www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www manual/allgnupkgs.af.html manual/allgnupkgs...


From: GNUN
Subject: www manual/allgnupkgs.af.html manual/allgnupkgs...
Date: Thu, 11 Apr 2019 03:00:42 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/04/11 03:00:38

Modified files:
        manual         : allgnupkgs.af.html allgnupkgs.ar.html 
                         allgnupkgs.bg.html allgnupkgs.ca.html 
                         allgnupkgs.cs.html allgnupkgs.da.html 
                         allgnupkgs.de.html allgnupkgs.el.html 
                         allgnupkgs.es.html allgnupkgs.fa.html 
                         allgnupkgs.fr.html allgnupkgs.he.html 
                         allgnupkgs.hr.html allgnupkgs.id.html 
                         allgnupkgs.it.html allgnupkgs.ja.html 
                         allgnupkgs.ko.html allgnupkgs.lt.html 
                         allgnupkgs.ml.html allgnupkgs.nb.html 
                         allgnupkgs.nl.html allgnupkgs.pl.html 
                         allgnupkgs.pt-br.html allgnupkgs.ro.html 
                         allgnupkgs.ru.html allgnupkgs.sk.html 
                         allgnupkgs.sq.html allgnupkgs.sr.html 
                         allgnupkgs.sv.html allgnupkgs.ta.html 
                         allgnupkgs.te.html allgnupkgs.tr.html 
                         allgnupkgs.uk.html allgnupkgs.zh-cn.html 
                         allgnupkgs.zh-tw.html 
        manual/po      : allgnupkgs.de.po allgnupkgs.fr.po 
                         allgnupkgs.pot.opt allgnupkgs.pt-br.po 
        prep           : ftp.de.html 
        prep/po        : ftp.de.po ftp.pot 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-insecurity.de-diff.html 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 
        server         : home-pkgblurbs.af.html home-pkgblurbs.ar.html 
                         home-pkgblurbs.bg.html home-pkgblurbs.ca.html 
                         home-pkgblurbs.cs.html home-pkgblurbs.da.html 
                         home-pkgblurbs.de.html home-pkgblurbs.el.html 
                         home-pkgblurbs.es.html home-pkgblurbs.fa.html 
                         home-pkgblurbs.fr.html home-pkgblurbs.he.html 
                         home-pkgblurbs.hr.html home-pkgblurbs.id.html 
                         home-pkgblurbs.it.html home-pkgblurbs.ja.html 
                         home-pkgblurbs.ko.html home-pkgblurbs.lt.html 
                         home-pkgblurbs.ml.html home-pkgblurbs.nb.html 
                         home-pkgblurbs.nl.html home-pkgblurbs.pl.html 
                         home-pkgblurbs.pt-br.html 
                         home-pkgblurbs.ro.html home-pkgblurbs.ru.html 
                         home-pkgblurbs.sk.html home-pkgblurbs.sq.html 
                         home-pkgblurbs.sr.html home-pkgblurbs.sv.html 
                         home-pkgblurbs.ta.html home-pkgblurbs.te.html 
                         home-pkgblurbs.tr.html home-pkgblurbs.uk.html 
                         home-pkgblurbs.zh-cn.html 
                         home-pkgblurbs.zh-tw.html 
        server/po      : home-pkgblurbs.de.po home-pkgblurbs.fr.po 
                         home-pkgblurbs.ja.po home-pkgblurbs.pot.opt 
                         home-pkgblurbs.pt-br.po home-pkgblurbs.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.af.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ar.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.bg.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ca.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.cs.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.da.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.de.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.el.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.es.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.fa.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.fr.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.he.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.hr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.id.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.it.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ja.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ko.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.lt.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ml.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.nb.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.nl.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.pl.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.pt-br.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ro.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ru.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sk.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sq.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sv.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ta.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.te.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.tr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.uk.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.zh-cn.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.zh-tw.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.fr.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.pot.opt?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/prep/ftp.de.html?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/prep/po/ftp.de.po?cvsroot=www&r1=1.368&r2=1.369
http://web.cvs.savannah.gnu.org/viewcvs/www/prep/po/ftp.pot?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.af.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ar.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.bg.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ca.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.cs.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.da.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.de.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.el.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.es.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.fa.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.fr.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.he.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.hr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.id.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.it.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ja.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ko.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.lt.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ml.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.nb.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.nl.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.pl.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.pt-br.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ro.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ru.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sk.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sq.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sv.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ta.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.te.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.tr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.uk.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.zh-cn.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.zh-tw.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.de.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.fr.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.ja.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.pot.opt?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.pt-br.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.ru.po?cvsroot=www&r1=1.207&r2=1.208

Patches:
Index: manual/allgnupkgs.af.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.af.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.af.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.af.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ar.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ar.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ar.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ar.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.bg.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.bg.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.bg.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.bg.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ca.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ca.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ca.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ca.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.cs.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.cs.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.cs.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.cs.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.da.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.da.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- manual/allgnupkgs.da.html   9 Mar 2019 17:02:53 -0000       1.49
+++ manual/allgnupkgs.da.html   11 Apr 2019 07:00:31 -0000      1.50
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.de.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.de.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- manual/allgnupkgs.de.html   9 Mar 2019 17:02:53 -0000       1.112
+++ manual/allgnupkgs.de.html   11 Apr 2019 07:00:31 -0000      1.113
@@ -1,5 +1,5 @@
 
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a
 href="#Archiving">Archivierung</a> | <a
@@ -750,9 +750,9 @@
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
 
href="https://directory.fsf.org/category/lc/";><big><b>Echtzeit-Kommunikation</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
-    <td>Ein Privatsphäre respektierendes Kommunikationsprogramm. [<a
-href="/software/ring/">Ring</a>-Startseite]</td></tr>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
+    <td>A privacy-respecting communication program.  [<a
+href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1970,4 +1970,4 @@
 href="#Dictionaries">Wörterbücher</a>
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.el.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.el.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.el.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.el.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.es.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.es.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.es.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.es.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.fa.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.fa.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.fa.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.fa.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.fr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.fr.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- manual/allgnupkgs.fr.html   31 Mar 2019 12:23:51 -0000      1.120
+++ manual/allgnupkgs.fr.html   11 Apr 2019 07:00:31 -0000      1.121
@@ -1,5 +1,5 @@
 
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archivage</a> - <a href="#Audio">Audio</a> - <a
 href="#Business">Entreprise et productivité</a> - <a
@@ -780,9 +780,9 @@
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Communication
 instantanée</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
-    <td>Un programme de communication qui respecte la vie privée.  [<a
-href="/software/ring/">ring – accueil</a>]</td></tr>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
+    <td>A privacy-respecting communication program.  [<a
+href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -2007,4 +2007,4 @@
 href="#Video">Vidéo</a> - <a href="#Web">Création web</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.he.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.he.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.he.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.he.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.hr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.hr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.hr.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.hr.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.id.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.id.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.id.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.id.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.it.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.it.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.it.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.it.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ja.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ja.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ja.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ja.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ko.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ko.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ko.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ko.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.lt.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.lt.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- manual/allgnupkgs.lt.html   9 Mar 2019 17:02:53 -0000       1.56
+++ manual/allgnupkgs.lt.html   11 Apr 2019 07:00:31 -0000      1.57
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ml.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ml.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ml.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ml.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.nb.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.nb.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.nb.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.nb.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.nl.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.nl.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.nl.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.nl.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.pl.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.pl.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.pl.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.pl.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.pt-br.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.pt-br.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- manual/allgnupkgs.pt-br.html        9 Mar 2019 17:02:53 -0000       1.71
+++ manual/allgnupkgs.pt-br.html        11 Apr 2019 07:00:31 -0000      1.72
@@ -1,5 +1,5 @@
 
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Arquivamento</a> - <a href="#Audio">Áudio</a> - <a
 href="#Business">Negócios&nbsp;e&nbsp;produtividade</a> - <a
@@ -773,9 +773,9 @@
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Comunicação ao
 vivo</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
-    <td>Um programa de comunicação que respeita a privacidade.  [<a
-href="/software/ring/">página&nbsp;do&nbsp;ring</a>]</td></tr>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
+    <td>A privacy-respecting communication program.  [<a
+href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1998,4 +1998,4 @@
 href="#Video">Vídeo</a> - <a href="#Web">Autoria&nbsp;web</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ro.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ro.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ro.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ro.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ru.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ru.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ru.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ru.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.sk.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sk.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sk.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.sk.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.sq.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sq.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sq.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.sq.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.sr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sr.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.sr.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.sv.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sv.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sv.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.sv.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.ta.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ta.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ta.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.ta.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.te.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.te.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- manual/allgnupkgs.te.html   9 Mar 2019 17:02:53 -0000       1.5
+++ manual/allgnupkgs.te.html   11 Apr 2019 07:00:31 -0000      1.6
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.tr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.tr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.tr.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.tr.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.uk.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.uk.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.uk.html   9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.uk.html   11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.zh-cn.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.zh-cn.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.zh-cn.html        9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.zh-cn.html        11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/allgnupkgs.zh-tw.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.zh-tw.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.zh-tw.html        9 Mar 2019 17:02:53 -0000       1.70
+++ manual/allgnupkgs.zh-tw.html        11 Apr 2019 07:00:31 -0000      1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <p>
 <a href="#Archiving">Archiving</a> -
 <a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
 <tr>
 <td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a 
href="http://directory.fsf.org/category/lc/";><big><b>Live 
communications</b></big></a></td></tr>
 
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
     <td>A privacy-respecting communication program.
-       [<a href="/software/ring/">ring&nbsp;home</a>]</td></tr>
+       [<a href="/software/jami/">jami&nbsp;home</a>]</td></tr>
 
 
 <tr>
@@ -1903,4 +1903,4 @@
 <a href="#Web">Web&nbsp;authoring</a> -
 </p>
 
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: manual/po/allgnupkgs.de.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- manual/po/allgnupkgs.de.po  9 Mar 2019 17:02:53 -0000       1.144
+++ manual/po/allgnupkgs.de.po  11 Apr 2019 07:00:32 -0000      1.145
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: allgnupkgs.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2018-07-10 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -2062,13 +2062,24 @@
 "Kommunikation</b></big></a>"
 
 #. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
-msgstr "* <a href=\"/software/ring/\">Ring</a>"
+# | * <a [-href=\"/software/acm/\">Acm</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "* <a href=\"/software/acm/\">Acm</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
+msgstr "* <a href=\"/software/acm/\">ACM</a>"
 
 #. type: Content of: <table><tr><td>
+# | A privacy-respecting communication program.  [<a
+# | [-href=\"/software/ring/\">ring&nbsp;home</a>]-]
+# | {+href=\"/software/jami/\">jami&nbsp;home</a>]+}
+#, fuzzy
+#| msgid ""
+#| "A privacy-respecting communication program.  [<a href=\"/software/ring/"
+#| "\">ring&nbsp;home</a>]"
 msgid ""
-"A privacy-respecting communication program.  [<a href=\"/software/ring/"
-"\">ring&nbsp;home</a>]"
+"A privacy-respecting communication program.  [<a href=\"/software/jami/"
+"\">jami&nbsp;home</a>]"
 msgstr ""
 "Ein Privatsphäre respektierendes Kommunikationsprogramm. [<a href=\"/"
 "software/ring/\">Ring</a>-Startseite]"
@@ -5469,6 +5480,9 @@
 "Einfaches XML zur Definition und Umsetzung von Auszeichnungssprachen. [<a "
 "href=\"/software/xmlat/\">XMLAT</a>-Startseite]"
 
+#~ msgid "* <a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "* <a href=\"/software/ring/\">Ring</a>"
+
 #~ msgid ""
 #~ "* <a href=\"http://gnuradio.org/redmine/projects/gnuradio/wiki\";>Radio</a>"
 #~ msgstr ""

Index: manual/po/allgnupkgs.fr.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.fr.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- manual/po/allgnupkgs.fr.po  31 Mar 2019 11:07:09 -0000      1.137
+++ manual/po/allgnupkgs.fr.po  11 Apr 2019 07:00:32 -0000      1.138
@@ -10,7 +10,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: allgnupkgs.html\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2019-03-31 13:02+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -18,6 +18,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -2075,13 +2076,24 @@
 "instantanée</b></big></a>"
 
 #. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
-msgstr "* <a href=\"/software/ring/\">Ring</a>"
+# | * <a [-href=\"/software/acm/\">Acm</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "* <a href=\"/software/acm/\">Acm</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
+msgstr "* <a href=\"/software/acm/\">Acm</a>"
 
