class="removed"><del><strong>certainly surveillance, at
-      least.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>too bad that the article finishes by advocating the
-    moral weakness of surrendering</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
 
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;We link to the article</em></ins></span> for <span 
class="removed"><del><strong>use by companies.&lt;/a&gt;&lt;/p&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+      &lt;p&gt;The FTC criticized this app because</strong></del></span> <span 
class="inserted"><ins><em>the facts</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>presents. It
+    is too bad that</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the
+    <span class="inserted"><ins><em>moral weakness of surrendering to Netflix. 
The Netflix</em></ins></span> app <span class="removed"><del><strong>developer 
but did</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702060"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
     
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything</em></ins></span> that <span 
class="removed"><del><strong>the specific sabotage method Lenovo used did not 
affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
is <span class="inserted"><ins><em>viewed on them, and</em></ins></span> not 
<span class="removed"><del><strong>really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its</strong></del></span> <span class="inserted"><ins><em>just 
broadcasts and
-    cable&lt;/a&gt;. Even if the image is coming from the 
user's</em></ins></span> own <span 
class="removed"><del><strong>malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>computer,</em></ins></span>
-    the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>TV reports what 
it is. The existence</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>a way to disable the
-    surveillance, even if</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+    report everything that is viewed on them, and</em></ins></span> not
+      <span class="removed"><del><strong>ask about sending it to other 
companies.  This shows</strong></del></span> <span 
class="inserted"><ins><em>just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the
+      <span class="removed"><del><strong>weakness of</strong></del></span> 
<span class="inserted"><ins><em>image is coming from</em></ins></span> the 
<span class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>user's own computer,
+    the TV reports what it is. The existence of</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>were not hidden as it was</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
+  &lt;li&gt;
+    &lt;p&gt;A remote-control sex toy</strong></del></span> <span 
class="inserted"><ins><em>disable the
+    surveillance, even if it were not hidden as it</em></ins></span> was <span 
class="removed"><del><strong>found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of</strong></del></span> <span class="inserted"><ins><em>in these TVs,
+    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>be picked up by proprietary malware 
running</em></ins></span>
-    on <span class="removed"><del><strong>The Road&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>other devices</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;Some web</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>TV 
advertisements play inaudible
+    sounds</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
+      a speech recognition company based</strong></del></span> <span 
class="inserted"><ins><em>be picked up by proprietary malware running
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its 
manufacturer</strong></del></span> <span class="inserted"><ins><em>range so as 
to determine that they
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>range so as to 
determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>communicate</strong></del></span> <span 
class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="removed"><del><strong>it,
-      is a surveillance device.</strong></del></span> <span 
class="inserted"><ins><em>Web activity, and other</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, 
based</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely control the toys</strong></del></span> 
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="inserted"><ins><em>Web activity, and other &lt;a
+    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes a step further than other TV
-    manufacturers in spying</em></ins></span> on <span 
class="removed"><del><strong>the fact</strong></del></span> <span 
class="inserted"><ins><em>their users: their &lt;a
-    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+    &lt;p&gt;Vizio goes</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>step further than other TV
+    manufacturers</em></ins></span> in <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>their users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="removed"><del><strong>the device</strong></del></span> <span 
class="inserted"><ins><em>advertisers can track you
+    link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>possible</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>turn 
this off, but having</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates that</strong></del></span> <span 
class="inserted"><ins><em>enabled by default
+    &lt;p&gt;It is possible to turn this off, but having</em></ins></span> it 
<span class="removed"><del><strong>was surrounded</strong></del></span> <span 
class="inserted"><ins><em>enabled</em></ins></span> by <span 
class="removed"><del><strong>a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to</em></ins></span> the <span class="removed"><del><strong>device 
gives</strong></del></span> <span class="inserted"><ins><em>600 millions social 
media profiles</em></ins></span> the company
-    <span class="inserted"><ins><em>already monitors. Tivo customers are 
unaware they're
+    to</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard</strong></del></span> <span class="inserted"><ins><em>company
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
+    information</em></ins></span> with <span 
class="removed"><del><strong>which manufacturers would make statements about
+      their products, rather than free software which</strong></del></span> 
<span class="inserted"><ins><em>online social media participation, Tivo can now 
&lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users to new combined</em></ins></span> surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>by default.&lt;/p&gt;</em></ins></span>
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
+    users <span class="removed"><del><strong>could have
+      checked</strong></del></span> <span class="inserted"><ins><em>to new 
combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The Nest Cam</strong></del></span>
+  &lt;li id="M201507240"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>changed.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>camera is</strong></del></span> <span 
class="inserted"><ins><em>TVs recognize and</em></ins></span> &lt;a
-      <span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;always</strong></del></span>
+    &lt;p&gt;The company that made the vibrator</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about 
how</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are</em></ins></span> watching&lt;/a&gt;, <span 
class="removed"><del><strong>even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
-      you.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    what</em></ins></span> people <span class="removed"><del><strong>used 
it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>are watching&lt;/a&gt;, even if</em></ins></span> it 
<span class="removed"><del><strong>had sold the data to</strong></del></span> 
<span class="inserted"><ins><em>isn't</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able to figure out
+      who the user was.&lt;/p&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and</strong></del></span> <span class="inserted"><ins><em>even if it isn't 
a TV channel.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;</em></ins></span>
-    snoops on <span class="removed"><del><strong>readers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they 
wanted</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span>
+    <span class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report</strong></del></span> <span class="inserted"><ins><em>what 
programs people watch, and</em></ins></span> even <span 
class="removed"><del><strong>which page the user reads at</strong></del></span> 
what <span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used</em></ins></span> a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>firmware 
&ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make</em></ins></span> its <span 
class="removed"><del><strong>customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>they 
wanted</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
+    Nuance can save it</em></ins></span> and <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    other government.&lt;/p&gt;
+
+    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable</strong></del></span> <span 
class="inserted"><ins><em>be trusted unless it is done</em></ins></span> by 
<span class="removed"><del><strong>itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>free
+    software in your own computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="removed"><del><strong>spy on 
children and adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third
+    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;!-- #SpywareOnSmartWatches --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnSmartWatches"&gt;Spyware on</strong></del></span>
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not</em></ins></span> do <span 
class="removed"><del><strong>because the system has no authentication when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident</strong></del></span> that <span 
class="removed"><del><strong>Nissan has no
-    access.  The software in the car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon</em></ins></span> &ldquo;Smart&rdquo; <span 
class="removed"><del><strong>Watches&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;
+    (&lt;a 
href="#SpywareOnSmartWatches"&gt;#SpywareOnSmartWatches&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone
-    modem enables the phone company to track the car's movements all
-    the time; it is possible to physically remove the cell phone modem
-    though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>when first sold.&lt;/p&gt;</em></ins></span>
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>TV</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+       to report its location to someone else and to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
-      others.&lt;/p&gt;
-
-      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
-    Nuance can save it</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>invasion isn't done by malware. 
The</strong></del></span> <span class="inserted"><ins><em>US or 
some</em></ins></span>
-    other
-      <span class="removed"><del><strong>cases mentioned 
are</strong></del></span> <span class="inserted"><ins><em>government.&lt;/p&gt;
-
-    &lt;p&gt;Speech recognition is not to be trusted unless it 
is</em></ins></span> done by <span class="removed"><del><strong>proprietary 
malware</strong></del></span> <span class="inserted"><ins><em>free
-    software</em></ins></span> in <span class="removed"><del><strong>the 
car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to 
extract</strong></del></span> <span class="inserted"><ins><em>your own 
computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</em></ins></span>
-    data <span class="removed"><del><strong>remotely and
-      determine</strong></del></span> <span 
class="inserted"><ins><em>containing sensitive information will be transmitted 
to third
-    parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
-    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The company says it doesn't
-      store this information,</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;
+    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The report was as of 2014,</em></ins></span> but <span 
class="removed"><del><strong>if the state orders it</strong></del></span> <span 
class="inserted"><ins><em>we don't expect this has got
+    &lt;p&gt;The <span class="removed"><del><strong>article says this is a 
back door,</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014,</em></ins></span> but <span class="inserted"><ins><em>we don't expect 
this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows that laws requiring products</em></ins></span> to get 
<span class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>users' formal
-    consent before collecting personal</em></ins></span> data
-      <span class="removed"><del><strong>and hand it 
over,</strong></del></span> <span class="inserted"><ins><em>are totally 
inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>state can store it.&lt;/p&gt;
+    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>could be</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
+      least.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>TV will
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
     say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots of &ldquo;smart&rdquo; 
products</strong></del></span> <span class="inserted"><ins><em>tracking, the TV 
will not
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs</em></ins></span> are
-        <span class="removed"><del><strong>designed &lt;a 
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-        listen</strong></del></span> <span class="inserted"><ins><em>not 
allowed</em></ins></span> to <span 
class="removed"><del><strong>everyone</strong></del></span> <span 
class="inserted"><ins><em>report what the
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact that</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of
-    making</strong></del></span> <span class="inserted"><ins><em>transmission 
reports</em></ins></span> a <span 
class="removed"><del><strong>device</strong></del></span> <span 
class="inserted"><ins><em>404 error
-    really means nothing; the server could save</em></ins></span> that <span 
class="removed"><del><strong>can obey your voice commands without
-    potentially spying on you.  Even if</strong></del></span> <span 
class="inserted"><ins><em>data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>is air-gapped,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>switch 
to turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span class="inserted"><ins><em>404 
error</em></ins></span>
+    really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>means nothing; the server could save that data 
anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
-    product</em></ins></span> could <span class="removed"><del><strong>be
-    saving up records about you for later examination.&lt;/p&gt;
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span> <span class="inserted"><ins><em>spy this 
way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot</strong></del></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
+    product could spy this way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span class="removed"><del><strong>data about 
the user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
+
+
+&lt;!-- #SpywareOnTheRoad --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareOnTheRoad"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>The Road&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnTheRoad"&gt;#SpywareOnTheRoad&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInCameras"&gt;Spyware 
in Cameras&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
+      is a surveillance device.</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture</em></ins></span> to <span 
class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>Amazon servers&lt;/a&gt;, which save it
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+      Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
     &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>how Ring used to let individual employees look
-    at</em></ins></span> the <span class="removed"><del><strong>other 
way.&rdquo; Evidently</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent</em></ins></span> that <span class="removed"><del><strong>was
-before</strong></del></span>
-    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that</em></ins></span> Amazon <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs.&lt;/p&gt;
+    passes by, the user's front door.&lt;/p&gt;</em></ins></span>
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>gets the
+    &lt;p&gt;The article <span class="removed"><del><strong>describes 
wrongdoing by the manufacturer, based</strong></del></span> <span 
class="inserted"><ins><em>focuses</em></ins></span> on <span 
class="inserted"><ins><em>how Ring used to let individual employees look
+    at</em></ins></span> the <span 
class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>videos freely.  It appears Amazon has tried to 
prevent</em></ins></span> that
+    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of</em></ins></span> everything 
<span class="inserted"><ins><em>they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give</em></ins></span> the <span class="removed"><del><strong>device is 
tethered to</strong></del></span> <span class="inserted"><ins><em>manufacturer 
an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would 
be</em></ins></span> a <span class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But</strong></del></span> <span class="inserted"><ins><em>better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>suggested</em></ins></span> that <span 
class="inserted"><ins><em>these
+    manufacturers promise not to look at what's in</em></ins></span> the <span 
class="removed"><del><strong>device gives the company</strong></del></span> 
<span class="inserted"><ins><em>videos. That's not
     security for your home. Security means making sure they don't get to
     see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    &lt;p&gt;Over 70 brands of network-connected</em></ins></span> 
surveillance <span 
class="removed"><del><strong>capability.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cameras have &lt;a
     
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs</em></ins></span> that <span class="inserted"><ins><em>allow 
anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
+    security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511250"&gt;
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera</em></ins></span> is 
<span class="removed"><del><strong>viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming 
from</strong></del></span> <span class="inserted"><ins><em>&lt;a
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;</em></ins></span>
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
     href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when</em></ins></span> the <span class="removed"><del><strong>user's 
own
-    computer,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span 
class="removed"><del><strong>is. The existence of a way</strong></del></span>
-    to
-    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
+    to outsmart you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a &lt;a
-    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not 
hidden</strong></del></span> <span 
class="inserted"><ins><em>product</em></ins></span> as <span 
class="inserted"><ins><em>shipped doesn't act as a
-    listening device, remote changes to the code could surely 
convert</em></ins></span> it
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;/div&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
+    accessed through the modem.  However, even if it asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span>
     <span class="inserted"><ins><em>into one.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="inserted"><ins><em>make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    recordings of</em></ins></span> the <span class="removed"><del><strong>car 
remotely, the cell phone
+    modem enables</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users through</em></ins></span> the <span 
class="removed"><del><strong>phone company to track</strong></del></span> <span 
class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping</em></ins></span> on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;The <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>app</em></ins></span> was <span 
class="removed"><del><strong>as</strong></del></span> <span 
class="inserted"><ins><em>reporting the temperature</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;The app was reporting</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>temperature of</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>vibrator minute by
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>is possible to physically 
remove</strong></del></span> <span class="inserted"><ins><em>was surrounded by 
a person's
+    body), as well as</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
+    though.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
-    body), as well as the vibration frequency.&lt;/p&gt;
+  &lt;li id="records-drivers"&gt;&lt;p&gt;Proprietary software in cars
+      &lt;a 
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information</strong></del></span> <span class="inserted"><ins><em>vibration 
frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
-    standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
-    and changed.&lt;/p&gt;
+    standard with which manufacturers would make statements</em></ins></span> 
about <span class="removed"><del><strong>drivers' 
movements&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>their
+    products, rather than free software</em></ins></span> which <span 
class="removed"><del><strong>is made available to car manufacturers, insurance 
companies,</strong></del></span> <span class="inserted"><ins><em>users could 
have checked</em></ins></span>
+    and
+      <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>changed.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;The company</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products to get users' formal
-      consent before</strong></del></span> <span 
class="inserted"><ins><em>made the vibrator &lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>case of toll-collection 
systems, mentioned in this article, is not
+      really a matter of proprietary surveillance. These systems are an
+      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>company that made the vibrator &lt;a
     