 #. type: Content of: <table><tr><td>
+# | A privacy-respecting communication program.  [<a
+# | [-href=\"/software/ring/\">ring&nbsp;home</a>]-]
+# | {+href=\"/software/jami/\">jami&nbsp;home</a>]+}
+#, fuzzy
+#| msgid ""
+#| "A privacy-respecting communication program.  [<a href=\"/software/ring/"
+#| "\">ring&nbsp;home</a>]"
 msgid ""
-"A privacy-respecting communication program.  [<a href=\"/software/ring/"
-"\">ring&nbsp;home</a>]"
+"A privacy-respecting communication program.  [<a href=\"/software/jami/"
+"\">jami&nbsp;home</a>]"
 msgstr ""
 "Un programme de communication qui respecte la vie privée.  [<a href=\"/"
 "software/ring/\">ring – accueil</a>]"
@@ -5446,3 +5458,6 @@
 msgstr ""
 "XML simple pour la définition et l'implémentation de langages de balises. "
 "[<a href=\"/software/xmlat/\">xmlat – accueil</a>]"
+
+#~ msgid "* <a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "* <a href=\"/software/ring/\">Ring</a>"

Index: manual/po/allgnupkgs.pot.opt
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.pot.opt,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- manual/po/allgnupkgs.pot.opt        9 Mar 2019 17:02:54 -0000       1.56
+++ manual/po/allgnupkgs.pot.opt        11 Apr 2019 07:00:32 -0000      1.57
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: allgnupkgs.html\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1663,13 +1663,13 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
 msgstr ""
 
 #. type: Content of: <table><tr><td>
 msgid ""
 "A privacy-respecting communication program.  [<a "
-"href=\"/software/ring/\">ring&nbsp;home</a>]"
+"href=\"/software/jami/\">jami&nbsp;home</a>]"
 msgstr ""
 
 #. type: Content of: <table><tr><td>

Index: manual/po/allgnupkgs.pt-br.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- manual/po/allgnupkgs.pt-br.po       12 Mar 2019 14:31:28 -0000      1.5
+++ manual/po/allgnupkgs.pt-br.po       11 Apr 2019 07:00:32 -0000      1.6
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: allgnupkgs.html\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2019-03-12 09:51-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -2067,13 +2068,19 @@
 "vivo</b></big></a>"
 
 #. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
-msgstr "* <a href=\"/software/ring/\">Ring</a>"
+#, fuzzy
+#| msgid "* <a href=\"/software/acm/\">Acm</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
+msgstr "* <a href=\"/software/acm/\">Acm</a>"
 
 #. type: Content of: <table><tr><td>
+#, fuzzy
+#| msgid ""
+#| "A privacy-respecting communication program.  [<a href=\"/software/ring/"
+#| "\">ring&nbsp;home</a>]"
 msgid ""
-"A privacy-respecting communication program.  [<a href=\"/software/ring/"
-"\">ring&nbsp;home</a>]"
+"A privacy-respecting communication program.  [<a href=\"/software/jami/"
+"\">jami&nbsp;home</a>]"
 msgstr ""
 "Um programa de comunicação que respeita a privacidade.  [<a 
href=\"/software/"
 "ring/\">página&nbsp;do&nbsp;ring</a>]"
@@ -5444,6 +5451,9 @@
 "XML simples para definição e implementação de linguages de marcação.  
[<a "
 "href=\"/software/xmlat/\">página&nbsp;do&nbsp;xmlat</a>]"
 
+#~ msgid "* <a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "* <a href=\"/software/ring/\">Ring</a>"
+
 # Nome do software, não traduzir
 #~ msgid ""
 #~ "* <a href=\"http://gnuradio.org/redmine/projects/gnuradio/wiki\";>Radio</a>"

Index: prep/ftp.de.html
===================================================================
RCS file: /web/www/www/prep/ftp.de.html,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- prep/ftp.de.html    9 Apr 2019 13:00:46 -0000       1.329
+++ prep/ftp.de.html    11 Apr 2019 07:00:32 -0000      1.330
@@ -515,6 +515,10 @@
   <li><a rel="nofollow"
 href="http://ftp.thunix.net/gnu-ftp";>http://ftp.thunix.net/gnu-ftp</a></li>
   <li><a rel="nofollow"
+href="https://www.singleboersen.com/mirror/gnu/";>https://www.singleboersen.com/mirror/gnu/</a></li>
+  <li><a rel="nofollow"
+href="http://www.singleboersen.com/mirror/gnu/";>http://www.singleboersen.com/mirror/gnu/</a></li>
+  <li><a rel="nofollow"
 
href="https://mirror.bibleonline.ru/gnu/";>https://mirror.bibleonline.ru/gnu/</a></li>
   <li><a rel="nofollow"
 
href="http://mirror.bibleonline.ru/gnu/";>http://mirror.bibleonline.ru/gnu/</a></li>
@@ -879,7 +883,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2019/04/09 13:00:46 $
+$Date: 2019/04/11 07:00:32 $
 
 <!-- timestamp end -->
 </p>

Index: prep/po/ftp.de.po
===================================================================
RCS file: /web/www/www/prep/po/ftp.de.po,v
retrieving revision 1.368
retrieving revision 1.369
diff -u -b -r1.368 -r1.369
--- prep/po/ftp.de.po   9 Apr 2019 13:00:46 -0000       1.368
+++ prep/po/ftp.de.po   11 Apr 2019 07:00:32 -0000      1.369
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: ftp.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-09 12:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-08-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1459,6 +1459,22 @@
 
 #. type: Content of: <ul><li><ul><li>
 msgid ""
+"<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/";
+"\">https://www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+"<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/";
+"\">https://www.singleboersen.com/mirror/gnu/</a>"
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/\";>http://";
+"www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+"<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/\";>http://";
+"www.singleboersen.com/mirror/gnu/</a>"
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
 "<a rel=\"nofollow\" href=\"https://mirror.bibleonline.ru/gnu/\";>https://";
 "mirror.bibleonline.ru/gnu/</a>"
 msgstr ""
@@ -2430,20 +2446,6 @@
 msgid "Updated:"
 msgstr "Letzte Änderung:"
 
-#~ msgid ""
-#~ "<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/";
-#~ "\">https://www.singleboersen.com/mirror/gnu/</a>"
-#~ msgstr ""
-#~ "<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/";
-#~ "\">https://www.singleboersen.com/mirror/gnu/</a>"
-
-#~ msgid ""
-#~ "<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/";
-#~ "\">http://www.singleboersen.com/mirror/gnu/</a>"
-#~ msgstr ""
-#~ "<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/";
-#~ "\">http://www.singleboersen.com/mirror/gnu/</a>"
-
 #, fuzzy
 #~| msgid "Finland"
 #~ msgid "Thailand"

Index: prep/po/ftp.pot
===================================================================
RCS file: /web/www/www/prep/po/ftp.pot,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- prep/po/ftp.pot     9 Apr 2019 13:00:46 -0000       1.306
+++ prep/po/ftp.pot     11 Apr 2019 07:00:32 -0000      1.307
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: ftp.html\n"
-"POT-Creation-Date: 2019-04-09 12:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -1077,6 +1077,18 @@
 #. type: Content of: <ul><li><ul><li>
 msgid ""
 "<a rel=\"nofollow\" "
+"href=\"https://www.singleboersen.com/mirror/gnu/\";>https://www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"<a rel=\"nofollow\" "
+"href=\"http://www.singleboersen.com/mirror/gnu/\";>http://www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"<a rel=\"nofollow\" "
 
"href=\"https://mirror.bibleonline.ru/gnu/\";>https://mirror.bibleonline.ru/gnu/</a>"
 msgstr ""
 

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/de.po        11 Apr 2019 02:59:07 -0000      1.62
+++ proprietary/po/de.po        11 Apr 2019 07:00:32 -0000      1.63
@@ -2161,6 +2161,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/es.po        11 Apr 2019 02:59:07 -0000      1.83
+++ proprietary/po/es.po        11 Apr 2019 07:00:32 -0000      1.84
@@ -1751,6 +1751,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/fr.po        11 Apr 2019 02:59:07 -0000      1.110
+++ proprietary/po/fr.po        11 Apr 2019 07:00:32 -0000      1.111
@@ -1730,6 +1730,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/it.po        11 Apr 2019 02:59:07 -0000      1.62
+++ proprietary/po/it.po        11 Apr 2019 07:00:32 -0000      1.63
@@ -2105,6 +2105,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/ja.po        11 Apr 2019 02:59:07 -0000      1.62
+++ proprietary/po/ja.po        11 Apr 2019 07:00:32 -0000      1.63
@@ -1782,6 +1782,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/malware-appliances.de-diff.html      23 Mar 2019 10:31:41 
-0000      1.41
+++ proprietary/po/malware-appliances.de-diff.html      11 Apr 2019 07:00:32 
-0000      1.42
@@ -71,28 +71,42 @@
 
   &lt;li&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>surveillance device. 
&lt;a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
+      is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+       Canary camera is</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article describes wrongdoing</strong></del></span> <span 
class="inserted"><ins><em>earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done</em></ins></span> by the 
<span class="removed"><del><strong>manufacturer, based on the fact
+      that the device is tethered</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span>
+    <span class="inserted"><ins><em>correct them. This means you can't rely 
on</em></ins></span> proprietary <span 
class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell</em></ins></span> camera is <span 
class="removed"><del><strong>an example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing by the manufacturer, based on 
the fact</strong></del></span> <span class="inserted"><ins><em>designed 
so</em></ins></span> that the <span class="removed"><del><strong>device is 
tethered to a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all 
the time. Now</em></ins></span> it <span class="removed"><del><strong>also 
demonstrates</strong></del></span> <span class="inserted"><ins><em>turns 
out</em></ins></span>
-    that <span class="removed"><del><strong>the device gives the company
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed 
so</em></ins></span> that the <span class="removed"><del><strong>device 
gives</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the <span class="removed"><del><strong>company
       surveillance capability.&lt;/p&gt;
 &lt;/li&gt;
   
 &lt;li&gt;
   &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    hospitals</strong></del></span> <span class="inserted"><ins><em>time. Now 
it turns out
+    that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>connected</strong></del></span> <span 
class="inserted"><ins><em>presumably
@@ -111,272 +125,247 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;</em></ins></span>
     &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet of Stings devices
-    allows</strong></del></span> <span 
class="inserted"><ins><em>HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
+    allows</strong></del></span> <span 
class="inserted"><ins><em>HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    to snoop on the people</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>snoop</strong></del></span> <span 
class="inserted"><ins><em>make sure the user is still
-    paying for the subscription, and hasn't printed more pages than were
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all</strong></del></span> <span 
class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>stings.&lt;/p&gt;
+  &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>unfortunate that</strong></del></span> <span 
class="inserted"><ins><em>still
+    paying for</em></ins></span> the <span 
class="removed"><del><strong>article uses</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though the ink subscription program may be cheaper in some
-    specific cases, it spies</em></ins></span> on <span 
class="inserted"><ins><em>users, and involves totally unacceptable
-    restrictions in</em></ins></span> the <span 
class="removed"><del><strong>people that</strong></del></span> use <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't</strong></del></span> <span class="inserted"><ins><em>of ink 
cartridges that would otherwise</em></ins></span> be <span 
class="removed"><del><strong>a sucker&mdash;reject all</strong></del></span> 
<span class="inserted"><ins><em>in
-    working order.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices &lt;a
-    
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send</em></ins></span> the <span 
class="removed"><del><strong>stings.&lt;/p&gt;
-  &lt;p&gt;It is unfortunate</strong></del></span> <span 
class="inserted"><ins><em>video they capture to Amazon servers&lt;/a&gt;, which 
save it
-    long-term.&lt;/p&gt;
-
-    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span class="inserted"><ins><em>user's 
front door.&lt;/p&gt;
-
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>uses</strong></del></span> <span 
class="inserted"><ins><em>focuses on how Ring used to let individual employees 
look
-    at</em></ins></span> the
+    &lt;p&gt;Even though</em></ins></span> the
   <span class="removed"><del><strong>term &lt;a 
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
   &lt;p&gt;Many models of Internet-connected cameras are tremendously insecure.
-  They have login accounts with hard-coded passwords, which can't be
-  changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way</strong></del></span> <span class="inserted"><ins><em>videos freely. 
 It appears Amazon has tried</em></ins></span> to
-  <span class="removed"><del><strong>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;
+  They have login accounts with hard-coded passwords, which 
can't</strong></del></span> <span class="inserted"><ins><em>ink subscription 
program may</em></ins></span> be
+  <span class="removed"><del><strong>changed, and &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
 is no way to
+  delete these accounts either&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The proprietary code</strong></del></span> <span 
class="inserted"><ins><em>prevent</em></ins></span> that <span 
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+&lt;p&gt;The proprietary code that runs pacemakers, insulin 
pumps,</strong></del></span> <span class="inserted"><ins><em>cheaper in some
+    specific cases, it spies on users,</em></ins></span> and <span 
class="removed"><del><strong>other
 medical devices is &lt;a 
href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full of gross security faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>secondary abuse, but the primary 
abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender 
to.&lt;/p&gt;</em></ins></span>
+full</strong></del></span> <span class="inserted"><ins><em>involves totally 
unacceptable
+    restrictions in the use</em></ins></span> of <span 
class="removed"><del><strong>gross security 
faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Users are suing Bose 
for</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201901070"&gt;
-    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
 distributing a spyware app for its headphones&lt;/a&gt;.
-Specifically,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>TV sees,&rdquo;&lt;/a&gt; in</em></ins></span> the 
<span class="removed"><del><strong>names</strong></del></span> <span 
class="inserted"><ins><em>own words</em></ins></span> of the <span 
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
-&lt;/p&gt;
-
-&lt;p&gt;The suit accuses that</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
+Specifically, the app would record the names of</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send</em></ins></span> the <span class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>video they 
capture</em></ins></span> to <span class="removed"><del><strong>along 
with</strong></del></span> <span class="inserted"><ins><em>Amazon 
servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed to make</em></ins></span> this <span 
class="removed"><del><strong>was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>spying acceptable, 
according to him,
-    is that it is opt-in in newer models. But since</em></ins></span> the 
<span class="removed"><del><strong>fine print of</strong></del></span> <span 
class="inserted"><ins><em>Vizio software is
-    nonfree, we don't know what is actually happening behind</em></ins></span> 
the <span class="removed"><del><strong>app said</strong></del></span> <span 
class="inserted"><ins><em>scenes,
-    and there is no guarantee</em></ins></span> that <span 
class="removed"><del><strong>users gave consent</strong></del></span> <span 
class="inserted"><ins><em>all future updates will leave the
-    settings unchanged.&lt;/p&gt;
-
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart 
TV,</em></ins></span> for <span class="removed"><del><strong>this,
-would</strong></del></span> that
-    <span class="inserted"><ins><em>matter), the easiest way 
to</em></ins></span> make <span 
class="inserted"><ins><em>sure</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
-&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on 
you is</em></ins></span>
-    to <span class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+    &lt;p&gt;In many cases,</em></ins></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
 &lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li id="anova"&gt;
-  &lt;p&gt;Anova sabotaged users' cooking devices with</strong></del></span> 
<span class="inserted"><ins><em>get your own router (which can
-    be an old computer running completely free software), and set 
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
-  tethered them</strong></del></span>
-    <span class="inserted"><ins><em>firewall</em></ins></span> to <span 
class="inserted"><ins><em>block connections to Vizio's servers. Or, 
as</em></ins></span> a <span class="removed"><del><strong>remote 
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
-    you can replace your TV with another model.&lt;/p&gt;
+&lt;p&gt;The suit accuses</strong></del></span> <span 
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span 
class="removed"><del><strong>this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
+would that make it acceptable? No way!</strong></del></span> <span 
class="inserted"><ins><em>videos freely.</em></ins></span>  It <span 
class="removed"><del><strong>should be flat out
+&lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
+illegal</strong></del></span> <span class="inserted"><ins><em>appears Amazon 
has tried</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>prevent that
+    secondary abuse, but</em></ins></span> the <span 
class="removed"><del><strong>app</strong></del></span> <span 
class="inserted"><ins><em>primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society</em></ins></span> to <span 
class="removed"><del><strong>snoop at all&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>surrender 
to.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer</em></ins></span> an <span 
class="removed"><del><strong>account on Anova's servers, their
+  &lt;li <span class="removed"><del><strong>id="anova"&gt;
+  &lt;p&gt;Anova sabotaged users' cooking devices with a downgrade that
+  tethered them to a remote server.</strong></del></span> <span 
class="inserted"><ins><em>id="M201901070"&gt;
+    &lt;p&gt;Vizio TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062"&gt;Unless
 users create an account on Anova's servers, their
   cookers won't function.&lt;/a&gt;&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;When Miele's Internet</strong></del></span> <span 
class="inserted"><ins><em>unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
-    name!&lt;/p&gt;
-
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>Internet,
-its</strong></del></span> <span class="inserted"><ins><em>videos. That's 
not</em></ins></span>
-    security <span class="removed"><del><strong>is crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>for your home. Security means making sure they don't 
get</em></ins></span> to
-    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at 
blocking</em></ins></span> the <span class="removed"><del><strong>dishwasher's 
filesystem,
- infect it with malware,</strong></del></span>
-    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP</em></ins></span> and <span 
class="removed"><del><strong>force</strong></del></span> <span 
class="inserted"><ins><em>Epson have done this&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;p&gt;When Miele's Internet</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of <span class="removed"><del><strong>Stings hospital 
disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> the <span class="removed"><del><strong>Internet,
+its security</strong></del></span> <span class="inserted"><ins><em>company's
+    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>sold</em></ins></span> to <span 
class="removed"><del><strong>the dishwasher's filesystem,
+ infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>force the 
dishwasher</strong></del></span> <span class="inserted"><ins><em>slightly
+    lower retail prices.&lt;/p&gt;
 
-  &lt;li id="M201809260"&gt;
-    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
-    only through</em></ins></span> the <span 
class="removed"><del><strong>dishwasher to launch attacks on
- other devices in</strong></del></span> <span 
class="inserted"><ins><em>company's server. They have
-    all</em></ins></span> the <span class="removed"><del><strong>network. 
Since these dishwashers are used in hospitals,</strong></del></span> <span 
class="inserted"><ins><em>nasty characteristics of</em></ins></span> such <span 
class="removed"><del><strong>attacks could potentially put 
hundreds</strong></del></span> <span class="inserted"><ins><em>devices: &lt;a
-    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
-    surveillance, and danger</em></ins></span> of <span 
class="removed"><del><strong>lives</strong></del></span> <span 
class="inserted"><ins><em>sabotage&lt;/a&gt; (of a specific user, or of
-    all users</em></ins></span> at <span 
class="removed"><del><strong>risk.&lt;/p&gt;
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
+ other devices</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according to him,
+    is that it is opt-in</em></ins></span> in <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
+ such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
 
 &lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>once), as 
well as the risk of an outage (which is what
-    just happened).&lt;/p&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>Vizio 
software is
+    nonfree, we don't know what is actually happening behind the scenes,
+    and there is no guarantee that all future updates will leave the
+    settings unchanged.&lt;/p&gt;</em></ins></span>
 
-    &lt;p&gt;In addition, setting the desired temperature requires running
-    nonfree software. With an old-fashioned thermostat,</em></ins></span> you 
<span class="removed"><del><strong>buy a used &ldquo;smart&rdquo; car, house, 
TV, refrigerator,
+    &lt;p&gt;If you <span 
class="removed"><del><strong>buy</strong></del></span> <span 
class="inserted"><ins><em>already own</em></ins></span> a <span 
class="removed"><del><strong>used &ldquo;smart&rdquo; car, 
house,</strong></del></span> <span class="inserted"><ins><em>Vizio smart TV (or 
any smart</em></ins></span> TV, <span class="removed"><del><strong>refrigerator,
 etc.,
 usually &lt;a 
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
-previous owners</strong></del></span> can <span 
class="removed"><del><strong>still remotely control 
it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>do it
-    using controls right on the thermostat.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
+previous owners can still remotely control it&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
   &lt;p&gt;Vizio
-    &ldquo;smart&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-      report everything</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so</em></ins></span> that 
<span class="removed"><del><strong>is viewed on</strong></del></span> <span 
class="inserted"><ins><em>people cannot hear</em></ins></span>
-    them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and 
<span class="removed"><del><strong>not just broadcasts
-      and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>Siri can.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201807050"&gt;
-    &lt;p&gt;The Jawbone fitness tracker was tethered to a proprietary phone
-    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>image is coming from</strong></del></span> <span 
class="inserted"><ins><em>company shut down and made</em></ins></span> the 
<span class="removed"><del><strong>user's own
-    computer,</strong></del></span> <span class="inserted"><ins><em>app stop 
working. &lt;a
-    
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All</em></ins></span>
-    the <span class="removed"><del><strong>TV reports what it is. The 
existence of</strong></del></span> <span class="inserted"><ins><em>existing 
trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on</em></ins></span> a <span 
class="removed"><del><strong>way to
-    disable</strong></del></span> <span class="inserted"><ins><em>further 
nasty fillip, that sales of</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it were not hidden 
as</strong></del></span>
-    <span class="inserted"><ins><em>broken devices continued. But I think that 
is a secondary issue;</em></ins></span>
-    it <span class="inserted"><ins><em>made the nasty consequences extend to 
some additional people.
-    The fundamental wrong</em></ins></span> was <span 
class="removed"><del><strong>in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>to design</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>devices to depend on something
-    else that didn't respect users' freedom.&lt;/p&gt;</em></ins></span>
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+      report everything</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> that <span 
class="removed"><del><strong>is viewed</strong></del></span>
+    <span class="inserted"><ins><em>matter), the easiest way to make sure it 
isn't spying</em></ins></span> on <span 
class="removed"><del><strong>them,</strong></del></span> <span 
class="inserted"><ins><em>you is
+    to disconnect it from the Internet,</em></ins></span> and <span 
class="inserted"><ins><em>use a terrestrial antenna
+    instead. Unfortunately, this is</em></ins></span> not <span 
class="removed"><del><strong>just broadcasts
+      and cable&lt;/a&gt;. Even</strong></del></span> <span 
class="inserted"><ins><em>always possible. Another option,</em></ins></span>
+    if <span class="removed"><del><strong>the image</strong></del></span> 
<span class="inserted"><ins><em>you are technically oriented,</em></ins></span> 
is <span class="removed"><del><strong>coming from the 
user's</strong></del></span> <span class="inserted"><ins><em>to get 
your</em></ins></span> own
+    <span class="removed"><del><strong>computer, the TV reports what it is. 
The existence of</strong></del></span> <span class="inserted"><ins><em>router 
(which can
+    be an old computer running completely free software), and set 
up</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span>
+    <span class="inserted"><ins><em>firewall</em></ins></span> to
+    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden</strong></del></span> <span class="inserted"><ins><em>block 
connections to Vizio's servers. Or,</em></ins></span> as <span 
class="removed"><del><strong>it was in
+    these TVs, does not legitimize the 
surveillance.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</strong></del></span>
+&lt;p&gt;More or less</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>their users&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly</em></ins></span> all <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TVs</strong></del></span> 
<span class="inserted"><ins><em>&ldquo;home security 
cameras&rdquo;</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;The report was as of 2014, but we don't expect this has got
+&lt;p&gt;The report was as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got
 better.&lt;/p&gt;
 
-&lt;p&gt;This shows that laws requiring products to get users' formal
+&lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested</em></ins></span> 
that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>these
+    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
 consent before collecting personal data are totally inadequate.  And
-what happens if a</strong></del></span> <span 
class="inserted"><ins><em>its</em></ins></span> user <span 
class="removed"><del><strong>declines consent?  Probably the TV will say,
-&ldquo;Without your consent to tracking, the TV will not
+what happens if a user declines consent?  Probably</strong></del></span> <span 
class="inserted"><ins><em>look at what's in</em></ins></span> the <span 
class="removed"><del><strong>TV will say,
+&ldquo;Without</strong></del></span> <span class="inserted"><ins><em>videos. 
That's not
+    security for</em></ins></span> your <span 
class="removed"><del><strong>consent</strong></del></span> <span 
class="inserted"><ins><em>home. Security means making sure they don't 
get</em></ins></span> to <span class="removed"><del><strong>tracking, the TV 
will not
 work.&rdquo;&lt;/p&gt;
 
-&lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</strong></del></span> <span class="inserted"><ins><em>by
-    sending usage data back over</em></ins></span> the
-<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Proper laws would say that TVs</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;</em></ins></span>
-    &lt;p&gt;Some <span class="removed"><del><strong>LG
-TVs &lt;a href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
-tyrants&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201810150"&gt;
+    &lt;p&gt;Printer manufacturers</em></ins></span> are <span 
class="removed"><del><strong>not allowed to report what</strong></del></span> 
<span class="inserted"><ins><em>very innovative&mdash;at 
blocking</em></ins></span> the
+<span class="removed"><del><strong>user watches &mdash; no 
exceptions!&lt;/p&gt;
 &lt;/li&gt;
+&lt;li&gt;
+&lt;p&gt;Some LG
+TVs</strong></del></span>
+    <span class="inserted"><ins><em>use of independent replacement ink 
cartridges. Their &ldquo;security
+    upgrades&rdquo; occasionally impose new forms of cartridge 
DRM.</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements"&gt;are
+tyrants&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
+    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;&lt;a
+<span class="removed"><del><strong>&lt;li&gt;&lt;a
 