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for</em></ins></span> collecting <span 
class="inserted"><ins><em>lots of</em></ins></span> personal <span 
class="removed"><del><strong>data are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>information 
about how people
+    was sued for collecting lots</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should</strong></del></span> <span 
class="inserted"><ins><em>personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>data broker</em></ins></span> would <span 
class="removed"><del><strong>say that TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>have been able</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the
-    user <span class="removed"><del><strong>watches &mdash; no 
exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio goes</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit, &lt;a
-    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered to pay</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
-      their users: their</strong></del></span> <span 
class="inserted"><ins><em>total of C$4m&lt;/a&gt; to its
+    &lt;p&gt;The company's statement that it was anonymizing the data 
may</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
+      payment systems,</strong></del></span>
+    <span class="inserted"><ins><em>true,</em></ins></span> but <span 
class="inserted"><ins><em>it doesn't really matter. If it had 
sold</em></ins></span> the <span class="removed"><del><strong>invasion isn't 
done by malware. The other
+      cases mentioned are done by proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>extract</strong></del></span> <span 
class="inserted"><ins><em>a</em></ins></span> data <span 
class="removed"><del><strong>remotely and
+      determine</strong></del></span>
+    <span class="inserted"><ins><em>broker,</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. 
(See</strong></del></span> <span class="inserted"><ins><em>data broker would 
have been able to figure out who the
+    user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b and c.&lt;/a&gt;). The</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+    the</em></ins></span> company <span class="removed"><del><strong>says it 
doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>has been ordered to pay a total of C$4m&lt;/a&gt; to 
its
     customers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
+    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access the data&lt;/a&gt; collected by the
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>access</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by the
     manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer</em></ins></span> and 
-      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so that advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable</em></ins></span> by <span 
class="removed"><del><strong>default
-      is an injustice already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>itself.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That the manufacturer</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations</em></ins></span> to <span class="inserted"><ins><em>Nuance 
Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>600 millions social media 
profiles</strong></del></span> <span class="inserted"><ins><em>U.S.&lt;/p&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Lots of</strong></del></span> <span 
class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>products are
+        designed</strong></del></span> <span class="inserted"><ins><em>toys My 
Friend Cayla and i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span 
class="removed"><del><strong>everyone</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information</strong></del></span> 
<span class="inserted"><ins><em>toys</em></ins></span> with <span 
class="removed"><del><strong>online
-      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of
+    making</strong></del></span> <span class="inserted"><ins><em>toys 
with</em></ins></span> a <span class="removed"><del><strong>device that can 
obey your voice commands without
+    potentially spying</strong></del></span> <span 
class="inserted"><ins><em>mobile phone. This would enable
+    crackers to listen in</em></ins></span> on <span 
class="removed"><del><strong>you.  Even if it is air-gapped, it could be
+    saving up records about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and <span 
class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on other <span 
class="removed"><del><strong>devices</strong></del></span> <span 
class="inserted"><ins><em>people, DJI is</em></ins></span> in
-      <span class="removed"><del><strong>range so as to determine that they 
are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't a TV channel.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that</strong></del></span> <span 
class="inserted"><ins><em>people, DJI</em></ins></span> is <span 
class="removed"><del><strong>viewed</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2609,87 +2571,98 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
+    &lt;p&gt;The HP &lt;a
+    href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV
-      &lt;a 
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span> <span class="inserted"><ins><em>user is 
still
-    paying for</em></ins></span> the <span 
class="removed"><del><strong>internet to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases,</em></ins></span> it <span class="inserted"><ins><em>spies 
on users,</em></ins></span> and <span class="inserted"><ins><em>involves 
totally unacceptable
-    restrictions in the use of ink cartridges that</em></ins></span> would 
<span class="removed"><del><strong>then have</strong></del></span> <span 
class="inserted"><ins><em>otherwise be in
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
+    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+    restrictions in the use</em></ins></span> of <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to
-      <span class="removed"><del><strong>give</strong></del></span> <span 
class="inserted"><ins><em>break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn</em></ins></span> it <span class="inserted"><ins><em>into a listening 
device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the US
-    <span class="inserted"><ins><em>told Amazon to do this,</em></ins></span> 
or <span class="removed"><del><strong>some other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not</strong></del></span> <span 
class="inserted"><ins><em>cease</em></ins></span> to <span 
class="removed"><del><strong>be trusted unless it is done
-    by free software</strong></del></span> <span 
class="inserted"><ins><em>sell the product</em></ins></span> in <span 
class="removed"><del><strong>your own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> that <span class="inserted"><ins><em>country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-      data containing sensitive information will be 
transmitted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to
-      <span class="removed"><del><strong>third 
parties&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Crackers found</em></ins></span> a way to
+    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
+    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon 
device,
+    and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
+    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
+      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
+      their users: their</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what 
the</strong></del></span>
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its</em></ins></span> 
user <span class="removed"><del><strong>watches, and</strong></del></span> 
<span class="inserted"><ins><em>by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible to turn this off, but having it 
enabled</strong></del></span> <span class="inserted"><ins><em>snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201706204"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>turn this 
off has no effect.  (The fact that</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>server
-      could save</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span class="inserted"><ins><em>everyone 
in</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices</strong></del></span> <span 
class="inserted"><ins><em>can obey your voice commands without potentially 
spying</em></ins></span>
-    on <span class="removed"><del><strong>the user's local 
network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped,</em></ins></span> it 
<span class="removed"><del><strong>had installed a patch to stop this, but any 
product</strong></del></span> could <span class="removed"><del><strong>spy this 
way.&lt;/p&gt;
-
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>be saving up records
+    a device that</em></ins></span> can <span class="removed"><del><strong>now 
&lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all users to
+      new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds 
to</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
+    on you.  Even if it is air-gapped, it could</em></ins></span> be
+      <span class="removed"><del><strong>picked</strong></del></span> <span 
class="inserted"><ins><em>saving</em></ins></span> up <span 
class="removed"><del><strong>by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>data about the 
user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>what programs</strong></del></span> <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2703,10 +2676,12 @@
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
-    monitor how often</em></ins></span> people <span 
class="removed"><del><strong>watch, and even</strong></del></span> <span 
class="inserted"><ins><em>wear it&lt;/a&gt;.&lt;/p&gt;
+    monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple to find it normal that companies
-    monitor every aspect of</em></ins></span> what they <span 
class="removed"><del><strong>wanted</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2715,103 +2690,136 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
-    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
     that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article says this is a back door, but that could be a
-    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
-  &lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize</strong></del></span> <span 
class="inserted"><ins><em>watch is designed &lt;a
     
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-    to report its location to someone else and</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>transmit conversations
-    too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    to report its location to someone else</em></ins></span> and
+      <span class="removed"><del><strong>&lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
+      even if</strong></del></span> <span class="inserted"><ins><em>to 
transmit conversations
+    too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- #SpywareInGames 
--&gt;</strong></del></span>
-
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareInGames"&gt;Spyware in 
Games&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;The driver</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201811300"&gt;
-    &lt;p&gt;In China, it is mandatory</em></ins></span> for <span 
class="inserted"><ins><em>electric
-    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>certain gaming keyboard</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information</strong></del></span>
+    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
+    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping all</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,</em></ins></span>
-    to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In 
practice, &lt;a
+    transfers technical data, including car location,
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
     href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to the government-run platform.&lt;/p&gt;</em></ins></span>
+    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes</strong></del></span>
+    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked the choices of radio programs&lt;/a&gt; in its
+    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
-    sneaking it into the contract that</em></ins></span> users <span 
class="removed"><del><strong>identify themselves and then sends 
personal</strong></del></span> <span class="inserted"><ins><em>sign for some 
digital service
-    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
-    watching you, following your movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>about them</strong></del></span> <span 
class="inserted"><ins><em>collection should be forbidden.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
+      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
+    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
+    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that 
data.&lt;/p&gt;</em></ins></span>
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in
+      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
+    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
+      transmission reports a 404 error really means nothing; the server
+      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
+    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, but any product
+      could spy this way.&lt;/p&gt;
+
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> <span class="inserted"><ins><em>won't collect 
any</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+&lt;!-- #SpywareInGames --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareInGames"&gt;Spyware in Games&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
-    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies,</strong></del></span>
+    &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
+        to China&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
-    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;nVidia's proprietary 
GeForce Experience</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201602240"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
-    cell phone modem which allows effectively anyone to &lt;a
-    href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and <span 
class="inserted"><ins><em>make changes in various
+    cell phone modem which allows effectively anyone to</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
+    access its computers remotely</em></ins></span> and <span 
class="removed"><del><strong>the NSA takes advantage</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if it asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in the car is proprietary, &lt;a
-    href="/philosophy/free-software-even-more-important.html"&gt;which means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
-    enables</em></ins></span> the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>phone 
company</em></ins></span> to <span class="removed"><del><strong>spy 
through</strong></del></span> <span class="inserted"><ins><em>track the car's 
movements all the time;</em></ins></span>
-    it <span class="removed"><del><strong>too&lt;/a&gt;.
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
+    when accessed</em></ins></span> through <span 
class="inserted"><ins><em>the modem.  However, even if</em></ins></span> it 
<span class="removed"><del><strong>too&lt;/a&gt;.
       Here's information on
       &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
       more spyware apps&lt;/a&gt;.&lt;/p&gt;
@@ -2819,22 +2827,29 @@
       More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Many 
-      &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span class="inserted"><ins><em>physically 
remove</em></ins></span> the 
+  &lt;li&gt;&lt;p&gt;Many</strong></del></span> <span 
class="inserted"><ins><em>asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in the car is proprietary,</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+      video game consoles snoop on their users and report</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</em></ins></span> to the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console is a computer, and you can't trust a computer 
with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem, though.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the time;
+    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
       &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
+      collect a wide range of data about their users</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+    &lt;p&gt;Tesla cars allow the company to extract
+    data remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
       friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
     at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
@@ -2883,20 +2898,21 @@
   &lt;li&gt;&lt;p&gt;Users are suing Bose for
       &lt;a 
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
        distributing a spyware app for its headphones&lt;/a&gt;.
-      Specifically, the app would record</strong></del></span>
+      Specifically, the app would record the names of the audio files
+      users listen to along with the headphone's unique serial number.
+    &lt;/p&gt;
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+      If the fine print of the app said that users gave 
consent</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates</em></ins></span> the <span class="removed"><del><strong>names 
of</strong></del></span> <span class="inserted"><ins><em>potential 
for</em></ins></span> the <span class="removed"><del><strong>audio files
-      users listen</strong></del></span> <span class="inserted"><ins><em>most 
intimate
-    surveillance ever. All it takes</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
-    &lt;/p&gt;
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-      If the fine print of the app said that users gave consent for this,
-      would that</strong></del></span> make <span 
class="removed"><del><strong>it acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>this potential 
real</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal to design</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    creates the potential</em></ins></span> for <span 
class="removed"><del><strong>this,
+      would that make</strong></del></span> <span 
class="inserted"><ins><em>the most intimate
+    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
+      &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+       illegal</strong></del></span> <span 
class="inserted"><ins><em>takes</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>make this potential real &lt;a
+    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
@@ -3008,23 +3024,20 @@
   <span class="inserted"><ins><em>&lt;li id="M201110040"&gt;
     &lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons &lt;a
     
href="https://www.smh.com.au/technology/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-    enable Facebook to track visitors</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>those pages&lt;/a&gt;&mdash;even users
+    enable Facebook</em></ins></span> to <span 
class="removed"><del><strong>directly examine users' 
data&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>track visitors to those pages&lt;/a&gt;&mdash;even 
users
     that don't have Facebook accounts.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make sure to place new 
items on top under each subsection --&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- WEBMASTERS: make 
sure</strong></del></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInFlash"&gt;Spyware in 
JavaScript and Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
     &lt;p&gt;Many web sites use JavaScript code &lt;a
     
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081"&gt;
@@ -3042,8 +3055,15 @@
   &lt;li id="M201807190"&gt;
     &lt;p&gt;British Airways used &lt;a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
-    JavaScript on its web site to give other companies personal data on
-    its customers&lt;/a&gt;.&lt;/p&gt;
+    JavaScript on its web site</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>give other companies personal data</em></ins></span> 
on <span class="removed"><del><strong>top under each subsection --&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInFlash"&gt;Spyware in JavaScript and Flash&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>its customers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712300"&gt;</em></ins></span>
@@ -3108,26 +3128,44 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome
-      &lt;a 
href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
-       spies on browser history, affiliations&lt;/a&gt;,
-      and other installed software.
+  &lt;li&gt;&lt;p&gt;Google Chrome</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+       spies</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data</em></ins></span> on <span 
class="removed"><del><strong>browser history, 
affiliations&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services,</em></ins></span> 
and <span class="inserted"><ins><em>the lack
+    of proper privacy policies, among</em></ins></span> other <span 
class="removed"><del><strong>installed software.
     &lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger that
-      &lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
-       sends Google every URL typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger</strong></del></span> 
<span class="inserted"><ins><em>things.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;Google Chrome includes a module that
-      &lt;a 
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-       activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize</em></ins></span> that
+      <span class="removed"><del><strong>&lt;a 
href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+       sends</strong></del></span> <span class="inserted"><ins><em>the 
software</em></ins></span> Google <span class="removed"><del><strong>every URL 
typed in&lt;/a&gt;, one key at a time.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Google Chrome includes a module 
that</strong></del></span> <span class="inserted"><ins><em>uses to spy on 
students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
+       activates microphones</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both 
education</em></ins></span> and <span class="removed"><del><strong>transmits 
audio</strong></del></span> <span class="inserted"><ins><em>school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board</em></ins></span> to 
<span class="removed"><del><strong>its 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free 
software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Google</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201507280"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
     &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
@@ -3299,7 +3337,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/03/26 10:33:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- proprietary-surveillance.de.po      17 Mar 2019 10:32:41 -0000      1.270
+++ proprietary-surveillance.de.po      26 Mar 2019 10:33:48 -0000      1.271
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -4599,6 +4599,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome makes it easy for an extension to do <a href=\"https://labs.";
 "detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
 "\">total snooping on the user's browsing</a>, and many of them do so."

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.394
retrieving revision 1.395
diff -u -b -r1.394 -r1.395
--- proprietary-surveillance.fr.po      17 Mar 2019 16:01:34 -0000      1.394
+++ proprietary-surveillance.fr.po      26 Mar 2019 10:33:48 -0000      1.395
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2019-03-17 17:00+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3912,6 +3913,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome makes it easy for an extension to do <a href=\"https://labs.";
 "detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
 "\">total snooping on the user's browsing</a>, and many of them do so."