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F"&gt;
-Samsung</strong></del></span> &ldquo;Smart&rdquo; TVs <span 
class="removed"><del><strong>have turned Linux into the base
-for</strong></del></span> <span class="inserted"><ins><em>automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install</em></ins></span> a <span 
class="removed"><del><strong>tyrant system&lt;/a&gt; so as to impose DRM.
-What enables Samsung</strong></del></span> <span 
class="inserted"><ins><em>surveillance app&lt;/a&gt;.&lt;/p&gt;
+Samsung &ldquo;Smart&rdquo; TVs</strong></del></span>
 
-    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>do this</strong></del></span> <span 
class="inserted"><ins><em>the article for the facts it presents. 
It</em></ins></span>
-    is <span class="inserted"><ins><em>too bad</em></ins></span> that <span 
class="removed"><del><strong>Linux is released under
-GNU GPL version 2, &lt;a href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
-together with a weak interpretation</strong></del></span> <span 
class="inserted"><ins><em>the article finishes by advocating the
-    moral weakness</em></ins></span> of <span class="removed"><del><strong>GPL 
version 2.</strong></del></span> <span class="inserted"><ins><em>surrendering 
to Netflix. The Netflix app &lt;a
-    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;A company that makes internet-controlled 
vibrators</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201809260"&gt;
+    &lt;p&gt;Honeywell's &ldquo;smart&rdquo; thermostats communicate
+    only through the company's server. They</em></ins></span> have <span 
class="removed"><del><strong>turned Linux into</strong></del></span>
+    <span class="inserted"><ins><em>all</em></ins></span> the <span 
class="removed"><del><strong>base
+for a tyrant system&lt;/a&gt; so as to impose DRM.
+What enables Samsung to do this is that Linux is released under
+GNU GPL version 2,</strong></del></span> <span class="inserted"><ins><em>nasty 
characteristics of such devices:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html"&gt;not version 
3&lt;/a&gt;,
+together with</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9"&gt;
+    surveillance, and danger of sabotage&lt;/a&gt; (of</em></ins></span> a 
<span class="removed"><del><strong>weak interpretation</strong></del></span> 
<span class="inserted"><ins><em>specific user, or</em></ins></span> of <span 
class="removed"><del><strong>GPL version 2.
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock users in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by</em></ins></span> being <span 
class="removed"><del><strong>sued for collecting lots of personal information 
about how
+&lt;li&gt;
+&lt;p&gt;A company that makes internet-controlled vibrators
+&lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;is
+being sued for collecting lots</strong></del></span>
+    <span class="inserted"><ins><em>all users at once), as well as the 
risk</em></ins></span> of <span class="removed"><del><strong>personal 
information about how
 people use it&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;The company's statement that it anonymizes the data may be true,
-but it doesn't really matter. If it sells the data</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="removed"><del><strong>a data broker,</strong></del></span> <span 
class="inserted"><ins><em>be incompatible
-    with all other options, ethical or unethical.&lt;/p&gt;
+&lt;p&gt;The company's statement that it anonymizes</strong></del></span> 
<span class="inserted"><ins><em>an outage (which is what
+    just happened).&lt;/p&gt;
+
+    &lt;p&gt;In addition, setting</em></ins></span> the <span 
class="removed"><del><strong>data may be true,
+but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can 
do</em></ins></span> it <span 
class="removed"><del><strong>sells</strong></del></span>
+    <span class="inserted"><ins><em>using controls right on</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>thermostat.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201712240"&gt;
-    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>dangers 
of</em></ins></span> the <span class="removed"><del><strong>user is.&lt;/p&gt;
+  &lt;li id="M201809240"&gt;
+    &lt;p&gt;Researchers have discovered how to &lt;a
+    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201807050"&gt;
+    &lt;p&gt;The Jawbone fitness tracker was tethered</em></ins></span> to a 
<span class="removed"><del><strong>data broker,</strong></del></span> <span 
class="inserted"><ins><em>proprietary phone
+    app.  In 2017,</em></ins></span> the <span 
class="removed"><del><strong>data broker can figure out 
who</strong></del></span> <span class="inserted"><ins><em>company shut down and 
made</em></ins></span> the <span class="removed"><del><strong>user is.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Google/Alphabet</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;internet of stings&rdquo;
-    is that, if you lose your internet service, you also</em></ins></span> 
&lt;a
+&lt;p&gt;Google/Alphabet</strong></del></span> <span 
class="inserted"><ins><em>app stop working.</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be"&gt;
-intentionally broke Revolv home automatic</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose</em></ins></span> control <span class="removed"><del><strong>products 
that depended on
-a server&lt;/a&gt; to function.  The lesson is,</strong></del></span> <span 
class="inserted"><ins><em>of your house and appliances&lt;/a&gt;.&lt;/p&gt;
+intentionally broke Revolv home automatic control products that 
depended</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which"&gt;All
+    the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses</em></ins></span> on a <span 
class="removed"><del><strong>server&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>further nasty fillip, that sales of the
+    broken devices continued. But I think that is a secondary issue;
+    it made the nasty consequences extend</em></ins></span> to <span 
class="removed"><del><strong>function.</strong></del></span> <span 
class="inserted"><ins><em>some additional people.</em></ins></span>
+    The <span class="removed"><del><strong>lesson is, don't stand for that! 
Insist</strong></del></span> <span class="inserted"><ins><em>fundamental wrong 
was to design the devices to depend</em></ins></span> on <span 
class="removed"><del><strong>self-contained computers</strong></del></span> 
<span class="inserted"><ins><em>something
+    else</em></ins></span> that <span class="removed"><del><strong>run free 
software!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>didn't respect users' 
freedom.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-    &lt;p&gt;For your safety,</em></ins></span> don't <span 
class="removed"><del><strong>stand for that! Insist
-on self-contained computers that run free software!&lt;/p&gt;
-&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;ARRIS cable modem has a</strong></del></span>
 
-&lt;li&gt;
-&lt;p&gt;ARRIS cable modem has</strong></del></span> <span 
class="inserted"><ins><em>use any appliance with</em></ins></span> a <span 
class="removed"><del><strong>&lt;a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
-backdoor in</strong></del></span> <span class="inserted"><ins><em>connection 
to</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>real internet.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1"&gt;
+backdoor in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers a gratis electronic toothbrush that snoops on its user by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give HP
+&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
+    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors</strong></del></span> 
<span class="inserted"><ins><em>article for the facts it presents. It
+    is too bad</em></ins></span> that <span class="removed"><del><strong>give 
HP
 &lt;a
 
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
 remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers</em></ins></span> to <span 
class="removed"><del><strong>the customer's data, but if the back door allows
-installation of software changes, a change could</strong></del></span> be 
<span class="removed"><del><strong>installed that
-would give access</strong></del></span> <span 
class="inserted"><ins><em>suckers and &lt;a
-    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff</em></ins></span> to <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. Wouldn't you know
-    it,</em></ins></span> the <span class="removed"><del><strong>customer's 
data.
+access to</strong></del></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the <span class="removed"><del><strong>back door 
allows
+installation</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>software changes, a change could be installed that
+would give access</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>the customer's data.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -392,73 +381,59 @@
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;
-The TP-Link router</strong></del></span> <span 
class="inserted"><ins><em>system</em></ins></span> has a <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;&lt;a 
href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;</strong></del></span> 
<span class="inserted"><ins><em>Netflix.</em></ins></span> The <span 
class="removed"><del><strong>TP-Link router has a 
backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The &lt;a 
href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
-&ldquo;Cube&rdquo; 3D printer</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy</em></ins></span> was <span 
class="removed"><del><strong>designed with DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It is the Keurig</strong></del></span> <span 
class="inserted"><ins><em>found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it is
-being discontinued, which means that eventually authorized materials won't
-be available and</strong></del></span> the <span 
class="removed"><del><strong>printers may become unusable.&lt;/p&gt;
-
-&lt;p&gt;With a</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201711080"&gt;
-    &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
-    turning off</em></ins></span> the <span 
class="removed"><del><strong>Respects Your 
Freedom&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>server 
through which the products' supposed owners
-    communicate with them&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The owners suspect</em></ins></span> this <span 
class="removed"><del><strong>problem would not
-even be</strong></del></span> <span class="inserted"><ins><em>is to pressure 
them to buy</em></ins></span> a <span class="removed"><del><strong>remote 
possibility.&lt;/p&gt;
+&lt;p&gt;The</strong></del></span>
 
-&lt;p&gt;How pitiful that the author of</strong></del></span> <span 
class="inserted"><ins><em>newer model. If
-    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that
-    <span class="inserted"><ins><em>requires users to talk with them through 
some specialized service.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
+    &lt;p&gt;Apple devices lock users in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube"&gt;
+&ldquo;Cube&rdquo; 3D printer was</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to Apple services&lt;/a&gt; by being</em></ins></span> designed 
<span class="inserted"><ins><em>to be incompatible</em></ins></span>
+    with <span class="removed"><del><strong>DRM&lt;/a&gt;: it won't accept
+third-party printing materials.  It is the Keurig</strong></del></span> <span 
class="inserted"><ins><em>all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201710040"&gt;
-    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is a surveillance device. &lt;a
-    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>says</strong></del></span> <span 
class="inserted"><ins><em>describes wrongdoing by the manufacturer, based on
-    the fact</em></ins></span> that <span class="removed"><del><strong>there 
was
-&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the device 
<span class="inserted"><ins><em>is tethered</em></ins></span> to <span 
class="removed"><del><strong>restrict users in
-the first place.  This is like putting</strong></del></span> a <span 
class="removed"><del><strong>&ldquo;cheat me and mistreat me&rdquo;
-sign on your chest.  We should know better: we should condemn all companies
-that take advantage of people like him.  Indeed,</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
-    proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201712240"&gt;
+    &lt;p&gt;One</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and the printers may become unusable.&lt;/p&gt;
 
-    &lt;p&gt;But</em></ins></span> it <span class="removed"><del><strong>is 
the acceptance of
-their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>also demonstrates</em></ins></span> that <span 
class="removed"><del><strong>teaches people to be 
doormats.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
device gives the company
-    surveillance capability.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would not
+even be a remote possibility.&lt;/p&gt;
+
+&lt;p&gt;How pitiful that</strong></del></span> the <span 
class="removed"><del><strong>author</strong></del></span> <span 
class="inserted"><ins><em>dangers</em></ins></span> of <span 
class="removed"><del><strong>that article says that there was
+&ldquo;nothing wrong&rdquo; with designing the device to restrict users 
in</strong></del></span> the <span class="removed"><del><strong>first place.  
This</strong></del></span> <span class="inserted"><ins><em>&ldquo;internet of 
stings&rdquo;</em></ins></span>
+    is <span class="removed"><del><strong>like putting a &ldquo;cheat me and 
mistreat me&rdquo;
+sign on</strong></del></span> <span class="inserted"><ins><em>that, if you 
lose</em></ins></span> your <span class="removed"><del><strong>chest.  We 
should know better: we should condemn all companies
+that take advantage</strong></del></span> <span 
class="inserted"><ins><em>internet service, you also &lt;a
+    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control</em></ins></span> of <span 
class="removed"><del><strong>people like him.  Indeed, it 
is</strong></del></span> <span class="inserted"><ins><em>your house and 
appliances&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;For your safety, don't use any appliance with a connection 
to</em></ins></span> the <span class="removed"><del><strong>acceptance of
+their unjust practice that teaches people</strong></del></span>
+    <span class="inserted"><ins><em>real internet.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Philips</strong></del></span>
+  &lt;li id="M201711200"&gt;
+    &lt;p&gt;Amazon recently invited consumers</em></ins></span> to be <span 
class="removed"><del><strong>doormats.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;
-    &lt;p&gt;A</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>lightbulbs &lt;a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have been</strong></del></span> <span class="inserted"><ins><em>intravenous 
pump</em></ins></span>
-    designed <span class="removed"><del><strong>not to interact with other 
companies' smart
+&lt;li&gt;
+&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span> <span 
class="inserted"><ins><em>suckers and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been designed not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff</em></ins></span> to <span 
class="removed"><del><strong>interact with other companies' smart
 lightbulbs&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;If a product is &ldquo;smart&rdquo;, and you didn't build it, it is
+&lt;p&gt;If a product is &ldquo;smart&rdquo;, and</strong></del></span> <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. 
Wouldn't</em></ins></span> you <span class="removed"><del><strong>didn't 
build</strong></del></span> <span 
class="inserted"><ins><em>know</em></ins></span>
+    it, <span class="removed"><del><strong>it is
 cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
@@ -473,101 +448,233 @@
 digital &ldquo;rights&rdquo; management&lt;/a&gt;
 and &lt;a 
href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
 and it claims that &ldquo;artists&rdquo; (rather than companies) are
-primarily responsible</strong></del></span> for <span 
class="removed"><del><strong>putting digital restrictions management into
-these disks.  Nonetheless, it</strong></del></span> <span 
class="inserted"><ins><em>hospitals</em></ins></span> is <span 
class="removed"><del><strong>a reference for</strong></del></span> <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>facts.
+primarily responsible for putting digital restrictions management into
+these disks.  Nonetheless, it is a reference for</strong></del></span> the 
<span class="removed"><del><strong>facts.
 &lt;/p&gt;
 