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary-surveillance.it-diff.html       17 Mar 2019 10:32:41 -0000      
1.122
+++ proprietary-surveillance.it-diff.html       26 Mar 2019 10:33:48 -0000      
1.123
@@ -1130,76 +1130,146 @@
     &lt;p&gt;This illustrates that making unauthorized copies of 
nonfree</em></ins></span> software <span class="removed"><del><strong>industry 
towards
       those they have subjugated.&lt;/p&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>is not a cure for the injustice of nonfree 
software. It may avoid
-    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
+    apps the user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
+    is <span class="removed"><del><strong>doing this in</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
+    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>cure</em></ins></span> for <span 
class="removed"><del><strong>children don't respect privacy:
+      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in addition to
+      the snooping done by the phone company, and perhaps by the OS in the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't be distracted by</strong></del></span> the <span 
class="removed"><del><strong>question</strong></del></span> <span 
class="inserted"><ins><em>injustice</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
+      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
+      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation,</strong></del></span> <span 
class="inserted"><ins><em>nonfree software. It may avoid
+    paying</em></ins></span> for <span class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;The FTC criticized this app because it asked the user to
+      approve sending personal data to</strong></del></span> the <span 
class="removed"><del><strong>app developer</strong></del></span> <span 
class="inserted"><ins><em>nasty thing,</em></ins></span> but <span 
class="removed"><del><strong>did not
+      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>cannot make</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This shows the
+      weakness of the reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should a flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>less nasty.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Mobile Apps&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInGames"&gt;Spyware in 
Games&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInMobileApps"&gt;Mobile 
Apps&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201902230"&gt;
-    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>library</em></ins></span> for <span 
class="inserted"><ins><em>building</em></ins></span> mobile <span 
class="removed"><del><strong>devices report</strong></del></span> <span 
class="inserted"><ins><em>apps,</em></ins></span> which <span 
class="removed"><del><strong>other
-    apps the user has
-    installed.</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way</strong></del></span>
+    &lt;p&gt;Facebook offered a convenient</em></ins></span> proprietary <span 
class="removed"><del><strong>GeForce Experience</strong></del></span>
+    <span class="inserted"><ins><em>library for building mobile apps, which 
also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>at least is 
visible</strong></del></span>
-    <span class="inserted"><ins><em>way</em></ins></span> and
-    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>released them, 
apparently not realizing that all the personal
-    data they collected would go to Facebook</em></ins></span> as <span 
class="removed"><del><strong>what</strong></del></span> <span 
class="inserted"><ins><em>well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>others 
do.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>developers of other nonfree 
programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;FTC says most 
mobile</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on &lt;a
-    href="https://www.appcensus.mobi"&gt; how Android</em></ins></span> apps 
<span class="removed"><del><strong>for children don't respect 
privacy:</strong></del></span> <span class="inserted"><ins><em>use and
-    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    sent</em></ins></span> personal data <span 
class="removed"><del><strong>about them</strong></del></span> to
+      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies,</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built apps that
+    way</em></ins></span> and <span class="inserted"><ins><em>released them, 
apparently not realizing that all</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
+      Here's information on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that no one can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>AppCensus 
database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android apps 
use</em></ins></span> and <span 
class="removed"><del><strong>i-Que</strong></del></span>
+    <span class="inserted"><ins><em>misuse users' personal data&lt;/a&gt;. As 
of March 2019, nearly
+    78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit 
+      <span class="removed"><del><strong>&lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
+    Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>other 
companies,</em></ins></span> and <span class="removed"><del><strong>even speak
+      into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other companies, and</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;. This</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
+
+    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was in no hurry</em></ins></span> to <span 
class="inserted"><ins><em>take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>snooping 
done by the phone company, and perhaps by</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt;</em></ins></span> in <span 
class="inserted"><ins><em>interacting with</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+    &lt;p&gt;Many nonfree apps</em></ins></span> have
+      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
 
-      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
+    &lt;p&gt;The company that made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span class="removed"><del><strong>data 
to</strong></del></span> <span class="inserted"><ins><em>app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used 
to</em></ins></span>
-    be <span class="removed"><del><strong>distracted by the 
question</strong></del></span> <span class="inserted"><ins><em>on Google Play 
had one or more malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
+    be on Google Play had one or more malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
-      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
     the user interface of most of them was designed to make uninstallation
@@ -1208,19 +1278,16 @@
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
     general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
-    there</em></ins></span> is no <span class="removed"><del><strong>excuse 
for malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>easy way of knowing what they really 
do.&lt;/p&gt;</em></ins></span>
+    there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902010"&gt;
+  &lt;li id="M201902010"&gt;
     &lt;p&gt;An investigation of the 150 most popular
-    gratis VPN apps in Google Play found that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
+    gratis VPN apps in Google Play found that &lt;a
+    href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
     25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
     addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used</em></ins></span> for <span 
class="removed"><del><strong>use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>invasive advertising&mdash;that could
+    source code&mdash;often used for invasive advertising&mdash;that could
     potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
@@ -1233,11 +1300,11 @@
     href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span 
class="removed"><del><strong>because</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+  &lt;li id="M201901050"&gt;
+    &lt;p&gt;The Weather Channel app &lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
     stored users' locations to the company's server&lt;/a&gt;. The company is
-    being sued, demanding that</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>users of what it will do
+    being sued, demanding that it notify the users of what it will do
     with the data.&lt;/p&gt;
 
     &lt;p&gt;I think that lawsuit is about a side issue. What the company does
@@ -1253,11 +1320,10 @@
   &lt;li id="M201812290"&gt;
     &lt;p&gt;Around 40% of gratis Android apps &lt;a
     
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on the user's actions</em></ins></span> to
-      <span class="removed"><del><strong>approve sending 
personal</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on the user's actions to Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the</em></ins></span> data <span 
class="inserted"><ins><em>it obtains from the same machine via
+    Facebook can correlate the data it obtains from the same machine via
     various apps. Some of them send Facebook detailed information about
     the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
@@ -1852,7 +1918,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes a step further than other TV
+    &lt;p&gt;Vizio goes</em></ins></span> a
+      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
@@ -1865,174 +1932,112 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to the 600 millions social media profiles the company
+    to</em></ins></span> the <span class="removed"><del><strong>data 
broker</strong></del></span> <span class="inserted"><ins><em>600 millions 
social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span class="removed"><del><strong>the app 
developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>new combined surveillance by default.&lt;/p&gt;
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This shows the
-      weakness of the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>isn't</em></ins></span> a <span 
class="removed"><del><strong>flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data about 
them</strong></del></span> <span class="inserted"><ins><em>even what they 
wanted</em></ins></span> to
-      <span class="removed"><del><strong>nVidia 
servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and the NSA takes advantage</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information</strong></del></span> <span 
class="inserted"><ins><em>make its TVs snoop</em></ins></span> on
-      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>what
-    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>&ldquo;smart&rdquo; toys 
My Friend Cayla and i-Que transmit</strong></del></span> <span 
class="inserted"><ins><em>Samsung &ldquo;Smart&rdquo; TV</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on the internet</em></ins></span> to <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.</em></ins></span>
-    Nuance <span class="removed"><del><strong>Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
+  &lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
+    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and</em></ins></span> would <span 
class="inserted"><ins><em>then</em></ins></span> have <span 
class="removed"><del><strong>been able</strong></del></span> to <span 
class="removed"><del><strong>figure out
+      who the user was.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> can <span class="removed"><del><strong>remotely 
control the toys with a mobile phone. This</strong></del></span> <span 
class="inserted"><ins><em>save it and</em></ins></span> would
-      <span class="removed"><del><strong>enable crackers</strong></del></span> 
<span class="inserted"><ins><em>then have to give it</em></ins></span> to <span 
class="removed"><del><strong>listen in on a child's speech, and even speak
-      into</strong></del></span> the <span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>US 
or some
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>give it to</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered to pay a total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    &lt;p&gt;Speech recognition is not</em></ins></span> to <span 
class="inserted"><ins><em>be trusted unless it is done by free
     software in your own computer.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
-    data containing sensitive information will be transmitted to third
-    parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;In</em></ins></span> its <span 
class="removed"><del><strong>customers.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
+  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with 
microphones</strong></del></span> <span class="inserted"><ins><em>privacy 
policy, Samsung explicitly confirms that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    data containing sensitive information will be 
transmitted</em></ins></span> to <span class="inserted"><ins><em>third
+    parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;</em></ins></span>
-    snooping <span class="removed"><del><strong>on its users 
through</strong></del></span> <span 
class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
+    snooping all</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>app</strong></del></span> 
<span class="inserted"><ins><em>report</em></ins></span> was <span 
class="removed"><del><strong>reporting the temperature</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
-      minute (thus, indirectly, whether it was surrounded 
by</strong></del></span> <span class="inserted"><ins><em>2014, but we don't 
expect this has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>person's
-      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably</em></ins></span> the 
<span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent to tracking,</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>TV 
will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>make statements about
-      their products, rather than free software which users could have
-      checked and changed.&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
     
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>say</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>TVs are not allowed to report what</em></ins></span> 
the <span class="removed"><del><strong>vibrator</strong></del></span>
+    &lt;p&gt;That</strong></del></span>
     <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user watches,</em></ins></span> and the <span 
class="removed"><del><strong>FBI</strong></del></span> <span 
class="inserted"><ins><em>switch to turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing; the server</em></ins></span> could <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>save that data anyway.)&lt;/p&gt; 
     
-    &lt;p&gt;The company's statement</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
-    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span 
class="inserted"><ins><em>transmission reports a 404 error
-    really means nothing; the server could save that</em></ins></span> data 
<span class="removed"><del><strong>may be
-      true, but</strong></del></span> <span 
class="inserted"><ins><em>anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said</em></ins></span> it had <span 
class="removed"><del><strong>sold the data to</strong></del></span> <span 
class="inserted"><ins><em>installed</em></ins></span> a
-      <span class="removed"><del><strong>data broker, the data broker would 
have been able</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>figure out
-      who the user was.&lt;/p&gt;
+    &lt;p&gt;LG later said it had installed a patch</em></ins></span> to <span 
class="removed"><del><strong>these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
     
-    &lt;p&gt;Following</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
-    product could spy</em></ins></span> this <span 
class="removed"><del><strong>lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
+    product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total</strong></del></span>
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying anyway&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?
-      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212170"&gt;
+  &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers</em></ins></span> found a way to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That the manufacturer and the FBI could listen to these 
conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy</strong></del></span> <span class="inserted"><ins><em>break 
security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
     and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2097,23 +2102,20 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span>
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    give</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
+    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not to look at what's in</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>videos. That's not
-    security for your home. Security means making sure</em></ins></span> they 
<span class="removed"><del><strong>pass it</strong></del></span> <span 
class="inserted"><ins><em>don't get to
-    see</em></ins></span> through <span 
class="removed"><del><strong>Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>your camera.&lt;/p&gt;</em></ins></span>
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -2122,23 +2124,21 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Skype:
       &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201603220"&gt;
-    &lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span> <span class="inserted"><ins><em>the 
videos. That's not
+    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-    security bugs that allow anyone</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
@@ -2152,7 +2152,14 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>watch 
through them&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201603220"&gt;
+    &lt;p&gt;Over 70 brands of network-connected surveillance cameras have 
&lt;a
+    
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+    security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511250"&gt;</em></ins></span>
@@ -2178,33 +2185,62 @@
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201711244"&gt;
     &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this</strong></del></span>
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the</em></ins></span> code <span 
class="removed"><del><strong>snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could surely convert it
+    universal back door&lt;/a&gt;. If</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
     into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
+  settings&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software which users could have checked
+    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
     and changed.&lt;/p&gt;
 
     &lt;p&gt;The company that made the vibrator &lt;a
@@ -2212,97 +2248,120 @@
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the data to a data
-    broker,</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>data broker would have been able to figure out 
who</em></ins></span> the
-    user <span class="removed"><del><strong>reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>was.&lt;/p&gt;
-
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: 
it's
-      needed</strong></del></span> <span class="inserted"><ins><em>pay a total 
of C$4m&lt;/a&gt;</em></ins></span> to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
+    &lt;p&gt;The company's statement that it was anonymizing</em></ins></span> 
the <span class="removed"><del><strong>car is
+    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span> <span class="inserted"><ins><em>data may be
+    true, but</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
     customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
-  effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;That's easy</strong></del></span>
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>access</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span>
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> the <span 
class="removed"><del><strong>company to extract data remotely and
+      determine</strong></del></span>
     <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and the FBI could 
listen</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>these
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>listen in on a child's speech, and even speak 
into</em></ins></span> the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and
-      <span 
class="removed"><del><strong>others.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image</strong></del></span> <span 
class="inserted"><ins><em>people, DJI</em></ins></span> is <span 
class="removed"><del><strong>coming from the user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable the surveillance, even if it were not hidden as it 
was</strong></del></span> in
+    <span class="removed"><del><strong>these TVs, does not legitimize the 
surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>many 
cases</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2313,175 +2372,132 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201902080"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>case</strong></del></span> 
<span class="inserted"><ins><em>HP &lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>report was as of 2014, but 
we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent to tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
+    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>toll-collection systems, 
mentioned</strong></del></span> <span class="inserted"><ins><em>ink cartridges 
that would otherwise be</em></ins></span> in <span 
class="removed"><del><strong>this article, is not
-      really</strong></del></span>
-    <span class="inserted"><ins><em>working order.&lt;/p&gt;
+    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
+    specific cases, it spies</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>involves totally 
unacceptable
+    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
+ 
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be in
+    working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter</strong></del></span> <span 
class="inserted"><ins><em>way to break the security</em></ins></span> of <span 
class="removed"><del><strong>proprietary surveillance. These systems 
are</strong></del></span> an
-      <span class="removed"><del><strong>intolerable invasion of 
privacy,</strong></del></span> <span class="inserted"><ins><em>Amazon 
device,</em></ins></span>
-    and <span class="removed"><del><strong>should</strong></del></span> <span 
class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span class="removed"><del><strong>replaced with 
anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>invasion isn't done 
by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>US
-    told Amazon to do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine the car's location at any time. (See</strong></del></span> 
<span class="inserted"><ins><em>say no?&lt;/p&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>break the security of an Amazon device,
+    and &lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;</em></ins></span>
+    turn <span class="removed"><del><strong>this off, but 
having</strong></del></span> it <span class="removed"><del><strong>enabled by 
default
+      is an injustice already.&lt;/p&gt;
+  &lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>into a 
listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b and c.&lt;/a&gt;). The</strong></del></span>
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon</em></ins></span> to <span class="inserted"><ins><em>do this, 
or cease to sell</em></ins></span> the <span class="removed"><del><strong>600 
millions social media profiles</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
+    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>company already
+      monitors. Tivo customers</strong></del></span> <span 
class="inserted"><ins><em>moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;hacking&rdquo;</em></ins></span> to
+      <span class="removed"><del><strong>new combined 
surveillance</strong></del></span> <span class="inserted"><ins><em>mean 
&ldquo;breaking security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance</em></ins></span> company <span 
class="removed"><del><strong>says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops on its user by
-    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span 
class="removed"><del><strong>default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
     &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>everyone in</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>house, all</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    listen</em></ins></span> to <span class="inserted"><ins><em>everyone in 
the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that</em></ins></span> can <span 
class="removed"><del><strong>store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span> <span 
class="inserted"><ins><em>obey your voice commands without potentially 
spying</em></ins></span>
-    on <span class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Nest</strong></del></span> <span 
class="inserted"><ins><em>you.  Even if it is air-gapped, it could be saving up 
records
+    a device that can obey your voice commands without potentially spying
+    on you.  Even if it is air-gapped, it could</em></ins></span> be
+      <span class="removed"><del><strong>picked</strong></del></span> <span 
class="inserted"><ins><em>saving</em></ins></span> up <span 
class="removed"><del><strong>by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+  &lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+      range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable the surveillance, even if it were not hidden as it was in
-    these TVs, does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent to tracking, the TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201807260"&gt;
     &lt;p&gt;Tommy Hilfiger clothing &lt;a
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
-    monitor every aspect of</em></ins></span> what
-      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+    &lt;p&gt;This will teach the sheeple</em></ins></span> to <span 
class="removed"><del><strong>determine</strong></del></span> <span 
class="inserted"><ins><em>find it normal</em></ins></span> that <span 
class="inserted"><ins><em>companies
+    monitor every aspect of what</em></ins></span> they <span 
class="removed"><del><strong>are nearby.  Once your
+      Internet devices are paired with your TV, advertisers can
+      correlate ads</strong></del></span> <span 
class="inserted"><ins><em>do.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes</em></ins></span> 
with <span class="removed"><del><strong>Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However, it is certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web</strong></del></span> <span 
class="inserted"><ins><em>report its location to someone else</em></ins></span> 
and <span class="removed"><del><strong>TV advertisements play inaudible 
sounds</strong></del></span> to <span class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
+    &lt;p&gt;An LG</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs recognize and</strong></del></span> <span 
class="inserted"><ins><em>watch is designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2494,21 +2510,15 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811300"&gt;
-    &lt;p&gt;In China, it is mandatory for electric
-    cars</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads</strong></del></span> <span class="inserted"><ins><em>be 
equipped</em></ins></span> with <span class="removed"><del><strong>Web 
activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
+    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize 
and</strong></del></span> <span class="inserted"><ins><em>a terminal 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      watching and listening all</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
-    to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      watching and listening all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    to a government-run platform&lt;/a&gt;. In practice, &lt;a
+    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
     manufacturers collect this data&lt;/a&gt; as part of their own spying, then
     forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -2524,11 +2534,11 @@
     &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
       give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
     sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+      &lt;p&gt;Speech recognition is not to be trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
     watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
 
       &lt;p&gt;In its privacy policy, Samsung explicitly confirms
@@ -2585,28 +2595,28 @@
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
+    &lt;p&gt;That's easy to do because the system has no authentication
+    when accessed through the modem.  However, even if it 
asked</em></ins></span>
+    for <span class="inserted"><ins><em>authentication, you couldn't be 
confident that Nissan
+    has no access.  The software in the car is proprietary, &lt;a
     href="/philosophy/free-software-even-more-important.html"&gt;which means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+    it demands blind faith from</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with</strong></del></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
+    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem
+    enables</em></ins></span> the <span class="removed"><del><strong>audio 
files
+users listen</strong></del></span> <span class="inserted"><ins><em>phone 
company</em></ins></span> to <span class="removed"><del><strong>along with the 
headphone's unique serial number.
 &lt;/p&gt;
 
-&lt;p&gt;The suit accuses that this was done without</strong></del></span> 
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
-    enables</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>phone company to 
track</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>car's 
movements all the time;</em></ins></span>
+&lt;p&gt;The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>fine print of</strong></del></span> <span 
class="inserted"><ins><em>car's movements all</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
+would that make</strong></del></span> <span 
class="inserted"><ins><em>time;</em></ins></span>
     it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
 illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
@@ -2628,27 +2638,27 @@
   &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
       &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
       collect a wide range of</strong></del></span> <span 
class="inserted"><ins><em>company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their users and their users' 
-      friends</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span 
class="inserted"><ins><em>determine</em></ins></span> the <span 
class="removed"><del><strong>data
-      collected by various cr&hellip;apps</strong></del></span> <span 
class="inserted"><ins><em>car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>sites made by different 
-      companies.&lt;/p&gt;
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;They use</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says it doesn't 
store</em></ins></span> this <span class="removed"><del><strong>data to 
manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>information, but if the state orders 
it</em></ins></span> to <span class="removed"><del><strong>buy 
things,</strong></del></span> <span class="inserted"><ins><em>get the 
data</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state</em></ins></span> can <span 
class="removed"><del><strong>be led</strong></del></span> <span 
class="inserted"><ins><em>store it.&lt;/p&gt;
+    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+    information, but if the state orders it to get</em></ins></span> the data
+      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201303250"&gt;
     &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
     
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which is made
-    available</em></ins></span> to <span class="removed"><del><strong>spend a 
lot</strong></del></span> <span class="inserted"><ins><em>car manufacturers, 
insurance companies, and others.&lt;/p&gt;
+    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people</strong></del></span>
+    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
 
     &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
       also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
@@ -2731,21 +2741,19 @@
     &lt;p&gt;Online</em></ins></span> sales, with tracking and surveillance of 
customers, &lt;a
     
href="https://www.theguardian.com/commentisfree/2016/dec/06/cookie-monsters-why-your-browsing-history-could-mean-rip-off-prices"&gt;enables
     businesses to show different people different prices&lt;/a&gt;. Most of
-    the tracking is done by recording interactions with
-      <span class="removed"><del><strong>servers, but proprietary software 
contributes.&lt;/p&gt;
+    the tracking is done by recording interactions with servers, but
+    proprietary software contributes.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/"&gt;
       Baidu's Japanese-input and Chinese-input apps spy on 
users.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
       &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook to track visitors</strong></del></span> <span 
class="inserted"><ins><em>servers, but
-    proprietary software contributes.&lt;/p&gt;
-  &lt;/li&gt;
+      enable Facebook to track visitors</strong></del></span>
 
-  &lt;li id="M201405140"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
     Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
@@ -2796,13 +2804,14 @@
 
 &lt;div class="big-subsection"&gt;
   &lt;h4 <span class="removed"><del><strong>id="SpywareInChrome"&gt;Spyware in 
Chrome&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInJavaScript"&gt;JavaScript&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Google Chrome contains a key logger 
that</strong></del></span> <span 
class="inserted"><ins><em>href="#SpywareInJavaScript"&gt;#SpywareInJavaScript&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+&lt;ul class="blurbs"&gt;
   &lt;li id="M201811270"&gt;
     &lt;p&gt;Many web sites use JavaScript code</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
        sends Google every URL</strong></del></span>
@@ -2825,33 +2834,40 @@
        activates microphones and transmits audio</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security"&gt;nonfree
     JavaScript on its web site</em></ins></span> to <span 
class="inserted"><ins><em>give other companies personal data 
on</em></ins></span>
-    its <span 
class="removed"><del><strong>servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>customers&lt;/a&gt;.&lt;/p&gt;
+    its <span 
class="removed"><del><strong>servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>customers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201712300"&gt;
-    &lt;p&gt;Some JavaScript malware &lt;a
-    
href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google Chrome makes it 
easy for an extension to do</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201712300"&gt;
+    &lt;p&gt;Some JavaScript malware</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research"&gt;
     swipes usernames from browser-based password managers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711150"&gt;
     &lt;p&gt;Some websites send
-    JavaScript code to collect all the user's input, &lt;a
+    JavaScript code to collect all</em></ins></span> the user's <span 
class="removed"><del><strong>browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>input, &lt;a
     
href="https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/"&gt;which
     can then be used to reproduce the whole session&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;If you use LibreJS, it will block that malicious JavaScript
-    code.&lt;/p&gt;
+    code.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Flash&lt;/h4&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInFlash"&gt;Spyware in 
Flash&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInFlash"&gt;Flash&lt;/h4&gt;</em></ins></span>
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
     &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
@@ -2859,104 +2875,110 @@
   &lt;/li&gt;
 
   &lt;li id="M201003010"&gt;
-    &lt;p&gt;Flash Player's &lt;a
+    &lt;p&gt;Flash</em></ins></span> Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-    cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash is also used for
+      &lt;a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
+&lt;/ul&gt;
 
+<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
+is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201507280"&gt;
-    &lt;p&gt;Google</em></ins></span> Chrome makes it easy for an extension to 
do &lt;a
-    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;!-- #SpywareEverywhere --&gt;</strong></del></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInFlash"&gt;Spyware in Flash&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInFlash"&gt;#SpywareInFlash&lt;/a&gt;)&lt;/span&gt;
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash Player's</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The natural extension</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the 
lack</em></ins></span>
+    of <span class="removed"><del><strong>monitoring people through 
+      &ldquo;their&rdquo; phones</strong></del></span> <span 
class="inserted"><ins><em>transparency on the part of both the educational 
services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only 
remedy</em></ins></span> is
+    <span class="inserted"><ins><em>to persuade school officials 
to</em></ins></span> &lt;a 
+      <span 
class="removed"><del><strong>href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+      proprietary</strong></del></span> <span 
class="inserted"><ins><em>href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free</em></ins></span> software <span 
class="inserted"><ins><em>organizations, political parties,
+    etc.)</em></ins></span> to <span class="removed"><del><strong>make sure 
they can't &ldquo;fool&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>migrate</em></ins></span> the 
+      <span class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will be able</strong></del></span> <span 
class="inserted"><ins><em>public schools</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>free software.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201507280"&gt;
+    &lt;p&gt;Google Chrome makes it easy</em></ins></span> for <span 
class="removed"><del><strong>speech all</strong></del></span> <span 
class="inserted"><ins><em>an extension to do &lt;a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
+    snooping on</em></ins></span> the <span class="removed"><del><strong>time, 
even when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201506180"&gt;
     &lt;p&gt;Google Chrome includes a module that &lt;a
     
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
     activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308040"&gt;
-    &lt;p&gt;Google Chrome</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track 
visitors&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
+    &lt;p&gt;Google Chrome &lt;a
+    href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/"&gt;
     spies on browser history, affiliations&lt;/a&gt;, and other installed
-    software.&lt;/p&gt;</em></ins></span>
+    software.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash is also used 
for</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200809060"&gt;
-    &lt;p&gt;Google Chrome contains a key logger that</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt; to identify 
users.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
+  &lt;li id="M200809060"&gt;
+    &lt;p&gt;Google Chrome contains a key logger that &lt;a
+    href="http://www.favbrowser.com/google-chrome-spyware-confirmed/"&gt;
     sends Google every URL typed in&lt;/a&gt;, one key at a 
time.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
-is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
-
-
-&lt;!-- #SpywareEverywhere --&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;!-- #SpywareInVR 
--&gt;</strong></del></span>
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 <span class="removed"><del><strong>id="SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInNetworks"&gt;Spyware in 
Networks&lt;/h3&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h3 <span class="removed"><del><strong>id="SpywareInVR"&gt;Spyware In 
VR&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInNetworks"&gt;Spyware in 
Networks&lt;/h3&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInNetworks"&gt;#SpywareInNetworks&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The natural extension of monitoring</strong></del></span>
+  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, creates the
+      potential</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201902040"&gt;
-    &lt;p&gt;Google invites</em></ins></span> people <span 
class="removed"><del><strong>through 
-      &ldquo;their&rdquo; phones is &lt;a 
-      
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software to make sure they can't &ldquo;fool&rdquo; the 
-      monitoring&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will be able</strong></del></span> to <span 
class="removed"><del><strong>listen for speech</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
-    let Google monitor their phone use, and</em></ins></span> all <span 
class="removed"><del><strong>the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareInVR --&gt;
-&lt;div class="big-section"&gt;
-    &lt;h3 id="SpywareInVR"&gt;Spyware In VR&lt;/h3&gt;
-    &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVR"&gt;#SpywareInVR&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;VR equipment, measuring every slight motion, creates the
-      potential</strong></del></span> <span class="inserted"><ins><em>internet 
use in their
+    let Google monitor their phone use, and all internet use in their
     homes,</em></ins></span> for <span class="inserted"><ins><em>an 
extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is not a malicious functionality of a program with some other
@@ -3049,7 +3071,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/03/26 10:33:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary-surveillance.it.po      17 Mar 2019 10:32:41 -0000      1.283
+++ proprietary-surveillance.it.po      26 Mar 2019 10:33:48 -0000      1.284
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -4346,6 +4346,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome makes it easy for an extension to do <a href=\"https://labs.";
 "detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
 "\">total snooping on the user's browsing</a>, and many of them do so."

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-surveillance.ja-diff.html       17 Mar 2019 10:32:41 -0000      
1.132
+++ proprietary-surveillance.ja-diff.html       26 Mar 2019 10:33:48 -0000      
1.133
@@ -1237,43 +1237,22 @@
 Note</strong></del></span>
     <span class="inserted"><ins><em>various apps. Some of them send Facebook 
detailed information about
     the user's activities in the app; others only say</em></ins></span> that 
the <span class="removed"><del><strong>specific sabotage method Lenovo used did 
not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install</strong></del></span> 
<span class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>not really
-clean since</strong></del></span>
-    <span class="inserted"><ins><em>using that app, but that alone is often 
quite informative.&lt;/p&gt;
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows</strong></del></span> <span 
class="inserted"><ins><em>user is
+    using that app, but that alone is often quite informative.&lt;/p&gt;
 
     &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
     track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span 
class="inserted"><ins><em>Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
+    &lt;p&gt;Some Google apps on Android &lt;a
+    
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
     record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
@@ -1288,8 +1267,8 @@
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect</em></ins></span> it <span 
class="removed"><del><strong>can collect</strong></del></span> <span 
class="inserted"><ins><em>implements DRM, too&mdash;that there is no way to save
-    a recording. But I can't be sure from</em></ins></span> the <span 
class="removed"><del><strong>emails</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
+    a recording. But I can't be sure from the article.&lt;/p&gt;
 
     &lt;p&gt;If you learn to care much less about sports, you will benefit in
     many ways. This is one more.&lt;/p&gt;
@@ -1297,22 +1276,18 @@
 
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%</em></ins></span>
-    of <span class="removed"><del><strong>members</strong></del></span> <span 
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were 
found to snoop
-    and collect information about its users&lt;/a&gt;.  40%</em></ins></span> 
of <span class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span class="inserted"><ins><em>the 
apps were
-    found to insecurely snitch on its users.  Furthermore,</em></ins></span> 
they <span class="removed"><del><strong>pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
+    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
     &lt;p&gt;This is evidence that proprietary apps generally work against
     their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
+    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
@@ -1825,7 +1800,7 @@
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades that</em></ins></span> install <span 
class="inserted"><ins><em>a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
@@ -1914,7 +1889,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201411090"&gt;
-    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</em></ins></span> is <span 
class="inserted"><ins><em>&lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1933,19 +1908,43 @@
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+    &lt;p&gt;Proper laws would say that TVs are</em></ins></span> not <span 
class="removed"><del><strong>really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>allowed</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>report 
what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>user watches, 
and the switch to turn</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;Even worse, it &lt;a
-    
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
     snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;LG later said it had installed a patch to stop this, but any
@@ -2044,68 +2043,63 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+    and</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
-      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
-      by most US libraries,
-      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed to check DRM!&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the
+      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+      by most US libraries,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings</em></ins></span> of <span class="removed"><del><strong>data to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed to check DRM!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in 
Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
-  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was</em></ins></span> snooping <span 
class="removed"><del><strong>devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  &lt;li&gt;&lt;p&gt;The Nissan Leaf has a built-in cell phone modem which 
allows
   effectively
-  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access its computers remotely and make</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
+  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access</strong></del></span> <span 
class="inserted"><ins><em>on</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
-    accessed</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert it
-    into one.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator &lt;a
-    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That's easy to do because the system has no authentication when
+    accessed</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
@@ -2153,166 +2147,169 @@
     &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>anonymous
       payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
     