-&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
-don't use Bluray disks!&lt;/p&gt;
+&lt;p&gt;Every Bluray disk (with few, rare exceptions)</strong></del></span> 
<span class="inserted"><ins><em>system</em></ins></span> has <span 
class="removed"><del><strong>DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a grave security flaw.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711080"&gt;
+    &lt;p&gt;Logitech will sabotage
+    all Harmony Link household control devices by</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    turning off the server through which the products' supposed owners
+    communicate with them&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
+    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that <span class="removed"><del><strong>allow 
anyone</strong></del></span>
+    <span class="inserted"><ins><em>requires users</em></ins></span> to <span 
class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>talk with them</em></ins></span> through <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>some specialized 
service.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
+    &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
+    manufacturer can communicate with it, is</em></ins></span> a <span 
class="removed"><del><strong>big security hole;</strong></del></span> <span 
class="inserted"><ins><em>surveillance device.</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims that this</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+    Canary camera</em></ins></span> is an <span 
class="removed"><del><strong>&ldquo;open&rdquo; platform 
so</strong></del></span> <span 
class="inserted"><ins><em>example&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the
+<span class="removed"><del><strong>problem is partly</strong></del></span> 
<span class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+    the <span class="removed"><del><strong>fault of app developers. That is 
clearly true if</strong></del></span> <span class="inserted"><ins><em>fact 
that</em></ins></span> the <span class="removed"><del><strong>apps are 
proprietary software.&lt;/p&gt;
+
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>device</em></ins></span> is <span 
class="removed"><del><strong>most likely going</strong></del></span> <span 
class="inserted"><ins><em>tethered</em></ins></span> to
+<span class="removed"><del><strong>screw you.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>a server.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
+    proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;But it also demonstrates that the device gives the company
+    surveillance capability.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Malware found on &lt;a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
+security cameras available through Amazon&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;</em></ins></span>
+    &lt;p&gt;A <span class="removed"><del><strong>camera that records locally 
on physical media, and has no network
+connection, does not threaten people with surveillance&mdash;neither
+by watching people through the camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>&ldquo;smart&rdquo; 
intravenous pump
+    designed for hospitals is connected to</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands of network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>internet. 
Naturally</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>internet. 
Naturally</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit fitness trackers have a Bluetooth 
vulnerability&lt;/a&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
-    its</em></ins></span> security <span 
class="removed"><del><strong>bugs</strong></del></span> <span 
class="inserted"><ins><em>has been cracked&lt;/a&gt;.&lt;/p&gt;
+    its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>allow anyone</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
+    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>allows
+attackers to send malware to</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>devices, which can subsequently
+spread</strong></del></span> <span class="inserted"><ins><em>term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span class="removed"><del><strong>watch 
through them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
+    referring</em></ins></span> to <span 
class="removed"><del><strong>computers and other FitBit trackers that interact 
with
+them.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big</strong></del></span>
+&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
+proprietary firmware so you can't trust it.  Western 
Digital's</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad</em></ins></span> security <span 
class="removed"><del><strong>hole;</strong></del></span> <span 
class="inserted"><ins><em>in many Internet of Stings devices 
allows</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the</em></ins></span> people <span 
class="removed"><del><strong>can remotely control it&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+&ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-&lt;p&gt;Samsung claims</strong></del></span> that <span 
class="removed"><del><strong>this is an &ldquo;open&rdquo; platform 
so</strong></del></span> <span class="inserted"><ins><em>use 
them&lt;/a&gt;.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which are used to administer 
drugs</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to
+<span class="removed"><del><strong>a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
+researcher.&lt;/p&gt;
+
+&lt;p&gt;Depending</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>what drug</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>partly</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that the article uses the term &lt;a
-    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>being 
infused,</strong></del></span> <span class="inserted"><ins><em>unfortunate 
that</em></ins></span> the <span class="removed"><del><strong>insecurity could
+open</strong></del></span> <span class="inserted"><ins><em>article 
uses</em></ins></span> the <span class="removed"><del><strong>door to 
murder.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Due to bad security in a drug pump, crackers could use it 
to</strong></del></span> <span class="inserted"><ins><em>term</em></ins></span> 
&lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
+kill patients&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708230"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708230"&gt;
     &lt;p&gt;Sonos &lt;a
     
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
-    told all its customers, &ldquo;Agree&rdquo;
-    to snooping or the product will stop working&lt;/a&gt;.  &lt;a
+    told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
+    to <span class="inserted"><ins><em>snooping or the product will stop 
working&lt;/a&gt;.  &lt;a
     
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
     Another article&lt;/a&gt; says they won't forcibly change the software, but
-    people won't be able to get any upgrades and eventually it will
-    stop working.&lt;/p&gt;
+    people won't</em></ins></span> be <span 
class="removed"><del><strong>stupidly vulnerable</strong></del></span> <span 
class="inserted"><ins><em>able</em></ins></span> to
+<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>get any upgrades and eventually it will
+    stop working.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>company for making webcams with bad 
security&lt;/a&gt; so
+that it was easy for anyone</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI</em></ins></span> is <span 
class="removed"><del><strong>possible to</strong></del></span> <span 
class="inserted"><ins><em>in many cases</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill people by taking control</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706200"&gt;
-    &lt;p&gt;Many models of Internet-connected cameras
+    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>medical implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC 
News&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected cameras
     are tremendously insecure.  They have login
-    accounts with hard-coded passwords, which can't be changed, and &lt;a
-    
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way to delete these accounts either&lt;/a&gt;.&lt;/p&gt;
+    accounts with hard-coded passwords, which can't be 
changed,</em></ins></span> and &lt;a
+<span 
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
+    is no way to delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705250"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Lots of &lt;a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
     &lt;p&gt;The proprietary code that runs pacemakers,
-    insulin pumps, and other medical devices is &lt;a
+    insulin pumps,</em></ins></span> and <span class="removed"><del><strong>it 
can be fatal.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other medical devices is &lt;a
     href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
-    security faults&lt;/a&gt;.&lt;/p&gt;
+    security faults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705180"&gt;
-    &lt;p&gt;Bird and rabbit pets were implemented for Second
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows were taken 
over&lt;/a&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705180"&gt;
+    &lt;p&gt;Bird</em></ins></span> and <span 
class="removed"><del><strong>turned
+into a botnet</strong></del></span> <span class="inserted"><ins><em>rabbit 
pets were implemented</em></ins></span> for <span 
class="inserted"><ins><em>Second
     Life by a company that tethered their food to a server.  &lt;a
     
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down the server and the pets more or less died&lt;/a&gt;.&lt;/p&gt;
+    It shut down</em></ins></span> the <span 
class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server and the pets more or less 
died&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for &lt;a
-    
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing a spyware app for its headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files users listen to
+  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
+&lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+used</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
+    distributing</em></ins></span> a <span 
class="removed"><del><strong>firmware &ldquo;upgrade&rdquo; to 
make</strong></del></span> <span class="inserted"><ins><em>spyware app 
for</em></ins></span> its <span class="removed"><del><strong>TVs snoop on 
what</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,
+    the app would record the names of the audio files</em></ins></span> users 
<span class="removed"><del><strong>watch&lt;/a&gt;.  The TVs did not 
do</strong></del></span> <span class="inserted"><ins><em>listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
+    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>when first sold.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;LG &lt;a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
+&ldquo;smart&rdquo; TVs, unless</strong></del></span> <span 
class="inserted"><ins><em>this was done without</em></ins></span> the <span 
class="removed"><del><strong>purchasers agreed</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
-    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
+    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>let LG
+begin</strong></del></span> <span class="inserted"><ins><em>design
+    the app</em></ins></span> to snoop <span class="removed"><del><strong>on 
them and distribute their personal data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201704120"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704120"&gt;
     &lt;p&gt;Anova sabotaged users' cooking devices
-    with a downgrade that tethered them to a remote server. &lt;a
+    with a downgrade that tethered them</em></ins></span> to <span 
class="removed"><del><strong>spy&lt;/a&gt; on children and 
adults.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
remote server. &lt;a
     
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"&gt;Unless
     users create an account on Anova's servers, their cookers won't
     function&lt;/a&gt;.&lt;/p&gt;
@@ -813,10 +920,15 @@
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511060"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
@@ -830,145 +942,69 @@
 
   &lt;li id="M201511020"&gt;
     &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
-    to</em></ins></span> the <span class="removed"><del><strong>fault of app 
developers. That is clearly true if</strong></del></span> <span 
class="inserted"><ins><em>600 millions social media profiles</em></ins></span> 
the <span class="removed"><del><strong>apps</strong></del></span> <span 
class="inserted"><ins><em>company
-    already monitors. Tivo customers</em></ins></span> are <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
-
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo; is most likely going to
-screw you.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Malware found on</strong></del></span> <span class="inserted"><ins><em>unaware 
they're
+    to the 600 millions social media profiles the company
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;A camera that records locally on physical media, and has no network
-connection, does not threaten people</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement</em></ins></span> with <span 
class="removed"><del><strong>surveillance&mdash;neither</strong></del></span> 
<span class="inserted"><ins><em>online purchases&lt;/a&gt;, exposing all
-    users to new combined surveillance</em></ins></span> by <span 
class="removed"><del><strong>watching people through the camera, nor through 
malware in the
-camera.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>default.&lt;/p&gt;</em></ins></span>
+    information with online social media participation, Tivo can now &lt;a
+    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
+    users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &lt;a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit</em></ins></span> fitness trackers have a <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;</em></ins></span>
+  &lt;li id="M201510210"&gt;
+    &lt;p&gt;FitBit fitness trackers have a &lt;a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
     Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with them.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
-    &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
+  &lt;li id="M201510200"&gt;
+    &lt;p&gt;&ldquo;Self-encrypting&rdquo; disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's <span class="removed"><del><strong>&lt;a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</strong></del></span>
 &ldquo;My Passport&rdquo; drives <span class="inserted"><ins><em>&lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</em></ins></span>
+    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
     have a back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
+  &lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people</em></ins></span> are <span class="removed"><del><strong>used 
to administer drugs to
-a patient, were rated &ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>watching&lt;/a&gt;, 
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
-researcher.&lt;/p&gt;
-
-&lt;p&gt;Depending on what drug is being infused, the insecurity could
-open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;</em></ins></span>
+  &lt;li id="M201506080"&gt;
     &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
-intrusion.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;The &lt;a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished a company for making webcams with bad security&lt;/a&gt; so
-that it was easy for anyone to watch them.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;It is possible to &lt;a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill people by taking control of medical implants by radio&lt;/a&gt;.  More
-information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
-&lt;a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Lots of</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>it can be fatal.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
+  &lt;li id="M201505050"&gt;
     &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over&lt;/a&gt; and turned
-into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
+    to administer drugs to a patient, were rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
+    secure</em></ins></span> IP <span 
class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>device I've ever seen&lt;/a&gt;&rdquo; by a security
     researcher.&lt;/p&gt;
 
-    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>insecurity could open
-    the door to murder.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Depending on what drug is being infused, the insecurity could open
+    the door to murder.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;</em></ins></span>
+  &lt;li id="M201504300"&gt;
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+  &lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
@@ -1005,7 +1041,7 @@
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data are totally inadequate.
+    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>spying 
devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
     And what happens if a user declines consent? Probably the TV will
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
@@ -1017,75 +1053,48 @@
   &lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201405200.1"&gt;</em></ins></span>
-    &lt;p&gt;LG &lt;a
-    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
-    to snoop on them and distribute their personal data.&lt;/p&gt;
+    data about the user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
-Barbie is going to spy&lt;/a&gt; on children</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
-    &lt;p&gt;Lots of &lt;a
-    href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>adults.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it can be fatal.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;p&gt;The</strong></del></span>
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201405200.1"&gt;
+    &lt;p&gt;LG</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam
+&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
+&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;</em></ins></span>
-    &lt;p&gt;&lt;a
-<span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;A</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;</em></ins></span>
+    &ldquo;smart&rdquo; <span class="removed"><del><strong>device 
means</strong></del></span> <span class="inserted"><ins><em>TVs, 
unless</em></ins></span> the <span class="removed"><del><strong>manufacturer is 
using it</strong></del></span> <span class="inserted"><ins><em>purchasers 
agreed</em></ins></span> to <span class="removed"><del><strong>outsmart
+you.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The &lt;a
-href="http://www.bbc.com/news/technology-34922712"&gt;Nest Cam
-&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
-&ldquo;owner&rdquo; switches</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554"&gt; 
Some flash
-    memories have modifiable software&lt;/a&gt;, which makes them vulnerable
-    to viruses.&lt;/p&gt;
-
-    &lt;p&gt;We don't call this a &ldquo;back door&rdquo; 
because</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
-
-&lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>normal
-    that you can install a new system in a computer, given physical 
access</em></ins></span>
-    to <span class="removed"><del><strong>outsmart
-you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>it.  
However, memory sticks and cards should not be modifiable in
-    this way.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>let LG begin
+    to snoop</em></ins></span> on <span class="inserted"><ins><em>them and 
distribute</em></ins></span> their <span class="removed"><del><strong>users: 
their</strong></del></span> <span class="inserted"><ins><em>personal 
data.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Vizio goes</strong></del></span>
+  &lt;li id="M201404250"&gt;
+    &lt;p&gt;Lots of</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+&ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
+<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> can <span 
class="removed"><del><strong>track you 
+across devices.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201312040"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-    Point-of-sale terminals running Windows were taken over&lt;/a&gt; and
-    turned into</em></ins></span> a <span class="removed"><del><strong>step 
further than other TV manufacturers</strong></del></span> <span 
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
-    card numbers.&lt;/p&gt;
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>be fatal.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201311210"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>spying on 
-their users: their &lt;a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>LG</em></ins></span> &ldquo;smart&rdquo; TVs 
<span class="removed"><del><strong>analyze your viewing habits in 
detail</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and 
-<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers can track you 
-across devices.&lt;/p&gt;
+  &lt;li id="M201312290"&gt;
+    &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
+    memories have modifiable software&lt;/a&gt;, which makes them 
vulnerable</em></ins></span>
+    to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>viruses.&lt;/p&gt;
 