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to the manufacturer&lt;/a&gt;. Guess what? 
&lt;a
+    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>company to extract data remotely and
+      determine</strong></del></span>
     <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
-    company <span class="removed"><del><strong>says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>store it.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
+    crackers</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>listen 
in</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;</em></ins></span>
+&lt;/ul&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in 
many cases</em></ins></span> &lt;a <span class="removed"><del><strong>href="
+  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>their 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;
-  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201902080"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>report was as of 2014, but 
we don't expect this has got better.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201902080"&gt;
-    &lt;p&gt;The HP &lt;a
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>me</strong></del></span> <span 
class="inserted"><ins><em>make sure the user is still
-    paying for the subscription,</em></ins></span> and
-<span class="removed"><del><strong>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if a</strong></del></span> <span 
class="inserted"><ins><em>make sure the</em></ins></span> user <span 
class="removed"><del><strong>declines consent?  Probably</strong></del></span> 
<span class="inserted"><ins><em>is still
+    paying for</em></ins></span> the <span class="removed"><del><strong>TV
+      will say, &ldquo;Without your consent to tracking,</strong></del></span> 
<span class="inserted"><ins><em>subscription, and hasn't printed more pages 
than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a href="
-  
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on <span 
class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV will
+      not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>would otherwise be in
-    working order.&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>ink subscription 
program may be cheaper in some
+    specific cases, it spies on users, and involves totally unacceptable
+    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use 
of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found</em></ins></span> a <span 
class="removed"><del><strong>step further than other TV manufacturers in spying 
on 
+      their users: their</strong></del></span> <span 
class="inserted"><ins><em>way to break the security of an Amazon device,
+    and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing 
habits</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
-      consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
-    easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product</em></ins></span> in 
<span class="removed"><del><strong>detail and 
+      link them your IP address&lt;/a&gt; so</strong></del></span> that <span 
class="removed"><del><strong>advertisers can track</strong></del></span> <span 
class="inserted"><ins><em>country,
+    do</em></ins></span> you 
+      <span class="removed"><del><strong>across devices.&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon</em></ins></span> would <span 
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span 
class="removed"><del><strong>that TVs</strong></del></span> <span 
class="inserted"><ins><em>no?&lt;/p&gt;
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>think Amazon would have the moral 
fiber</em></ins></span> to <span class="removed"><del><strong>turn this 
off,</strong></del></span> <span class="inserted"><ins><em>say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not allowed</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    &lt;p&gt;These crackers are probably hackers too,</em></ins></span> but 
<span class="removed"><del><strong>having it enabled</strong></del></span> 
<span class="inserted"><ins><em>please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>report what
-      the user watches &mdash; no exceptions!&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
goes</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+  &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers</em></ins></span> a <span class="removed"><del><strong>step further 
than other TV manufacturers in spying</strong></del></span> <span 
class="inserted"><ins><em>gratis electronic toothbrush that 
snoops</em></ins></span> on 
-      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    offers a gratis electronic toothbrush that snoops on its 
user</em></ins></span> by <span class="removed"><del><strong>default
+      is an injustice already.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>TVs analyze your viewing 
habits</strong></del></span> <span class="inserted"><ins><em>products are 
designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone</em></ins></span> in <span 
class="removed"><del><strong>detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span> <span 
class="inserted"><ins><em>the house, all the time&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Today's technological practice does not include any way of making
-    a device</em></ins></span> that <span 
class="removed"><del><strong>advertisers</strong></del></span> can <span 
class="removed"><del><strong>track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible to turn this off, but 
having</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
-    on you.  Even if</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households</strong></del></span>
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
+    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen</em></ins></span> to <span class="inserted"><ins><em>everyone 
in</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles</strong></del></span> <span class="inserted"><ins><em>house, 
all</em></ins></span> the <span class="removed"><del><strong>company already
       monitors. Tivo customers are unaware they're being watched by
       advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
+      social media participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+    &lt;p&gt;Today's technological practice does not include any way of making
+    a device that</em></ins></span> can <span class="removed"><del><strong>now 
&lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
       advertisement with online purchases&lt;/a&gt;, exposing all users to
       new combined surveillance by default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible sounds 
to</strong></del></span> <span class="inserted"><ins><em>obey your voice 
commands without potentially spying
+    on you.  Even if it is air-gapped, it could</em></ins></span> be
+      <span class="removed"><del><strong>picked</strong></del></span> <span 
class="inserted"><ins><em>saving</em></ins></span> up <span 
class="removed"><del><strong>by proprietary malware 
running</strong></del></span> <span class="inserted"><ins><em>records
+    about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201407170"&gt;
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
     &lt;p&gt;&lt;a
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed</em></ins></span> to <span 
class="removed"><del><strong>be
-      picked up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="removed"><del><strong>other devices in
       range so as</strong></del></span> <span class="inserted"><ins><em>their 
renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2427,28 +2424,34 @@
       <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>turn this off</strong></del></span> <span 
class="inserted"><ins><em>do because the system</em></ins></span> has no <span 
class="removed"><del><strong>effect.  (The fact that the
-      transmission reports a 404 error really means 
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
-    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>server
+    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>turn this off</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
+    when accessed through the modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan</em></ins></span>
+    has no <span class="removed"><del><strong>effect.  (The fact 
that</strong></del></span> <span class="inserted"><ins><em>access.  The 
software in</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
+    
href="/philosophy/free-software-even-more-important.html"&gt;which</em></ins></span>
 means <span class="removed"><del><strong>nothing; the server
       could save that data anyway.)&lt;/p&gt;
 
-      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if</em></ins></span> it
+      &lt;p&gt;Even worse,</strong></del></span>
+    it
       <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>asked
-    for authentication, you couldn't be confident that Nissan
-    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
+    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    enables the phone company to track the car's movements all the 
time;</em></ins></span>
+    it <span class="removed"><del><strong>had installed a 
patch</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span class="removed"><del><strong>stop this, but 
any product
       could spy this way.&lt;/p&gt;
 
-      &lt;p&gt;Meanwhile, LG TVs</strong></del></span> <span 
class="inserted"><ins><em>car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Meanwhile, LG TVs
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  &lt;li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
       &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
-    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
+    &lt;p&gt;Tesla cars allow the company</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2462,26 +2465,21 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users and 
report</strong></del></span> <span class="inserted"><ins><em>the car remotely, 
the cell phone modem
-    enables the phone company</em></ins></span> to <span 
class="inserted"><ins><em>track</em></ins></span> the 
+      video game consoles snoop on their users</strong></del></span> <span 
class="inserted"><ins><em>extract
+    data remotely</em></ins></span> and <span 
class="removed"><del><strong>report to</strong></del></span> <span 
class="inserted"><ins><em>determine</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console</strong></del></span> <span 
class="inserted"><ins><em>car's movements all the time;
-    it</em></ins></span> is <span class="removed"><del><strong>a computer, and 
you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>possible to physically remove the cell phone modem, 
though.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>car's location
+    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
+  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
       &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
-    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
-      friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
+      collect a wide range</strong></del></span> <span 
class="inserted"><ins><em>c</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
+      friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>the &lt;a
     
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
     privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
     information, but if the state orders it to get</em></ins></span> the data
@@ -2587,13 +2585,13 @@
 
   &lt;li&gt;&lt;p&gt;Pages that contain &ldquo;Like&rdquo; buttons
       &lt;a 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html"&gt;
-      enable Facebook to track visitors</strong></del></span>
+      enable Facebook to track visitors to those pages&lt;/a&gt;&mdash;even
+      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405140"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/"&gt;
-    Microsoft SkyDrive allows the NSA</em></ins></span> to <span 
class="removed"><del><strong>those pages&lt;/a&gt;&mdash;even
-      users that don't have Facebook accounts.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>directly examine users'
+    Microsoft SkyDrive allows the NSA to directly examine users'
     data&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -2694,62 +2692,87 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Flash Player's
-      &lt;a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
-      cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Flash is also</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Flash</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201310110"&gt;
-    &lt;p&gt;Flash and JavaScript are</em></ins></span> used for &lt;a
+    &lt;p&gt;Flash and JavaScript are used for &lt;a
     
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
-    &ldquo;fingerprinting&rdquo; <span class="removed"><del><strong>devices 
&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>devices&lt;/a&gt;</em></ins></span> to identify 
users.&lt;/p&gt;
+    &ldquo;fingerprinting&rdquo; devices&lt;/a&gt; to identify users.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201003010"&gt;
-    &lt;p&gt;Flash Player's &lt;a
+  &lt;li id="M201003010"&gt;
+    &lt;p&gt;Flash</em></ins></span> Player's &lt;a
     
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/"&gt;
     cookie feature helps web sites track visitors&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-&lt;/ul&gt;
+  &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;&lt;a 
href="/philosophy/javascript-trap.html"&gt;Javascript code&lt;/a&gt;
-is another method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Flash is also 
used</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;!-- #SpywareEverywhere --&gt;</strong></del></span>
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks</em></ins></span> for <span 
class="inserted"><ins><em>schools are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/"&gt;
+      &ldquo;fingerprinting&rdquo; devices &lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses</em></ins></span> to <span 
class="removed"><del><strong>identify users.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;p&gt;&lt;a href="/philosophy/javascript-trap.html"&gt;Javascript 
code&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>spy on 
students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education</em></ins></span> is <span class="removed"><del><strong>another 
method of &ldquo;fingerprinting&rdquo; devices.&lt;/p&gt;
 
 
-&lt;div <span class="removed"><del><strong>class="big-section"&gt;
-  &lt;h3 id="SpywareEverywhere"&gt;Spyware 
Everywhere&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
-  &lt;h4 id="SpywareInChrome"&gt;Chrome&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInChrome"&gt;#SpywareInChrome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;!-- #SpywareEverywhere --&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareEverywhere"&gt;Spyware Everywhere&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareEverywhere"&gt;#SpywareEverywhere&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The natural</strong></del></span>
+  &lt;li&gt;&lt;p&gt;The natural extension of monitoring 
people</strong></del></span> <span class="inserted"><ins><em>run nation-wide, 
they need to persuade legislators
+    (e.g.,</em></ins></span> through 
+      <span class="removed"><del><strong>&ldquo;their&rdquo; phones is &lt;a 
+      
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
+      proprietary</strong></del></span> <span 
class="inserted"><ins><em>free</em></ins></span> software <span 
class="inserted"><ins><em>organizations, political parties,
+    etc.)</em></ins></span> to <span class="removed"><del><strong>make sure 
they can't &ldquo;fool&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>migrate</em></ins></span> the 
+      <span class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
+      Intel devices will be able</strong></del></span> <span 
class="inserted"><ins><em>public schools</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>free software.&lt;/p&gt;
+  &lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201507280"&gt;
-    &lt;p&gt;Google Chrome makes it easy for an</em></ins></span> extension 
<span class="removed"><del><strong>of monitoring people through 
-      &ldquo;their&rdquo; phones is &lt;a 
-      
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"&gt;
-      proprietary software</strong></del></span> to <span 
class="removed"><del><strong>make sure they can't 
&ldquo;fool&rdquo;</strong></del></span> <span class="inserted"><ins><em>do 
&lt;a
+    &lt;p&gt;Google Chrome makes it easy</em></ins></span> for <span 
class="removed"><del><strong>speech all</strong></del></span> <span 
class="inserted"><ins><em>an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
-    snooping on</em></ins></span> the 
-      <span 
class="removed"><del><strong>monitoring&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;</em></ins></span>
+    snooping on</em></ins></span> the <span class="removed"><del><strong>time, 
even when &ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping"&gt;
-      Intel devices will be able</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506180"&gt;
+  &lt;li id="M201506180"&gt;
     &lt;p&gt;Google Chrome includes a module that &lt;a
     
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"&gt;
-    activates microphones and transmits audio</em></ins></span> to <span 
class="removed"><del><strong>listen for speech all the time, even when 
&ldquo;off.&rdquo;&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>its servers&lt;/a&gt;.&lt;/p&gt;
+    activates microphones and transmits audio to its 
servers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308040"&gt;
@@ -2877,7 +2900,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/03/26 10:33:48 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary-surveillance.ja.po      17 Mar 2019 10:32:42 -0000      1.256
+++ proprietary-surveillance.ja.po      26 Mar 2019 10:33:48 -0000      1.257
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3688,6 +3688,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome makes it easy for an extension to do <a href=\"https://labs.";
 "detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
 "\">total snooping on the user's browsing</a>, and many of them do so."

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- proprietary-surveillance.pot        17 Mar 2019 10:32:42 -0000      1.204
+++ proprietary-surveillance.pot        26 Mar 2019 10:33:49 -0000      1.205
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2671,6 +2671,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a "
+"href=\"https://www.eff.org/wp/school-issued-devices-and-student-privacy\";> "
+"collecting far more data on students than is necessary, and store it "
+"indefinitely</a>. Parents and students complain about the lack of "
+"transparency on the part of both the educational services and the schools, "
+"the difficulty of opting out of these services, and the lack of proper "
+"privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome makes it easy for an extension to do <a "
 
"href=\"https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/\";>total
 "
 "snooping on the user's browsing</a>, and many of them do so."

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.491
retrieving revision 1.492
diff -u -b -r1.491 -r1.492
--- proprietary-surveillance.ru.po      18 Mar 2019 06:31:57 -0000      1.491
+++ proprietary-surveillance.ru.po      26 Mar 2019 10:33:49 -0000      1.492
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3867,6 +3868,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Chrome makes it easy for an extension to do <a href=\"https://labs.";
 "detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"
 "\">total snooping on the user's browsing</a>, and many of them do so."

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary.de-diff.html    23 Mar 2019 10:31:41 -0000      1.64
+++ proprietary.de-diff.html    26 Mar 2019 10:33:49 -0000      1.65
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -128,14 +128,14 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
@@ -231,56 +253,6 @@
     is also deceptive, as it uses confusing menus and complex stats to
     obfuscate true monetary costs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209900000"&gt;
-    &lt;p id="addictiveness"&gt;Many games are designed to
-    keep gamers compulsively playing&mdash;and renewing
-    their subscription. To achieve this result, developers use &lt;a
-    
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
-    techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment in which the rat&hellip; sorry, the user is 
trained
-      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
-
-      &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
-      &lt;dd&gt;Items that have nothing to do with the game itself, but are
-      valuable to gamers because of the work required to obtain them
-      (e.g., EverQuest); some people will end up collecting them for the
-      sake of collecting.&lt;/dd&gt;
-
-      &lt;dt&gt;Random rewards&lt;/dt&gt;
-      &lt;dd&gt;They turn the game into the equivalent of a slot machine (e.g.,
-      World of Warcraft, ZT Online).&lt;/dd&gt;
-
-      &lt;dt&gt;Elaborate cycles&lt;/dt&gt;
-      &lt;dd&gt;Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
-      (progress from one level to the next) slower and slower, designing
-      complex tasks that are difficult to get out of (e.g. World of
-      Warcraft), or conversely dividing them up in small chunks to avoid
-      frustration (e.g., New Super Mario Bros.Wii).&lt;/dd&gt;
-
-      &lt;dt&gt;Decay of game assets&lt;/dt&gt;
-      &lt;dd&gt;This makes it necessary for a gamer to keep playing, without
-      vacations, simply to avoid losing what they have earned so far
-      (e.g., Farmville, Ultima Online, Animal Crossing).&lt;/dd&gt;
-    &lt;/dl&gt;
-
-    &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
-    use several of these techniques.&lt;/p&gt;
-
-    &lt;p&gt;However, the addictiveness of a game is only one of the 
determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.&lt;/p&gt;
-
-    &lt;p&gt;&lt;em&gt;Note:&lt;/em&gt;&nbsp; We are not gamers. If you think 
we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;&lt;a
-    href="mailto:address@hidden"&gt;address@hidden&lt;/a&gt;&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -341,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/03/26 10:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.de.po   23 Mar 2019 10:31:41 -0000      1.106
+++ proprietary.de.po   26 Mar 2019 10:33:49 -0000      1.107
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -493,94 +517,6 @@
 "stats to obfuscate true monetary costs."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary.es.po   23 Mar 2019 10:31:41 -0000      1.124
+++ proprietary.es.po   26 Mar 2019 10:33:49 -0000      1.125
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -376,127 +400,6 @@
 "utiliza menús confusos y estadísticas complejas para difuminar el verdadero 
"
 "coste monetario."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Muchos juegos están diseñados para que los jugadores continúen jugando "
-"compulsivamente y renueven su suscripción. Para conseguirlo, los "
-"desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-";
-"creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
-"derivadas de la investigación del cerebro y de la conducta</a>:"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "La caja de Skinner"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"Un entorno en el cual se entrena a la rata (perdón, al usuario) para que "
-"«accione la palanca», esto es, para que realice una acción determinada una 
y "
-"otra vez a fin de obtener una recompensa."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "Bocados de comida virtuales"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"Artículos que no tiene nada que ver con el juego propiamente dicho, pero que 
"
-"son valiosos para los jugadores por el trabajo exigido para obtenerlos (por "
-"ejemplo, EverQuest); algunos acaban recolectándolos simplemente por "
-"recolectarlos."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "Recompensas aleatorias"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Convierten el juego en el equivalente a una máquina tragaperrras (p. e., "
-"World of Warcraft, ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "Ciclos elaborados"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"El comportamiento de los jugadores puede ser «modelado» haciendo los ciclos 
"
-"(el paso de un nivel al siguiente) cada vez más lentos, diseñando tareas "
-"complejas que es difícil llevar a cabo (p. e., World of Warcraft), o, por el 
"
-"contrario, dividiéndolos en partes más pequeñas para evitar la 
frustración "
-"(p. e., Nuevo Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "Devaluación de los activos del juego"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"Esto hace que el jugador tenga que continuar jugando, sin tomarse descansos, "
-"simplemente para evitar perder lo que han ganado hasta entonces (p. e.., "
-"Farmville, Ultima Online, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"Juegos como World of Warcraft, que se consideran muy adictivos, emplean "
-"varias de estas técnicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"No obstante, la adictividad de un juego es solo uno de los factores "
-"determinantes de la adicción. Igualmente importantes son el perfil "
-"psicológico y las circunstancias vitales del jugador. La adicción a los "
-"juegos, como cualquier otra adicción, es una vía de escape de una vida poco 
"
-"gratificante. La triste realidad es que, a la larga, lleva a una vida aún "
-"peor."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-"<em>Nota:</em>: No somos jugadores. Si cree que hemos malinterpretado algo, "
-"o tiene sugerencias para que el texto sea más claro o más correcto, 
envíelas "
-"a &lt;<a href=\"mailto:address@hidden";>address@hidden</a>&gt;."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -576,6 +479,114 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muchos juegos están diseñados para que los jugadores continúen jugando "
+#~ "compulsivamente y renueven su suscripción. Para conseguirlo, los "
+#~ "desarrolladores emplean <a href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\">técnicas "
+#~ "derivadas de la investigación del cerebro y de la conducta</a>:"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "La caja de Skinner"
+
+#~ msgid ""
+#~ "An environment in which the rat&hellip; sorry, the user is trained to "
+#~ "&ldquo;push the lever&ldquo;, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "Un entorno en el cual se entrena a la rata (perdón, al usuario) para que "
+#~ "«accione la palanca», esto es, para que realice una acción determinada "
+#~ "una y otra vez a fin de obtener una recompensa."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "Bocados de comida virtuales"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "Artículos que no tiene nada que ver con el juego propiamente dicho, pero "
+#~ "que son valiosos para los jugadores por el trabajo exigido para "
+#~ "obtenerlos (por ejemplo, EverQuest); algunos acaban recolectándolos "
+#~ "simplemente por recolectarlos."
+
+#~ msgid "Random rewards"
+#~ msgstr "Recompensas aleatorias"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Convierten el juego en el equivalente a una máquina tragaperrras (p. e., "
+#~ "World of Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "Ciclos elaborados"
+
+#~ msgid ""
+#~ "Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "El comportamiento de los jugadores puede ser «modelado» haciendo los "
+#~ "ciclos (el paso de un nivel al siguiente) cada vez más lentos, diseñando 
"
+#~ "tareas complejas que es difícil llevar a cabo (p. e., World of Warcraft), 
"
+#~ "o, por el contrario, dividiéndolos en partes más pequeñas para evitar 
la "
+#~ "frustración (p. e., Nuevo Super Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "Devaluación de los activos del juego"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "Esto hace que el jugador tenga que continuar jugando, sin tomarse "
+#~ "descansos, simplemente para evitar perder lo que han ganado hasta "
+#~ "entonces (p. e.., Farmville, Ultima Online, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "Juegos como World of Warcraft, que se consideran muy adictivos, emplean "
+#~ "varias de estas técnicas."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "No obstante, la adictividad de un juego es solo uno de los factores "
+#~ "determinantes de la adicción. Igualmente importantes son el perfil "
+#~ "psicológico y las circunstancias vitales del jugador. La adicción a los "
+#~ "juegos, como cualquier otra adicción, es una vía de escape de una vida "
+#~ "poco gratificante. La triste realidad es que, a la larga, lleva a una "
+#~ "vida aún peor."
+
+#~ msgid ""
+#~ "<em>Note:</em>&nbsp; We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to &lt;<a href=\"mailto:";
+#~ "address@hidden">address@hidden</a>&gt;."
+#~ msgstr ""
+#~ "<em>Nota:</em>: No somos jugadores. Si cree que hemos malinterpretado "
+#~ "algo, o tiene sugerencias para que el texto sea más claro o más 
correcto, "
+#~ "envíelas a &lt;<a href=\"mailto:address@hidden";>address@hidden</"
+#~ "a>&gt;."
+
+#~ msgid ""
 #~ "The Ring (now Amazon) doorbell camera is designed so that the "
 #~ "manufacturer (now Amazon) can watch all the time. Now it turns out that "
 #~ "<a href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.fr.po   23 Mar 2019 10:52:11 -0000      1.152
+++ proprietary.fr.po   26 Mar 2019 10:33:49 -0000      1.153
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2019-03-23 11:51+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -380,127 +405,6 @@
 "utilise des menus déroutants et des statistiques complexes pour dissimuler "
 "les sommes effectivement dépensées."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
-"joueurs compulsifs – et continuent à payer leur abonnement. Pour obtenir 
ce "
-"résultat, les développeurs appliquent des <a href=\"http://www.cracked.com/";
-"article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"
-"\">techniques issues de recherches comportementales et sur le cerveau</a> :"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "La boîte de Skinner"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"C'est un environnement dans lequel le rat&hellip; pardon, l'utilisateur est "
-"entraîné à « pousser le levier », c'est-à-dire à faire une action 
donnée de "
-"manière répétitive afin d'obtenir une récompense."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "Croquettes virtuelles"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"Ce sont des objets qui n'ont rien à voir avec le jeu lui-même, mais sont "
-"précieux pour les joueurs à cause du travail qu'il leur a fallu fournir 
pour "
-"se les procurer (exemple : EverQuest) ; pour certaines personnes, leur "
-"collection devient une fin en soi."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "Récompenses aléatoires"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Elles transforment le jeu en une sorte de machine à sous (exemples : World "
-"of Warcraft, ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "Cycles élaborés"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"Le comportement des joueurs peut être « façonné » en rendant les 
cycles "
-"(progression de niveau en niveau) de plus en plus lents, en imaginant des "
-"tâches complexes dont il est difficile de s'extraire (exemple : World of "
-"Warcraft), ou au contraire en les fragmentant pour éviter la frustration "
-"(exemple : New Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "Détérioration des actifs du jeu"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"Cela pousse les joueurs à continuer à jouer sans prendre de vacances, "
-"simplement pour éviter de perdre ce qu'ils ont gagné jusque-là (exemples 
: "
-"Farmville, Ultima line, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"Des jeux considérés comme très addictifs, comme World of Warcraft, 
utilisent "
-"plusieurs de ces techniques."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"Cependant, le pouvoir addictif d'un jeu n'est pas le seul déterminant de "
-"l'addiction. Également décisives sont la structure psychologique et les "
-"conditions de vie du joueur. La dépendance au jeu, comme les autres "
-"dépendances, est un moyen de s'évader mentalement d'une vie peu 
gratifiante. "
-"La triste vérité, c'est qu'à long terme elle conduit à une vie encore 
pire."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-"<em>Note :</em> Nous ne sommes pas joueurs. Si vous voyez un point que nous "
-"avons mal compris ou si vous avez des suggestions pour rendre le texte plus "
-"clair, n'hésitez pas à écrire à &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -574,3 +478,112 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Pas mal de jeux sont conçus pour que leurs utilisateurs deviennent des "
+#~ "joueurs compulsifs – et continuent à payer leur abonnement. Pour 
obtenir "
+#~ "ce résultat, les développeurs appliquent des <a 
href=\"http://www.cracked.";
+#~ "com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-"
+#~ "addicted.html\">techniques issues de recherches comportementales et sur "
+#~ "le cerveau</a> :"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "La boîte de Skinner"
+
+#~ msgid ""
+#~ "An environment in which the rat&hellip; sorry, the user is trained to "
+#~ "&ldquo;push the lever&ldquo;, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "C'est un environnement dans lequel le rat&hellip; pardon, l'utilisateur "
+#~ "est entraîné à « pousser le levier », c'est-à-dire à faire une 
action "
+#~ "donnée de manière répétitive afin d'obtenir une récompense."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "Croquettes virtuelles"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "Ce sont des objets qui n'ont rien à voir avec le jeu lui-même, mais sont 
"
+#~ "précieux pour les joueurs à cause du travail qu'il leur a fallu fournir "
+#~ "pour se les procurer (exemple : EverQuest) ; pour certaines personnes, "
+#~ "leur collection devient une fin en soi."
+
+#~ msgid "Random rewards"
+#~ msgstr "Récompenses aléatoires"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Elles transforment le jeu en une sorte de machine à sous (exemples : "
+#~ "World of Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "Cycles élaborés"
+
+#~ msgid ""
+#~ "Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "Le comportement des joueurs peut être « façonné » en rendant les 
cycles "
+#~ "(progression de niveau en niveau) de plus en plus lents, en imaginant des "
+#~ "tâches complexes dont il est difficile de s'extraire (exemple : World of 
"
+#~ "Warcraft), ou au contraire en les fragmentant pour éviter la frustration "
+#~ "(exemple : New Super Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "Détérioration des actifs du jeu"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "Cela pousse les joueurs à continuer à jouer sans prendre de vacances, "
+#~ "simplement pour éviter de perdre ce qu'ils ont gagné jusque-là "
+#~ "(exemples : Farmville, Ultima line, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "Des jeux considérés comme très addictifs, comme World of Warcraft, "
+#~ "utilisent plusieurs de ces techniques."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "Cependant, le pouvoir addictif d'un jeu n'est pas le seul déterminant de "
+#~ "l'addiction. Également décisives sont la structure psychologique et les "
+#~ "conditions de vie du joueur. La dépendance au jeu, comme les autres "
+#~ "dépendances, est un moyen de s'évader mentalement d'une vie peu "
+#~ "gratifiante. La triste vérité, c'est qu'à long terme elle conduit à 
une "
+#~ "vie encore pire."
+
+#~ msgid ""
+#~ "<em>Note:</em>&nbsp; We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to &lt;<a href=\"mailto:";
+#~ "address@hidden">address@hidden</a>&gt;."
+#~ msgstr ""
+#~ "<em>Note :</em> Nous ne sommes pas joueurs. Si vous voyez un point que "
+#~ "nous avons mal compris ou si vous avez des suggestions pour rendre le "
+#~ "texte plus clair, n'hésitez pas à écrire à &lt;<a href=\"mailto:";
+#~ "address@hidden">address@hidden</a>&gt;."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.it-diff.html    23 Mar 2019 10:31:41 -0000      1.76
+++ proprietary.it-diff.html    26 Mar 2019 10:33:49 -0000      1.77
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
@@ -230,56 +252,6 @@
     is also deceptive, as it uses confusing menus and complex stats to
     obfuscate true monetary costs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209900000"&gt;
-    &lt;p id="addictiveness"&gt;Many games are designed to
-    keep gamers compulsively playing&mdash;and renewing
-    their subscription. To achieve this result, developers use &lt;a
-    
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
-    techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment in which the rat&hellip; sorry, the user is 
trained
-      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
-
-      &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
-      &lt;dd&gt;Items that have nothing to do with the game itself, but are
-      valuable to gamers because of the work required to obtain them
-      (e.g., EverQuest); some people will end up collecting them for the
-      sake of collecting.&lt;/dd&gt;
-
-      &lt;dt&gt;Random rewards&lt;/dt&gt;
-      &lt;dd&gt;They turn the game into the equivalent of a slot machine (e.g.,
-      World of Warcraft, ZT Online).&lt;/dd&gt;
-
-      &lt;dt&gt;Elaborate cycles&lt;/dt&gt;
-      &lt;dd&gt;Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
-      (progress from one level to the next) slower and slower, designing
-      complex tasks that are difficult to get out of (e.g. World of
-      Warcraft), or conversely dividing them up in small chunks to avoid
-      frustration (e.g., New Super Mario Bros.Wii).&lt;/dd&gt;
-
-      &lt;dt&gt;Decay of game assets&lt;/dt&gt;
-      &lt;dd&gt;This makes it necessary for a gamer to keep playing, without