-&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span 
class="removed"><del><strong>off, but having it enabled by default
-is an injustice already.&lt;/p&gt;
+    &lt;p&gt;We don't call</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;back door&rdquo; because</em></ins></span> 
it <span class="removed"><del><strong>enabled by default</strong></del></span> 
is <span class="removed"><del><strong>an injustice already.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -1093,15 +1102,32 @@
 millions social media profiles the company already monitors.  Tivo
 customers are unaware they're being watched by advertisers.  By
 combining TV viewing information with online social media
-participation, Tivo can now &lt;a
+participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>normal
+    that you</em></ins></span> can <span class="removed"><del><strong>now &lt;a
 href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
 correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-users to new combined surveillance by default.&lt;/p&gt;
+users to</strong></del></span> <span class="inserted"><ins><em>install 
a</em></ins></span> new <span class="removed"><del><strong>combined 
surveillance by default.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Some web and TV advertisements play inaudible sounds to be picked
-up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>off has
+&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>system in a 
computer, given physical access</em></ins></span>
+    to <span class="inserted"><ins><em>it.  However, memory sticks and cards 
should not</em></ins></span> be <span class="removed"><del><strong>picked
+up by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>modifiable in
+    this way.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312040"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+    Point-of-sale terminals</em></ins></span> running <span 
class="inserted"><ins><em>Windows were taken over&lt;/a&gt; and
+    turned into a botnet for the purpose of collecting customers' credit
+    card numbers.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201311210"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch to turn this off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
@@ -1310,7 +1336,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:32 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary/po/malware-appliances.de.po     23 Mar 2019 10:31:41 -0000      
1.75
+++ proprietary/po/malware-appliances.de.po     11 Apr 2019 07:00:32 -0000      
1.76
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -108,6 +108,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/malware-appliances.fr.po     23 Mar 2019 10:52:11 -0000      
1.120
+++ proprietary/po/malware-appliances.fr.po     11 Apr 2019 07:00:33 -0000      
1.121
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2019-03-23 11:51+0100\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/malware-appliances.pot       23 Mar 2019 10:31:41 -0000      
1.60
+++ proprietary/po/malware-appliances.pot       11 Apr 2019 07:00:33 -0000      
1.61
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a "
+"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\";>
 "
+"two vulnerabilities that affect several models of implantable "
+"defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in "
+"2008. Apparently, nothing was done by the company to correct them. This "
+"means you can't rely on proprietary software developers to fix bugs in their "
+"products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a "
 "href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> anyone "

Index: proprietary/po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary/po/malware-appliances.ru.po     23 Mar 2019 17:32:01 -0000      
1.154
+++ proprietary/po/malware-appliances.ru.po     11 Apr 2019 07:00:33 -0000      
1.155
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/nl.po        11 Apr 2019 02:59:08 -0000      1.62
+++ proprietary/po/nl.po        11 Apr 2019 07:00:33 -0000      1.63
@@ -1756,6 +1756,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/pl.po        11 Apr 2019 02:59:08 -0000      1.62
+++ proprietary/po/pl.po        11 Apr 2019 07:00:33 -0000      1.63
@@ -1322,6 +1322,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/pot  11 Apr 2019 02:59:08 -0000      1.62
+++ proprietary/po/pot  11 Apr 2019 07:00:33 -0000      1.63
@@ -1192,6 +1192,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-insecurity.de-diff.html  23 Mar 2019 10:31:41 
-0000      1.25
+++ proprietary/po/proprietary-insecurity.de-diff.html  11 Apr 2019 07:00:33 
-0000      1.26
@@ -69,6 +69,19 @@
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902270"&gt;
     &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
     manufacturer (now Amazon) can watch all the time. Now it turns out
@@ -276,19 +289,14 @@
 
   &lt;li id="M201703270"&gt;
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected to the Internet, its</em></ins></span> security
-       <span class="removed"><del><strong>vulnerability for 10 
years&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The vulnerability allowed</strong></del></span> <span 
class="inserted"><ins><em>is crap&lt;/a&gt;.&lt;/p&gt;
+    Stings hospital disinfectant dishwasher is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/"&gt;major
 security
+       vulnerability for 10 years&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For example,</em></ins></span> a cracker <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>can gain</em></ins></span> access <span 
class="inserted"><ins><em>to</em></ins></span> the <span 
class="removed"><del><strong>computer's Intel Active
+  &lt;p&gt;The vulnerability allowed a cracker to access the computer's Intel 
Active
       Management Technology
       (AMT) &lt;a 
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/"&gt;
-      web interface</strong></del></span> <span 
class="inserted"><ins><em>dishwasher's
-    filesystem, infect it</em></ins></span> with <span 
class="removed"><del><strong>an empty password</strong></del></span> <span 
class="inserted"><ins><em>malware,</em></ins></span> and <span 
class="removed"><del><strong>gave administrative
-      access&lt;/a&gt; to access</strong></del></span> <span 
class="inserted"><ins><em>force</em></ins></span> the <span 
class="removed"><del><strong>computer's keyboard, mouse, monitor
+      web interface with an empty password and gave administrative
+      access&lt;/a&gt; to access the computer's keyboard, mouse, monitor
       among other privileges.&lt;/p&gt;
 
        &lt;p&gt;It does not help that in newer Intel processors, it is 
impossible
@@ -307,11 +315,13 @@
 &lt;li&gt;
 &lt;p&gt;When Miele's Internet of Stings hospital disinfectant dishwasher is 
&lt;a
 
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
+connected to the Internet, its</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to the Internet, its</em></ins></span> security is 
crap&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;For example, a cracker can gain access to the dishwasher's 
filesystem, 
-infect it with malware, and force the dishwasher to launch attacks 
on</strong></del></span> <span class="inserted"><ins><em>dishwasher to launch
-    attacks on</em></ins></span> other devices in the network. Since these 
dishwashers are
+    &lt;p&gt;For example, a cracker can gain access to the dishwasher's
+    filesystem, infect it with malware, and force the dishwasher to launch
+    attacks on other devices in the network. Since these dishwashers are
     used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
@@ -380,10 +390,7 @@
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;The mobile apps for
-communicating</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201610230"&gt;
-    &lt;p&gt;4G LTE phone networks are drastically insecure. They can 
be</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
+communicating &lt;a 
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
 a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;This is in addition to the fact that the car contains a cellular
@@ -406,9 +413,10 @@
 ransomware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;4G LTE phone networks are drastically insecure. They can be
-&lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;</strong></del></span>
+&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201610230"&gt;</em></ins></span>
+    &lt;p&gt;4G LTE phone networks are drastically insecure. They can be &lt;a 
<span 
class="removed"><del><strong>href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;</em></ins></span>
     taken over by third parties and used for man-in-the-middle
     attacks&lt;/a&gt;.&lt;/p&gt;
@@ -561,7 +569,10 @@
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Malware found
-on &lt;a 
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
+on</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
+    &lt;p&gt;FitBit fitness trackers have a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
 cameras available through Amazon&lt;/a&gt;.
 &lt;/p&gt;
 
@@ -589,13 +600,10 @@
 
 &lt;li&gt;
 &lt;p&gt;
-FitBit fitness trackers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit fitness trackers have a</em></ins></span> &lt;a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-<span class="removed"><del><strong>have a</strong></del></span>
-    Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
+FitBit fitness trackers &lt;a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+have a Bluetooth vulnerability&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+    Bluetooth vulnerability&lt;/a&gt;</em></ins></span> that allows attackers 
to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with <span class="removed"><del><strong>them.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
@@ -772,11 +780,13 @@
 &lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+&lt;li&gt;
+&lt;p&gt;An app to prevent &ldquo;identity theft&rdquo; (access to personal 
data)
+by storing users'</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;
     &lt;p&gt;An app to prevent &ldquo;identity theft&rdquo;
-    (access to personal data) by storing users' data on a special server &lt;a
+    (access to personal data) by storing users'</em></ins></span> data on a 
special server &lt;a
     
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/"&gt;was
     deactivated by its developer&lt;/a&gt; which had discovered a security 
<span class="removed"><del><strong>flaw.
 &lt;/p&gt;
@@ -971,7 +981,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary/po/proprietary-insecurity.de.po 23 Mar 2019 10:31:41 -0000      
1.128
+++ proprietary/po/proprietary-insecurity.de.po 11 Apr 2019 07:00:33 -0000      
1.129
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -139,6 +139,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary/po/proprietary-insecurity.fr.po 23 Mar 2019 10:52:11 -0000      
1.162
+++ proprietary/po/proprietary-insecurity.fr.po 11 Apr 2019 07:00:33 -0000      
1.163
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2019-03-23 11:51+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -110,6 +111,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-insecurity.it-diff.html  23 Mar 2019 10:31:41 
-0000      1.40
+++ proprietary/po/proprietary-insecurity.it-diff.html  11 Apr 2019 07:00:33 
-0000      1.41
@@ -58,32 +58,81 @@
 &lt;li id="break-security-smarttv"&gt;
   &lt;p&gt;&lt;a
        
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found a way</strong></del></span>
+      Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt; and use its camera
+      to watch the people who are watching TV.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Many models</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras &lt;a
+  href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
+  have backdoors&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;That is a malicious functionality, but</strong></del></span> <span 
class="inserted"><ins><em>insecurity</em></ins></span> in <span 
class="removed"><del><strong>addition it</strong></del></span>
+<span class="inserted"><ins><em>proprietary software that has grave 
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
+  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use them to get into
+  users' cameras&lt;/a&gt;.&lt;/p&gt;
+
+&lt;/li&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;This page lists clearly established 
cases of insecurity in
-proprietary software that has grave consequences or is otherwise
+&lt;li&gt;
+  &lt;p&gt;
+    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+    pre-installed on 28 models</strong></del></span> <span 
class="inserted"><ins><em>otherwise
 noteworthy.&lt;/p&gt;
 