-      vacations, simply to avoid losing what they have earned so far
-      (e.g., Farmville, Ultima Online, Animal Crossing).&lt;/dd&gt;
-    &lt;/dl&gt;
-
-    &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
-    use several of these techniques.&lt;/p&gt;
-
-    &lt;p&gt;However, the addictiveness of a game is only one of the 
determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.&lt;/p&gt;
-
-    &lt;p&gt;&lt;em&gt;Note:&lt;/em&gt;&nbsp; We are not gamers. If you think 
we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;&lt;a
-    href="mailto:address@hidden"&gt;address@hidden&lt;/a&gt;&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -340,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/03/26 10:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary.it.po   23 Mar 2019 10:31:42 -0000      1.115
+++ proprietary.it.po   26 Mar 2019 10:33:49 -0000      1.116
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -486,94 +510,6 @@
 "stats to obfuscate true monetary costs."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.ja-diff.html    23 Mar 2019 10:31:42 -0000      1.77
+++ proprietary.ja-diff.html    26 Mar 2019 10:33:49 -0000      1.78
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -157,10 +157,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -181,6 +181,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
@@ -227,56 +249,6 @@
     is also deceptive, as it uses confusing menus and complex stats to
     obfuscate true monetary costs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209900000"&gt;
-    &lt;p id="addictiveness"&gt;Many games are designed to
-    keep gamers compulsively playing&mdash;and renewing
-    their subscription. To achieve this result, developers use &lt;a
-    
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
-    techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment in which the rat&hellip; sorry, the user is 
trained
-      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
-
-      &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
-      &lt;dd&gt;Items that have nothing to do with the game itself, but are
-      valuable to gamers because of the work required to obtain them
-      (e.g., EverQuest); some people will end up collecting them for the
-      sake of collecting.&lt;/dd&gt;
-
-      &lt;dt&gt;Random rewards&lt;/dt&gt;
-      &lt;dd&gt;They turn the game into the equivalent of a slot machine (e.g.,
-      World of Warcraft, ZT Online).&lt;/dd&gt;
-
-      &lt;dt&gt;Elaborate cycles&lt;/dt&gt;
-      &lt;dd&gt;Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
-      (progress from one level to the next) slower and slower, designing
-      complex tasks that are difficult to get out of (e.g. World of
-      Warcraft), or conversely dividing them up in small chunks to avoid
-      frustration (e.g., New Super Mario Bros.Wii).&lt;/dd&gt;
-
-      &lt;dt&gt;Decay of game assets&lt;/dt&gt;
-      &lt;dd&gt;This makes it necessary for a gamer to keep playing, without
-      vacations, simply to avoid losing what they have earned so far
-      (e.g., Farmville, Ultima Online, Animal Crossing).&lt;/dd&gt;
-    &lt;/dl&gt;
-
-    &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
-    use several of these techniques.&lt;/p&gt;
-
-    &lt;p&gt;However, the addictiveness of a game is only one of the 
determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.&lt;/p&gt;
-
-    &lt;p&gt;&lt;em&gt;Note:&lt;/em&gt;&nbsp; We are not gamers. If you think 
we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;&lt;a
-    href="mailto:address@hidden"&gt;address@hidden&lt;/a&gt;&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -337,7 +309,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary.ja.po   23 Mar 2019 10:31:42 -0000      1.98
+++ proprietary.ja.po   26 Mar 2019 10:33:49 -0000      1.99
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -406,94 +430,6 @@
 "stats to obfuscate true monetary costs."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary.nl-diff.html    23 Mar 2019 10:31:42 -0000      1.76
+++ proprietary.nl-diff.html    26 Mar 2019 10:33:49 -0000      1.77
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
@@ -230,56 +252,6 @@
     is also deceptive, as it uses confusing menus and complex stats to
     obfuscate true monetary costs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209900000"&gt;
-    &lt;p id="addictiveness"&gt;Many games are designed to
-    keep gamers compulsively playing&mdash;and renewing
-    their subscription. To achieve this result, developers use &lt;a
-    
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
-    techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment in which the rat&hellip; sorry, the user is 
trained
-      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
-
-      &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
-      &lt;dd&gt;Items that have nothing to do with the game itself, but are
-      valuable to gamers because of the work required to obtain them
-      (e.g., EverQuest); some people will end up collecting them for the
-      sake of collecting.&lt;/dd&gt;
-
-      &lt;dt&gt;Random rewards&lt;/dt&gt;
-      &lt;dd&gt;They turn the game into the equivalent of a slot machine (e.g.,
-      World of Warcraft, ZT Online).&lt;/dd&gt;
-
-      &lt;dt&gt;Elaborate cycles&lt;/dt&gt;
-      &lt;dd&gt;Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
-      (progress from one level to the next) slower and slower, designing
-      complex tasks that are difficult to get out of (e.g. World of
-      Warcraft), or conversely dividing them up in small chunks to avoid
-      frustration (e.g., New Super Mario Bros.Wii).&lt;/dd&gt;
-
-      &lt;dt&gt;Decay of game assets&lt;/dt&gt;
-      &lt;dd&gt;This makes it necessary for a gamer to keep playing, without
-      vacations, simply to avoid losing what they have earned so far
-      (e.g., Farmville, Ultima Online, Animal Crossing).&lt;/dd&gt;
-    &lt;/dl&gt;
-
-    &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
-    use several of these techniques.&lt;/p&gt;
-
-    &lt;p&gt;However, the addictiveness of a game is only one of the 
determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.&lt;/p&gt;
-
-    &lt;p&gt;&lt;em&gt;Note:&lt;/em&gt;&nbsp; We are not gamers. If you think 
we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;&lt;a
-    href="mailto:address@hidden"&gt;address@hidden&lt;/a&gt;&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -340,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary.nl.po   23 Mar 2019 10:31:42 -0000      1.87
+++ proprietary.nl.po   26 Mar 2019 10:33:49 -0000      1.88
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -479,94 +503,6 @@
 "stats to obfuscate true monetary costs."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.pl-diff.html    23 Mar 2019 10:31:42 -0000      1.94
+++ proprietary.pl-diff.html    26 Mar 2019 10:33:49 -0000      1.95
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
+instances of malicious functionalities (with more than 400 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -126,18 +126,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
@@ -228,56 +250,6 @@
     is also deceptive, as it uses confusing menus and complex stats to
     obfuscate true monetary costs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209900000"&gt;
-    &lt;p id="addictiveness"&gt;Many games are designed to
-    keep gamers compulsively playing&mdash;and renewing
-    their subscription. To achieve this result, developers use &lt;a
-    
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
-    techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment in which the rat&hellip; sorry, the user is 
trained
-      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
-
-      &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
-      &lt;dd&gt;Items that have nothing to do with the game itself, but are
-      valuable to gamers because of the work required to obtain them
-      (e.g., EverQuest); some people will end up collecting them for the
-      sake of collecting.&lt;/dd&gt;
-
-      &lt;dt&gt;Random rewards&lt;/dt&gt;
-      &lt;dd&gt;They turn the game into the equivalent of a slot machine (e.g.,
-      World of Warcraft, ZT Online).&lt;/dd&gt;
-
-      &lt;dt&gt;Elaborate cycles&lt;/dt&gt;
-      &lt;dd&gt;Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
-      (progress from one level to the next) slower and slower, designing
-      complex tasks that are difficult to get out of (e.g. World of
-      Warcraft), or conversely dividing them up in small chunks to avoid
-      frustration (e.g., New Super Mario Bros.Wii).&lt;/dd&gt;
-
-      &lt;dt&gt;Decay of game assets&lt;/dt&gt;
-      &lt;dd&gt;This makes it necessary for a gamer to keep playing, without
-      vacations, simply to avoid losing what they have earned so far
-      (e.g., Farmville, Ultima Online, Animal Crossing).&lt;/dd&gt;
-    &lt;/dl&gt;
-
-    &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
-    use several of these techniques.&lt;/p&gt;
-
-    &lt;p&gt;However, the addictiveness of a game is only one of the 
determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.&lt;/p&gt;
-
-    &lt;p&gt;&lt;em&gt;Note:&lt;/em&gt;&nbsp; We are not gamers. If you think 
we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;&lt;a
-    href="mailto:address@hidden"&gt;address@hidden&lt;/a&gt;&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -338,7 +310,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.pl.po   23 Mar 2019 10:31:42 -0000      1.82
+++ proprietary.pl.po   26 Mar 2019 10:33:49 -0000      1.83
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -561,94 +585,6 @@
 "stats to obfuscate true monetary costs."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.pot     23 Mar 2019 10:31:42 -0000      1.79
+++ proprietary.pot     26 Mar 2019 10:33:49 -0000      1.80
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,31 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a "
+"href=\"https://www.eff.org/wp/school-issued-devices-and-student-privacy\";> "
+"collecting far more data on students than is necessary, and store it "
+"indefinitely</a>. Parents and students complain about the lack of "
+"transparency on the part of both the educational services and the schools, "
+"the difficulty of opting out of these services, and the lack of proper "
+"privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a "
 "href=\"https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/\";> turn "
 "the Oculus Rift sensors into spy cameras</a> after breaking into the "
@@ -298,93 +323,6 @@
 "confusing menus and complex stats to obfuscate true monetary costs."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a "
-"href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html\";>
 "
-"techniques that derive from behavioral and brain research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to "
-"&ldquo;push the lever&ldquo;, i.e. do a certain action over and over again "
-"in order to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario "
-"Bros.Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a "
-"href=\"mailto:address@hidden";>address@hidden</a>&gt;."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary.pt-br.po        23 Mar 2019 12:33:20 -0000      1.115
+++ proprietary.pt-br.po        26 Mar 2019 10:33:49 -0000      1.116
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2019-03-23 08:45-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -292,6 +293,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -373,126 +398,6 @@
 "é enganador, pois utiliza menus confusos e estatísticas complexas para "
 "ofuscar verdadeiros custos monetários."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Muitos jogos são projetados para manter os jogadores jogando compulsivamente 
"
-"&ndash; e renovando suas assinaturas. Para alcançar esse resultado, os "
-"desenvolvedores usam <a href=\"http://www.cracked.com/article_18461_5-creepy-";
-"ways-video-games-are-trying-to-get-you-addicted.html\">técnicas que derivam "
-"de pesquisa comportamental e cerebral</a>:"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "A Caixa de Skinner"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"Um ambiente em que o rato… desculpe, o usuário é treinado para 
“empurrar a "
-"alavanca”, ou seja, fazer uma certa ação várias vezes para obter uma "
-"recompensa."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "Grãos de comida virtuais"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"Itens que não têm nada a ver com o jogo em si, mas são valiosos para os "
-"jogadores por causa do trabalho necessário para obtê-los (por exemplo, "
-"EverQuest); algumas pessoas acabarão coletando-as por colecionar."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "Recompensas aleatórias"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Eles transformam o jogo no equivalente a um caça-níqueis (por exemplo, 
World "
-"of Warcraft, ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "Ciclos elaborados"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"O comportamento dos jogadores pode ser “moldado” tornando os ciclos "
-"(progrida de um nível para o outro) mais e mais lento, projetando tarefas "
-"complexas das quais é difícil sair (por exemplo, World of Warcraft) ou "
-"dividindo-as em pequenos pedaços para evitar frustrações (por exemplo, New 
"
-"Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "Decadência de ativos <i lang=\"en\">(assets)</i> do jogo"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"Isso torna necessário que um jogador continue jogando, sem férias, "
-"simplesmente para evitar perder o que ganhou até agora (por exemplo, "
-"Farmville, Ultima Online, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"Jogos como World of Warcraft, que são considerados muito viciantes, usam "
-"várias dessas técnicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"No entanto, a dependência de um jogo é apenas um dos determinantes do 
vício. "
-"Igualmente importante é a constituição psicológica e as circunstâncias 
da "
-"vida do jogador. O vício em jogos, como outros vícios, é uma forma de fuga 
"
-"mental de uma vida pouco recompensadora. A triste verdade é que, a longo "
-"prazo, leva a uma vida ainda pior."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-"<em>Nota:</em>&nbsp;Nós não somos gamers. Se você acredita que entendemos "
-"equivocadamente algum ponto ou tem sugestões para tornar esse texto mais "
-"claro ou mais correto, envie-os para &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -568,6 +473,112 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Muitos jogos são projetados para manter os jogadores jogando "
+#~ "compulsivamente &ndash; e renovando suas assinaturas. Para alcançar esse "
+#~ "resultado, os desenvolvedores usam <a href=\"http://www.cracked.com/";
+#~ "article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted."
+#~ "html\">técnicas que derivam de pesquisa comportamental e cerebral</a>:"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "A Caixa de Skinner"
+
+#~ msgid ""
+#~ "An environment in which the rat&hellip; sorry, the user is trained to "
+#~ "&ldquo;push the lever&ldquo;, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "Um ambiente em que o rato… desculpe, o usuário é treinado para 
“empurrar "
+#~ "a alavanca”, ou seja, fazer uma certa ação várias vezes para obter 
uma "
+#~ "recompensa."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "Grãos de comida virtuais"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "Itens que não têm nada a ver com o jogo em si, mas são valiosos para os 
"
+#~ "jogadores por causa do trabalho necessário para obtê-los (por exemplo, "
+#~ "EverQuest); algumas pessoas acabarão coletando-as por colecionar."
+
+#~ msgid "Random rewards"
+#~ msgstr "Recompensas aleatórias"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Eles transformam o jogo no equivalente a um caça-níqueis (por exemplo, "
+#~ "World of Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "Ciclos elaborados"
+
+#~ msgid ""
+#~ "Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "O comportamento dos jogadores pode ser “moldado” tornando os ciclos "
+#~ "(progrida de um nível para o outro) mais e mais lento, projetando tarefas 
"
+#~ "complexas das quais é difícil sair (por exemplo, World of Warcraft) ou "
+#~ "dividindo-as em pequenos pedaços para evitar frustrações (por exemplo, "
+#~ "New Super Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "Decadência de ativos <i lang=\"en\">(assets)</i> do jogo"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "Isso torna necessário que um jogador continue jogando, sem férias, "
+#~ "simplesmente para evitar perder o que ganhou até agora (por exemplo, "
+#~ "Farmville, Ultima Online, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "Jogos como World of Warcraft, que são considerados muito viciantes, usam "
+#~ "várias dessas técnicas."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "No entanto, a dependência de um jogo é apenas um dos determinantes do "
+#~ "vício. Igualmente importante é a constituição psicológica e as "
+#~ "circunstâncias da vida do jogador. O vício em jogos, como outros 
vícios, "
+#~ "é uma forma de fuga mental de uma vida pouco recompensadora. A triste "
+#~ "verdade é que, a longo prazo, leva a uma vida ainda pior."
+
+#~ msgid ""
+#~ "<em>Note:</em>&nbsp; We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to &lt;<a href=\"mailto:";
+#~ "address@hidden">address@hidden</a>&gt;."
+#~ msgstr ""
+#~ "<em>Nota:</em>&nbsp;Nós não somos gamers. Se você acredita que 
entendemos "
+#~ "equivocadamente algum ponto ou tem sugestões para tornar esse texto mais "
+#~ "claro ou mais correto, envie-os para &lt;<a href=\"mailto:address@hidden";
+#~ "org\">address@hidden</a>&gt;."
+
+#~ msgid ""
 #~ "The Ring (now Amazon) doorbell camera is designed so that the "
 #~ "manufacturer (now Amazon) can watch all the time. Now it turns out that "
 #~ "<a href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary.ru.po   23 Mar 2019 17:32:01 -0000      1.191
+++ proprietary.ru.po   26 Mar 2019 10:33:49 -0000      1.192
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-26 10:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -380,125 +405,6 @@
 "запутанных меню и усложненных отчетов, 
которые скрывают истинные денежные "
 "затраты."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-"Многие игры проектируются так, чтобы 
игроки принуждались продолжать "
-"игру&nbsp;&mdash; и возобновлять свою подписку. 
Чтобы достичь этого, "
-"разработчики пользуются <a 
href=\"http://www.cracked.com/article_18461_5-";
-"creepy-ways-video-games-are-trying-to-get-you-addicted.html\"> 
приемами, "
-"вытекающими из исследований поведения и 
мозга</a>:"
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr "Ящик Скиннера"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-"Среда, в которой подопытную крыс... пардон, 
пользователя обучают &ldquo;"
-"нажимать на рычаг&rdquo;, т.е. выполнять 
определенное действие снова и "
-"снова, чтобы получать вознаграждение."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr "Виртуальные кормушки"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-"Предметы, которые никак не связаны с самой 
игрой, но представляют ценность "
-"для игроков из-за работы, которая 
требуется для их получения (напр. "
-"EverQuest); некоторые начинают собирать их 
просто для коллекции."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr "Случайные награды"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-"Они превращают игру в эквивалент игрового 
автомата (напр. World of Warcraft, "
-"ZT Online)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr "Переменные циклы"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-"Поведение игрока можно 
&ldquo;формировать&rdquo; убыстряя или замедляя 
циклы "
-"(переход от одного уровня к другому), 
составляя сложные задания, из которых "
-"трудно выйти (напр. World of Warcraft) или 
соответственно разделяя их на "
-"небольшие куски, чтобы это не надоедало 
(напр. New Super Mario Bros.Wii)."
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr "Износ игрового имущества"
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-"Это вынуждает игроков играть каждый день, 
без выходных, просто для того, "
-"чтобы не потерять то, что они уже 
заработали (напр. Farmville, Ultima "
-"Online, Animal Crossing)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-"В таких играх как World of Warcraft, которые 
считаются вызывающими сильную "
-"зависимость, применяется несколько таких 
приемов."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-"Однако способность игры вызывать 
зависимость&nbsp;&mdash; только одна из "
-"составляющих зависимости. Не менее важны 
психический облик и обстоятельства "
-"жизни игрока. Зависимость от игр, как и 
другие формы зависимости&nbsp;"
-"&mdash; это форма психического ухода от 
неудовлетворенности жизнью. Как это "
-"ни печально, в долгосрочной перспективе 
это приводит к еще худшей жизни."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-"<em>Замечание</em>. Мы не игроки. Если вы 
думаете, что мы чего-то не поняли, "
-"или у вас есть предложения, которые 
сделают этот текст понятнее или "
-"правильнее, присылайте их по адресу &lt;<a 
href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -578,6 +484,113 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Many games are designed to keep gamers compulsively playing&mdash;and "
+#~ "renewing their subscription. To achieve this result, developers use <a "
+#~ "href=\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-";
+#~ "trying-to-get-you-addicted.html\"> techniques that derive from behavioral "
+#~ "and brain research</a>:"
+#~ msgstr ""
+#~ "Многие игры проектируются так, чтобы 
игроки принуждались продолжать "
+#~ "игру&nbsp;&mdash; и возобновлять свою 
подписку. Чтобы достичь этого, "
+#~ "разработчики пользуются <a 
href=\"http://www.cracked.com/article_18461_5-";
+#~ "creepy-ways-video-games-are-trying-to-get-you-addicted.html\"> 
приемами, "
+#~ "вытекающими из исследований поведения и 
мозга</a>:"
+
+#~ msgid "The Skinner Box"
+#~ msgstr "Ящик Скиннера"
+
+#~ msgid ""
+#~ "An environment in which the rat&hellip; sorry, the user is trained to "
+#~ "&ldquo;push the lever&ldquo;, i.e. do a certain action over and over "
+#~ "again in order to get a reward."
+#~ msgstr ""
+#~ "Среда, в которой подопытную крыс... 
пардон, пользователя обучают &ldquo;"
+#~ "нажимать на рычаг&rdquo;, т.е. выполнять 
определенное действие снова и "
+#~ "снова, чтобы получать вознаграждение."
+
+#~ msgid "Virtual food pellets"
+#~ msgstr "Виртуальные кормушки"
+
+#~ msgid ""
+#~ "Items that have nothing to do with the game itself, but are valuable to "
+#~ "gamers because of the work required to obtain them (e.g., EverQuest); "
+#~ "some people will end up collecting them for the sake of collecting."
+#~ msgstr ""
+#~ "Предметы, которые никак не связаны с 
самой игрой, но представляют "
+#~ "ценность для игроков из-за работы, 
которая требуется для их получения "
+#~ "(напр. EverQuest); некоторые начинают 
собирать их просто для коллекции."
+
+#~ msgid "Random rewards"
+#~ msgstr "Случайные награды"
+
+#~ msgid ""
+#~ "They turn the game into the equivalent of a slot machine (e.g., World of "
+#~ "Warcraft, ZT Online)."
+#~ msgstr ""
+#~ "Они превращают игру в эквивалент 
игрового автомата (напр. World of "
+#~ "Warcraft, ZT Online)."
+
+#~ msgid "Elaborate cycles"
+#~ msgstr "Переменные циклы"
+
+#~ msgid ""
+#~ "Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress "
+#~ "from one level to the next) slower and slower, designing complex tasks "
+#~ "that are difficult to get out of (e.g. World of Warcraft), or conversely "
+#~ "dividing them up in small chunks to avoid frustration (e.g., New Super "
+#~ "Mario Bros.Wii)."
+#~ msgstr ""
+#~ "Поведение игрока можно 
&ldquo;формировать&rdquo; убыстряя или замедляя "
+#~ "циклы (переход от одного уровня к 
другому), составляя сложные задания, из "
+#~ "которых трудно выйти (напр. World of Warcraft) 
или соответственно "
+#~ "разделяя их на небольшие куски, чтобы 
это не надоедало (напр. New Super "
+#~ "Mario Bros.Wii)."
+
+#~ msgid "Decay of game assets"
+#~ msgstr "Износ игрового имущества"
+
+#~ msgid ""
+#~ "This makes it necessary for a gamer to keep playing, without vacations, "
+#~ "simply to avoid losing what they have earned so far (e.g., Farmville, "
+#~ "Ultima Online, Animal Crossing)."
+#~ msgstr ""
+#~ "Это вынуждает игроков играть каждый 
день, без выходных, просто для того, "
+#~ "чтобы не потерять то, что они уже 
заработали (напр. Farmville, Ultima "
+#~ "Online, Animal Crossing)."
+
+#~ msgid ""
+#~ "Games such as World of Warcraft, which are considered very addictive, use "
+#~ "several of these techniques."
+#~ msgstr ""
+#~ "В таких играх как World of Warcraft, которые 
считаются вызывающими "
+#~ "сильную зависимость, применяется 
несколько таких приемов."
+
+#~ msgid ""
+#~ "However, the addictiveness of a game is only one of the determinants of "
+#~ "addiction. Equally important are the psychological make-up and life "
+#~ "circumstances of the gamer. Gaming addiction, like other addictions, is a "
+#~ "form of mental escape from an unrewarding life. The sad truth is that, in "
+#~ "the long run, it leads to an even worse life."
+#~ msgstr ""
+#~ "Однако способность игры вызывать 
зависимость&nbsp;&mdash; только одна из "
+#~ "составляющих зависимости. Не менее 
важны психический облик и "
+#~ "обстоятельства жизни игрока. 
Зависимость от игр, как и другие формы "
+#~ "зависимости&nbsp;&mdash; это форма псих
ического ухода от "
+#~ "неудовлетворенности жизнью. Как это ни 
печально, в долгосрочной "
+#~ "перспективе это приводит к еще худшей 
жизни."
+
+#~ msgid ""
+#~ "<em>Note:</em>&nbsp; We are not gamers. If you think we have "
+#~ "misunderstood some point, or have suggestions for making this text "
+#~ "clearer or more correct, please send them to &lt;<a href=\"mailto:";
+#~ "address@hidden">address@hidden</a>&gt;."
+#~ msgstr ""
+#~ "<em>Замечание</em>. Мы не игроки. Если вы 
думаете, что мы чего-то не "
+#~ "поняли, или у вас есть предложения, 
которые сделают этот текст понятнее "
+#~ "или правильнее, присылайте их по адресу 
&lt;<a href=\"mailto:";
+#~ "address@hidden">address@hidden</a>&gt;."
+
+#~ msgid ""
 #~ "The Ring (now Amazon) doorbell camera is designed so that the "
 #~ "manufacturer (now Amazon) can watch all the time. Now it turns out that "
 #~ "<a href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary.zh-tw-diff.html 23 Mar 2019 10:31:42 -0000      1.54
+++ proprietary.zh-tw-diff.html 26 Mar 2019 10:33:49 -0000      1.55
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -128,14 +128,14 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,28 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201704131"&gt;
+    &lt;p&gt;Low-priced Chromebooks for schools are &lt;a
+    href="https://www.eff.org/wp/school-issued-devices-and-student-privacy"&gt;
+    collecting far more data on students than is necessary, and store
+    it indefinitely&lt;/a&gt;. Parents and students complain about the lack
+    of transparency on the part of both the educational services and the
+    schools, the difficulty of opting out of these services, and the lack
+    of proper privacy policies, among other things.&lt;/p&gt;
+
+    &lt;p&gt;But complaining is not sufficient. Parents, students and teachers
+    should realize that the software Google uses to spy on students is
+    nonfree, so they can't verify what it really does. The only remedy is
+    to persuade school officials to &lt;a 
href="/education/edu-schools.html"&gt;
+    exclusively use free software&lt;/a&gt; for both education and school
+    administration. If the school is run locally, parents and teachers
+    can mandate their representatives at the School Board to refuse the
+    budget unless the school initiates a switch to free software. If
+    education is run nation-wide, they need to persuade legislators
+    (e.g., through free software organizations, political parties,
+    etc.) to migrate the public schools to free software.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
@@ -231,56 +253,6 @@
     is also deceptive, as it uses confusing menus and complex stats to
     obfuscate true monetary costs.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M209900000"&gt;
-    &lt;p id="addictiveness"&gt;Many games are designed to
-    keep gamers compulsively playing&mdash;and renewing
-    their subscription. To achieve this result, developers use &lt;a
-    
href="http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-to-get-you-addicted.html"&gt;
-    techniques that derive from behavioral and brain 
research&lt;/a&gt;:&lt;/p&gt;
-
-    &lt;dl class="compact"&gt;&lt;dt&gt;The Skinner Box&lt;/dt&gt;
-      &lt;dd&gt;An environment in which the rat&hellip; sorry, the user is 
trained
-      to &ldquo;push the lever&ldquo;, i.e. do a certain action over and
-      over again in order to get a reward.&lt;/dd&gt;
-
-      &lt;dt&gt;Virtual food pellets&lt;/dt&gt;
-      &lt;dd&gt;Items that have nothing to do with the game itself, but are
-      valuable to gamers because of the work required to obtain them
-      (e.g., EverQuest); some people will end up collecting them for the
-      sake of collecting.&lt;/dd&gt;
-
-      &lt;dt&gt;Random rewards&lt;/dt&gt;
-      &lt;dd&gt;They turn the game into the equivalent of a slot machine (e.g.,
-      World of Warcraft, ZT Online).&lt;/dd&gt;
-
-      &lt;dt&gt;Elaborate cycles&lt;/dt&gt;
-      &lt;dd&gt;Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles
-      (progress from one level to the next) slower and slower, designing
-      complex tasks that are difficult to get out of (e.g. World of
-      Warcraft), or conversely dividing them up in small chunks to avoid
-      frustration (e.g., New Super Mario Bros.Wii).&lt;/dd&gt;
-
-      &lt;dt&gt;Decay of game assets&lt;/dt&gt;
-      &lt;dd&gt;This makes it necessary for a gamer to keep playing, without
-      vacations, simply to avoid losing what they have earned so far
-      (e.g., Farmville, Ultima Online, Animal Crossing).&lt;/dd&gt;
-    &lt;/dl&gt;
-
-    &lt;p&gt;Games such as World of Warcraft, which are considered very 
addictive,
-    use several of these techniques.&lt;/p&gt;
-
-    &lt;p&gt;However, the addictiveness of a game is only one of the 
determinants
-    of addiction. Equally important are the psychological make-up and life
-    circumstances of the gamer. Gaming addiction, like other addictions,
-    is a form of mental escape from an unrewarding life. The sad truth
-    is that, in the long run, it leads to an even worse life.&lt;/p&gt;
-
-    &lt;p&gt;&lt;em&gt;Note:&lt;/em&gt;&nbsp; We are not gamers. If you think 
we
-    have misunderstood some point, or have suggestions for making
-    this text clearer or more correct, please send them to &lt;&lt;a
-    href="mailto:address@hidden"&gt;address@hidden&lt;/a&gt;&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -341,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:42 $
+$Date: 2019/03/26 10:33:49 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.zh-tw.po        23 Mar 2019 10:31:42 -0000      1.65
+++ proprietary.zh-tw.po        26 Mar 2019 10:33:49 -0000      1.66
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-03-26 10:27+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "A cracker would be able to <a href=\"https://uploadvr.com/hackable-webcam-";
 "oculus-sensor-be-aware/\"> turn the Oculus Rift sensors into spy cameras</a> "
 "after breaking into the computer they are connected to."
@@ -395,94 +419,6 @@
 "stats to obfuscate true monetary costs."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many games are designed to keep gamers compulsively playing&mdash;and "
-"renewing their subscription. To achieve this result, developers use <a href="
-"\"http://www.cracked.com/article_18461_5-creepy-ways-video-games-are-trying-";
-"to-get-you-addicted.html\"> techniques that derive from behavioral and brain "
-"research</a>:"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "The Skinner Box"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"An environment in which the rat&hellip; sorry, the user is trained to &ldquo;"
-"push the lever&ldquo;, i.e. do a certain action over and over again in order "
-"to get a reward."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Virtual food pellets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Items that have nothing to do with the game itself, but are valuable to "
-"gamers because of the work required to obtain them (e.g., EverQuest); some "
-"people will end up collecting them for the sake of collecting."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Random rewards"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"They turn the game into the equivalent of a slot machine (e.g., World of "
-"Warcraft, ZT Online)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Elaborate cycles"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"Gamers' behavior can be &ldquo;shaped&rdquo; by making cycles (progress from "
-"one level to the next) slower and slower, designing complex tasks that are "
-"difficult to get out of (e.g. World of Warcraft), or conversely dividing "
-"them up in small chunks to avoid frustration (e.g., New Super Mario Bros."
-"Wii)."
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dt>
-msgid "Decay of game assets"
-msgstr ""
-
-#. type: Content of: <ul><li><dl><dd>
-msgid ""
-"This makes it necessary for a gamer to keep playing, without vacations, "
-"simply to avoid losing what they have earned so far (e.g., Farmville, Ultima "
-"Online, Animal Crossing)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Games such as World of Warcraft, which are considered very addictive, use "
-"several of these techniques."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"However, the addictiveness of a game is only one of the determinants of "
-"addiction. Equally important are the psychological make-up and life "
-"circumstances of the gamer. Gaming addiction, like other addictions, is a "
-"form of mental escape from an unrewarding life. The sad truth is that, in "
-"the long run, it leads to an even worse life."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<em>Note:</em>&nbsp; We are not gamers. If you think we have misunderstood "
-"some point, or have suggestions for making this text clearer or more "
-"correct, please send them to &lt;<a href=\"mailto:address@hidden";
-"\">address@hidden</a>&gt;."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- pt-br.po    23 Mar 2019 12:33:20 -0000      1.69
+++ pt-br.po    26 Mar 2019 10:33:49 -0000      1.70
@@ -3251,6 +3251,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- ru.po       23 Mar 2019 18:01:24 -0000      1.120
+++ ru.po       26 Mar 2019 10:33:49 -0000      1.121
@@ -4380,6 +4380,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- zh-tw.po    23 Mar 2019 10:31:42 -0000      1.52
+++ zh-tw.po    26 Mar 2019 10:33:49 -0000      1.53
@@ -3066,6 +3066,30 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Low-priced Chromebooks for schools are <a href=\"https://www.eff.org/wp/";
+"school-issued-devices-and-student-privacy\"> collecting far more data on "
+"students than is necessary, and store it indefinitely</a>. Parents and "
+"students complain about the lack of transparency on the part of both the "
+"educational services and the schools, the difficulty of opting out of these "
+"services, and the lack of proper privacy policies, among other things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"But complaining is not sufficient. Parents, students and teachers should "
+"realize that the software Google uses to spy on students is nonfree, so they "
+"can't verify what it really does. The only remedy is to persuade school "
+"officials to <a href=\"/education/edu-schools.html\"> exclusively use free "
+"software</a> for both education and school administration. If the school is "
+"run locally, parents and teachers can mandate their representatives at the "
+"School Board to refuse the budget unless the school initiates a switch to "
+"free software. If education is run nation-wide, they need to persuade "
+"legislators (e.g., through free software organizations, political parties, "
+"etc.) to migrate the public schools to free software."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google's new voice messaging app <a href=\"http://www.theverge.";
 "com/2016/9/21/12994362/allo-privacy-message-logs-google\">logs all "
 "conversations</a>."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]