 &lt;div class="important"&gt;
-&lt;p&gt;If you know of an example that ought</em></ins></span> to <span 
class="removed"><del><strong>break security on</strong></del></span> <span 
class="inserted"><ins><em>be in this page but isn't
-here, please write
-to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TV&lt;/a&gt; and use its 
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
-to <span class="inserted"><ins><em>serve as specific substantiation.&lt;/p&gt;
+&lt;p&gt;If you know</em></ins></span> of <span 
class="removed"><del><strong>HP laptops logged the user's
+    keystroke</strong></del></span> <span class="inserted"><ins><em>an example 
that ought</em></ins></span> to <span class="removed"><del><strong>a 
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span> 
in <span class="removed"><del><strong>the filesystem. Any process with access to
+    the filesystem or the MapViewOfFile API could gain 
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>the
+    log. Furthermore,</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
+    to modzero&lt;/a&gt; the &ldquo;information-leak via Covert Storage
+    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;</em></ins></span>
+to <span class="removed"><del><strong>capture keystrokes without
+    taking</strong></del></span> <span class="inserted"><ins><em>inform us. 
Please include</em></ins></span> the <span 
class="removed"><del><strong>risk</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>being classified</strong></del></span> <span 
class="inserted"><ins><em>a trustworthy reference or two
+to serve</em></ins></span> as <span class="removed"><del><strong>malicious 
task by AV
+    heuristics&rdquo;.
+  &lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>specific 
substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>proprietary code that runs 
pacemakers, insulin pumps, and other
+medical devices is</strong></del></span> <span 
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol 
has</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
+full of gross security faults&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+
+&lt;li&gt;
+  &lt;p&gt;Exploits</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models</em></ins></span> of <span 
class="removed"><del><strong>bugs in Windows, which were developed 
by</strong></del></span> <span class="inserted"><ins><em>implantable
+    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>NSA</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006,</em></ins></span> and 
<span class="removed"><del><strong>then leaked</strong></del></span> <span 
class="inserted"><ins><em>similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done</em></ins></span> by the 
<span class="removed"><del><strong>Shadowbrokers group, are now being 
used</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to
+       <span class="removed"><del><strong>&lt;a 
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack
 a great number
+       of Windows computers</strong></del></span>
+    <span class="inserted"><ins><em>correct them. This means you can't rely on 
proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902270"&gt;
     &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
-    manufacturer (now Amazon) can</em></ins></span> watch <span 
class="inserted"><ins><em>all the time. Now it turns out
+    manufacturer (now Amazon) can watch all the time. Now it turns out
     that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The third party vulnerability is presumably
     unintentional and I suppose Amazon will fix it. I
-    do not expect Amazon to change</em></ins></span> the <span 
class="inserted"><ins><em>design that &lt;a
+    do not expect Amazon to change the design that &lt;a
     href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
     Amazon to watch&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -91,45 +140,27 @@
   &lt;li id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that</em></ins></span> 
people <span class="removed"><del><strong>who are watching 
TV.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
+    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security</em></ins></span> of 
<span class="removed"><del><strong>Internet-connected 
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
-    and</em></ins></span> &lt;a
-  <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
-  have backdoors&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;That is a malicious functionality, but in 
addition</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn</em></ins></span> it <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> a <span 
class="removed"><del><strong>gross
-  insecurity since anyone, including malicious crackers, &lt;a 
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;can
 find those accounts and use</strong></del></span> <span 
class="inserted"><ins><em>listening device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for</em></ins></span> them to <span 
class="removed"><del><strong>get into
-  users' cameras&lt;/a&gt;.&lt;/p&gt;
 
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;
-    Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28 models of HP laptops logged</strong></del></span> 
<span class="inserted"><ins><em>do this. The job would be much
-    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>user's
-    keystroke</strong></del></span> <span class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span class="removed"><del><strong>a file 
in the filesystem. Any process with access</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease</em></ins></span> to <span 
class="inserted"><ins><em>sell</em></ins></span> the <span 
class="removed"><del><strong>filesystem or</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>MapViewOfFile API could gain 
access</strong></del></span> <span class="inserted"><ins><em>moral 
fiber</em></ins></span> to <span class="removed"><del><strong>the
-    log. Furthermore,</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers are probably hackers too, but 
please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
-    &ldquo;hacking&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>modzero&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
+
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
+    easier for Amazon. And if some government such as China or the US
+    told Amazon to do this, or cease to sell the product in that country,
+    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;information-leak via Covert Storage
-    Channel enables malware authors</strong></del></span> <span 
class="inserted"><ins><em>other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
     hijacked by programs that play commands in ultrasound that humans
     can't hear&lt;/a&gt;.&lt;/p&gt;
@@ -138,23 +169,17 @@
   &lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
-    photos</em></ins></span> to <span class="removed"><del><strong>capture 
keystrokes without
-    taking</strong></del></span> <span class="inserted"><ins><em>people 
in</em></ins></span> the <span class="removed"><del><strong>risk of being 
classified as malicious task by AV
-    heuristics&rdquo;.
-  &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>owner's 
contact list&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201712240"&gt;
-    &lt;p&gt;One of the dangers of the &ldquo;internet of 
stings&rdquo;</em></ins></span>
-    is <span class="inserted"><ins><em>that, if you lose your internet 
service, you also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
-full</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control</em></ins></span> of <span 
class="removed"><del><strong>gross</strong></del></span> <span 
class="inserted"><ins><em>your house and appliances&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201712240"&gt;
+    &lt;p&gt;One of the dangers of the &ldquo;internet of stings&rdquo;
+    is that, if you lose your internet service, you also &lt;a
+    
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For your safety, don't use any appliance with a connection to the
+    &lt;p&gt;For your safety, don't use any appliance</em></ins></span> with 
<span class="removed"><del><strong>ransomware&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
connection to the
     real internet.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -168,45 +193,39 @@
     &lt;p&gt;Amazon recently invited consumers to be suckers and &lt;a
     
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
     allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
-    it, the system has a grave</em></ins></span> security <span 
class="removed"><del><strong>faults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>flaw.&lt;/p&gt;</em></ins></span>
+    it, the system has a grave security flaw.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Exploits of bugs</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709290"&gt;
-    &lt;p&gt;Bad security</em></ins></span> in <span 
class="removed"><del><strong>Windows, which were developed 
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it 
possible to &lt;a
+  &lt;li id="M201709290"&gt;
+    &lt;p&gt;Bad security in some cars makes it possible to &lt;a
     href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"&gt;
-    remotely activate</em></ins></span> the <span 
class="removed"><del><strong>NSA
-       and then leaked by</strong></del></span> <span 
class="inserted"><ins><em>airbags&lt;/a&gt;.&lt;/p&gt;
+    remotely activate the airbags&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709200"&gt;
     &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
-    designed for hospitals is connected to</em></ins></span> the <span 
class="removed"><del><strong>Shadowbrokers group, are now being 
used</strong></del></span> <span class="inserted"><ins><em>internet. Naturally 
&lt;a
+    designed for hospitals is connected to the internet. Naturally &lt;a
     
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Note that this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;
+    referring to crackers.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/"&gt;attack</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
+    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
+    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
     to snoop on the people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>great number</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
     &lt;p&gt;It is unfortunate that the article uses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706200.1"&gt;
-    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>Windows computers with ransomware&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected cameras &lt;a
+    &lt;p&gt;Many models of Internet-connected cameras &lt;a
     href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
     have backdoors&lt;/a&gt;.&lt;/p&gt;
 
@@ -236,14 +255,12 @@
     besides using machines that don't come with the backdoor.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Many Android</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
     &lt;p&gt;The proprietary code that runs pacemakers,
-    insulin pumps, and other medical</em></ins></span> devices <span 
class="inserted"><ins><em>is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-       can be</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross
+    insulin pumps, and other medical devices is &lt;a
+    href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
     security faults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -265,10 +282,10 @@
     a great number of Windows computers with ransomware&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201704050"&gt;
+  &lt;li id="M201704050"&gt;</em></ins></span>
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
-    can be</em></ins></span> hijacked through their Wi-Fi chips&lt;/a&gt; 
because of a bug in
+    can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
     Broadcom's non-free firmware.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -276,9 +293,10 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201703270"&gt;</em></ins></span>
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected</em></ins></span> to the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
+    Stings hospital disinfectant dishwasher is
+<span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to the Internet, its security is crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
     filesystem, infect it with malware, and force the dishwasher to launch
@@ -286,9 +304,8 @@
     used in hospitals, such attacks could potentially put hundreds of
     lives at risk.&lt;/p&gt;
   &lt;/li&gt;
-<span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;WhatsApp</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702200"&gt;
+  &lt;li id="M201702200"&gt;
     &lt;p&gt;If you buy a used &ldquo;smart&rdquo;
     car, house, TV, refrigerator, etc., usually &lt;a
     
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html"&gt;the
@@ -300,17 +317,23 @@
     
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"&gt;with
     a smart but foolish car have very bad security&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is in addition to the fact that the car contains a cellular
-    modem that tells big brother all the time where it is.  If you own
-    such a car, it would be wise to disconnect the modem so as to turn
-    off the tracking.&lt;/p&gt;
+    &lt;p&gt;This is in addition</em></ins></span> to the <span 
class="removed"><del><strong>Internet,
+its security is crap&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;For example,</strong></del></span> <span 
class="inserted"><ins><em>fact that the car contains</em></ins></span> a <span 
class="removed"><del><strong>cracker can gain access to</strong></del></span> 
<span class="inserted"><ins><em>cellular
+    modem that tells big brother all</em></ins></span> the <span 
class="removed"><del><strong>dishwasher's filesystem, 
+infect</strong></del></span> <span class="inserted"><ins><em>time 
where</em></ins></span> it <span class="removed"><del><strong>with malware, and 
force</strong></del></span> <span class="inserted"><ins><em>is.  If you own
+    such a car, it would be wise to disconnect</em></ins></span> the <span 
class="removed"><del><strong>dishwasher</strong></del></span> <span 
class="inserted"><ins><em>modem so as</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on other
+devices in</strong></del></span> <span class="inserted"><ins><em>turn
+    off</em></ins></span> the <span class="removed"><del><strong>network. 
Since these dishwashers</strong></del></span> <span 
class="inserted"><ins><em>tracking.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201701271"&gt;
     &lt;p&gt;A cracker would be able to &lt;a
     href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/"&gt;
     turn the Oculus Rift sensors into spy cameras&lt;/a&gt; after breaking into
-    the computer they are connected to.&lt;/p&gt;
+    the computer they</em></ins></span> are <span 
class="removed"><del><strong>used in hospitals, such
+attacks could potentially put hundreds of lives at 
risk.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>connected 
to.&lt;/p&gt;
 
     &lt;p&gt;Unfortunately, the article &lt;a
     href="/philosophy/words-to-avoid.html#Hacker"&gt;improperly refers to 
crackers
@@ -321,10 +344,11 @@
     &lt;p&gt;Samsung phones &lt;a
     
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
     a security hole that allows an SMS message to install
-    ransomware&lt;/a&gt;.&lt;/p&gt;
+    ransomware&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;WhatsApp</strong></del></span>
 
-  &lt;li id="M201701130"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201701130"&gt;
     &lt;p&gt;WhatsApp</em></ins></span> has a feature that &lt;a
     
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/"&gt;
     has been described as a &ldquo;back door&rdquo;&lt;/a&gt; because it would
@@ -444,18 +468,19 @@
   <span class="inserted"><ins><em>&lt;li id="M201606290"&gt;</em></ins></span>
     &lt;p&gt;Antivirus programs have so many errors that &lt;a
     
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374"&gt;they
-    may make security worse&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
-  &lt;/li&gt;
+    may <span class="removed"><del><strong>make security 
worse&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;GNU/Linux does not need antivirus software.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;Over 70 brands of network-connected surveillance
 cameras &lt;a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;have
-security bugs that allow anyone to watch through them&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+security bugs that allow anyone to watch through 
them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>make security worse&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
+    &lt;p&gt;GNU/Linux does not need antivirus 
software.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Samsung's</strong></del></span>
 
@@ -531,10 +556,7 @@
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Malware found
-on</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit fitness trackers have a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
+on &lt;a 
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
 cameras available through Amazon&lt;/a&gt;.
 &lt;/p&gt;
 
@@ -562,10 +584,12 @@
 
 &lt;li&gt;
 &lt;p&gt;
-FitBit fitness trackers &lt;a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-have a Bluetooth vulnerability&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-    Bluetooth vulnerability&lt;/a&gt;</em></ins></span> that allows attackers 
to send malware
+FitBit</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
+    &lt;p&gt;FitBit</em></ins></span> fitness trackers <span 
class="removed"><del><strong>&lt;a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;</strong></del></span>
 have a <span class="inserted"><ins><em>&lt;a
+    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;</em></ins></span>
+    Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with <span class="removed"><del><strong>them.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
@@ -578,9 +602,9 @@
   <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
     &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-    have</em></ins></span> a back <span 
class="removed"><del><strong>door&lt;/a&gt;.
+    can't trust it. <span class="removed"><del><strong>Western Digital's 
&ldquo;My Passport&rdquo;
+drives
+&lt;a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;have
 a back door&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -590,7 +614,9 @@
 &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
 intentional local back door for 4 years&lt;/a&gt;, which could be
 exploited by attackers to gain root privileges.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;/p&gt;</strong></del></span>  <span class="inserted"><ins><em>Western 
Digital's &ldquo;My Passport&rdquo; drives &lt;a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    have a back door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -626,58 +652,34 @@
 
     &lt;p&gt;If</em></ins></span> I ever own a car, and it contains a portable 
phone, I will
     deactivate <span class="removed"><del><strong>that.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
-Hospira</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;
-    &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
-    
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-    kill patients&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201505294"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
-    Many smartphone apps use insecure authentication methods when storing
-    your personal data on remote servers&lt;/a&gt;. This leaves personal
-    information like email addresses, passwords, and health information
-    vulnerable. Because many of these apps are proprietary it makes it
-    hard to impossible to know which apps are at risk.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201505050"&gt;
-    &lt;p&gt;Hospira</em></ins></span> infusion pumps, which are used
-    to administer drugs to a patient, were rated &ldquo;&lt;a
-    
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security <span 
class="removed"><del><strong>researcher.
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated
+&ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
+secure IP device I've ever seen&lt;/a&gt;&rdquo;
+by a security researcher.
 &lt;/p&gt;
 &lt;p&gt;
-Depending</strong></del></span>
-    <span class="inserted"><ins><em>researcher.&lt;/p&gt;
-
-    &lt;p&gt;Depending</em></ins></span> on what drug is being infused, the 
insecurity could open
-    the door to <span class="removed"><del><strong>murder.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>murder.&lt;/p&gt;</em></ins></span>
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
-Due to bad security in a drug pump, crackers</strong></del></span>
+Due</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201504090"&gt;
-    &lt;p&gt;Mac OS X had an &lt;a
-    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-    intentional local back door for 4 years&lt;/a&gt;, which</em></ins></span> 
could <span class="removed"><del><strong>use it</strong></del></span> <span 
class="inserted"><ins><em>be exploited
-    by attackers</em></ins></span> to
-<span class="removed"><del><strong>&lt;a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>gain root 
privileges.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;
+    &lt;p&gt;Due</em></ins></span> to bad security in a drug pump, crackers 
could use it to &lt;a <span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;kill
 patients&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;
 &lt;a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"&gt;
 The NSA can tap data in smart phones, including iPhones, Android, and
@@ -721,27 +723,55 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-It is possible to kill people by taking control of medical implants by
+It is possible to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;</em></ins></span>
+    kill <span class="removed"><del><strong>people by taking control of 
medical implants by
 radio&lt;/a&gt;.  Here
 is &lt;a href="http://www.bbc.co.uk/news/technology-17631838"&gt;more
 information&lt;/a&gt;.  And &lt;a 
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;here&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>patients&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Lots of &lt;a 
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;hospital 
equipment has lousy security&lt;/a&gt;, and it can be fatal.
-&lt;/p&gt;
-&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Lots of &lt;a 
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;hospital 
equipment has lousy security&lt;/a&gt;,</strong></del></span>
 
-&lt;li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201505294"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html"&gt;
+    Many smartphone apps use insecure authentication methods when storing
+    your personal data on remote servers&lt;/a&gt;. This leaves personal
+    information like email addresses, passwords,</em></ins></span> and <span 
class="inserted"><ins><em>health information
+    vulnerable. Because many of these apps are proprietary</em></ins></span> 
it <span class="removed"><del><strong>can be fatal.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>makes it
+    hard to impossible to know which apps are at 
risk.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken over and turned
-into a botnet for the purpose of collecting customers' credit card
+Point-of-sale terminals running Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
+    &lt;p&gt;Hospira infusion pumps, which are used
+    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
+    
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
+    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
+    researcher.&lt;/p&gt;
+
+    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
 numbers&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>insecurity 
could open
+    the door to murder.&lt;/p&gt;
+  &lt;/li&gt;
 
-&lt;li&gt;</strong></del></span>
+  &lt;li id="M201504090"&gt;
+    &lt;p&gt;Mac OS X had an &lt;a
+    
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+    intentional local back door for 4 years&lt;/a&gt;, which could be exploited
+    by attackers to gain root privileges.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201405190"&gt;</em></ins></span>
     &lt;p&gt;An app to prevent &ldquo;identity theft&rdquo;
@@ -941,7 +971,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary/po/proprietary-insecurity.it.po 23 Mar 2019 10:31:41 -0000      
1.145
+++ proprietary/po/proprietary-insecurity.it.po 11 Apr 2019 07:00:33 -0000      
1.146
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary-insecurity.ja-diff.html  23 Mar 2019 10:31:41 
-0000      1.57
+++ proprietary/po/proprietary-insecurity.ja-diff.html  11 Apr 2019 07:00:33 
-0000      1.58
@@ -75,62 +75,57 @@
 here, please write</em></ins></span>
 to <span class="removed"><del><strong>weak security,</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
 is easy</strong></del></span> <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;</em></ins></span>
-to <span class="removed"><del><strong>open</strong></del></span> <span 
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>doors</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>100 million cars built by 
Volkswagen&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Ransomware &lt;a 
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
-been developed for</strong></del></span> a <span 
class="removed"><del><strong>thermostat</strong></del></span> <span 
class="inserted"><ins><em>trustworthy reference or two
+to <span class="removed"><del><strong>open</strong></del></span> <span 
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span 
class="removed"><del><strong>doors</strong></del></span> <span 
class="inserted"><ins><em>URL</em></ins></span> of <span 
class="removed"><del><strong>100 million cars built</strong></del></span> <span 
class="inserted"><ins><em>a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="proprietary-insecurity"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
-    manufacturer (now Amazon) can watch all the time. Now it turns 
out</em></ins></span>
-    that <span class="removed"><del><strong>uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done</em></ins></span> by <span 
class="removed"><del><strong>Volkswagen&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;A</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in
-Internet Explorer</strong></del></span> <span 
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
-    anyone else can also watch,</em></ins></span> and <span 
class="removed"><del><strong>Edge&lt;/a&gt; allows an attacker to retrieve
-Microsoft account credentials, if the user</strong></del></span> <span 
class="inserted"><ins><em>fake videos too&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Ransomware</strong></del></span>
 
-    &lt;p&gt;The third party vulnerability</em></ins></span> is <span 
class="removed"><del><strong>tricked into visiting a
-malicious link.&lt;/p&gt;
-&lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
+    that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/"&gt;has
+been developed for a thermostat</strong></del></span> <span 
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
+    anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-WhatsApp messages are</strong></del></span> <span 
class="inserted"><ins><em>presumably
+    &lt;p&gt;The third party vulnerability is presumably
     unintentional and I suppose Amazon will fix it. I
-    do</em></ins></span> not <span class="removed"><del><strong>entirely 
deleted&lt;/a&gt;. They can be recovered
-in various ways.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>expect 
Amazon</em></ins></span> to <span class="inserted"><ins><em>change the design 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-  malacious code from any application which uses this API</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
-    Amazon</em></ins></span> to <span class="removed"><del><strong>render a
-  certain kind of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    do not expect Amazon to change the design</em></ins></span> that <span 
class="removed"><del><strong>uses proprietary 
software&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    href="/proprietary/proprietary-surveillance.html#M201901100"&gt;allows
+    Amazon to watch&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;A bug</strong></del></span>
+&lt;p&gt;A</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201809240"&gt;
-    &lt;p&gt;Researchers have discovered how to &lt;a
-    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands</em></ins></span> in <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>other audio&lt;/a&gt;, so that people cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;
+    &lt;p&gt;Researchers have discovered how to</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
+    hide voice commands</em></ins></span> in
+<span class="removed"><del><strong>Internet Explorer</strong></del></span> 
<span class="inserted"><ins><em>other audio&lt;/a&gt;, so that people cannot 
hear
+    them, but Alexa</em></ins></span> and <span 
class="removed"><del><strong>Edge&lt;/a&gt; allows an 
attacker</strong></del></span> <span class="inserted"><ins><em>Siri 
can.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>user is tricked</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
@@ -367,26 +362,33 @@
     &lt;p&gt;A &lt;a
     
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
     in Internet Explorer and Edge&lt;/a&gt; allows an attacker to retrieve
-    Microsoft account credentials, if the user is tricked into visiting
+    Microsoft account credentials, if the user is tricked</em></ins></span> 
into visiting
     a malicious link.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201607290"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607290"&gt;</em></ins></span>
     &lt;p&gt;&lt;a
     
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
     WhatsApp messages are not entirely deleted&lt;/a&gt;. They can be recovered
-    in various ways.&lt;/p&gt;
+    in various <span class="removed"><del><strong>ways.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>ways.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201607220"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201607220"&gt;</em></ins></span>
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to render a
+  <span class="removed"><del><strong>malacious</strong></del></span>
+    <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201607190"&gt;
-    &lt;p&gt;A bug in a</em></ins></span> proprietary ASN.1 library, used
+  <span class="inserted"><ins><em>&lt;li id="M201607190"&gt;</em></ins></span>
+    &lt;p&gt;A bug in a proprietary ASN.1 library, used
     in cell phone towers as well as cell phones and routers, &lt;a
     
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover"&gt;allows
     taking control of those systems&lt;/a&gt;.&lt;/p&gt;
@@ -901,7 +903,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/proprietary-insecurity.ja.po 23 Mar 2019 10:31:41 -0000      
1.115
+++ proprietary/po/proprietary-insecurity.ja.po 11 Apr 2019 07:00:33 -0000      
1.116
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -102,6 +102,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary-insecurity.pot   23 Mar 2019 10:31:41 -0000      
1.84
+++ proprietary/po/proprietary-insecurity.pot   11 Apr 2019 07:00:33 -0000      
1.85
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a "
+"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\";>
 "
+"two vulnerabilities that affect several models of implantable "
+"defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in "
+"2008. Apparently, nothing was done by the company to correct them. This "
+"means you can't rely on proprietary software developers to fix bugs in their "
+"products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a "
 "href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\";> anyone "

Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- proprietary/po/proprietary-insecurity.ru.po 23 Mar 2019 17:32:01 -0000      
1.213
+++ proprietary/po/proprietary-insecurity.ru.po 11 Apr 2019 07:00:33 -0000      
1.214
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-12-02 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
 "(now Amazon) can watch all the time. Now it turns out that <a href=\"https://";
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary.de-diff.html     9 Apr 2019 09:00:37 -0000       
1.73
+++ proprietary/po/proprietary.de-diff.html     11 Apr 2019 07:00:33 -0000      
1.74
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -126,9 +126,9 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903280"&gt;
     &lt;p&gt;Car companies are coming up with a list of clever reasons why 
&lt;a
     
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"&gt;
@@ -223,18 +236,6 @@
     turned off the server for old models&lt;/a&gt;, so now if you try to
     reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -295,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/proprietary.de.po    9 Apr 2019 09:00:37 -0000       1.115
+++ proprietary/po/proprietary.de.po    11 Apr 2019 07:00:33 -0000      1.116
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -474,22 +490,6 @@
 "default settings, it bricks them instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary/po/proprietary.es.po    9 Apr 2019 09:00:37 -0000       1.137
+++ proprietary/po/proprietary.es.po    11 Apr 2019 07:00:33 -0000      1.138
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -352,30 +368,6 @@
 "modelos</a>, de modo que si alguien trata ahora de restaurar las "
 "Preferencias por defecto, la tableta se vuelve inutilizable."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"Un estudio sobre 24 aplicaciones de «salud» descubrió que 19 de ellas <a "
-"href=\" https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-";
-"share-your-data-everywhere-new-study-shows\">envían datos sensibles a "
-"terceras partes</a>, que pueden luego utilizarlos para enviar publicidad "
-"intrusiva o discriminar a las personas en malas condiciones médicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-"Cuando se solicita el «consentimiento» del usuario, se esconde en unos "
-"extensos Términos del servicio difíciles de entender. En cualquier caso, el 
"
-"«consentimiento» no es suficiente para legitimar el espionaje."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -455,6 +447,28 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "Un estudio sobre 24 aplicaciones de «salud» descubrió que 19 de ellas 
<a "
+#~ "href=\" https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-";
+#~ "share-your-data-everywhere-new-study-shows\">envían datos sensibles a "
+#~ "terceras partes</a>, que pueden luego utilizarlos para enviar publicidad "
+#~ "intrusiva o discriminar a las personas en malas condiciones médicas."
+
+#~ msgid ""
+#~ "Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, &ldquo;"
+#~ "consent&rdquo; is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "Cuando se solicita el «consentimiento» del usuario, se esconde en unos "
+#~ "extensos Términos del servicio difíciles de entender. En cualquier caso, 
"
+#~ "el «consentimiento» no es suficiente para legitimar el espionaje."
+
+#~ msgid ""
 #~ "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 #~ "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 #~ "cameras inside cars</a> to monitor the driver for signs of impairment "

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/proprietary.fr.po    9 Apr 2019 17:33:06 -0000       1.168
+++ proprietary/po/proprietary.fr.po    11 Apr 2019 07:00:33 -0000      1.169
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2019-04-09 19:31+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -365,32 +382,6 @@
 "anciens</a>, de sorte que si on essaie de réinstaller les réglages par "
 "défaut, la tablette devient inutilisable."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"Une étude portant sur 24 applis « santé » a montré que 19 d'entre 
elles <a "
-"href=\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-";
-"share-your-data-everywhere-new-study-shows\">envoient des données "
-"personnelles sensibles à des tiers</a>, qui peuvent les utiliser à des fins 
"
-"de publicité intrusive ou de discrimination contre les personnes qui ont des 
"
-"problèmes médicaux."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-"Lorsque l'utilisateur doit donner son « consentement », ce dernier est "
-"enfoui dans des conditions d'utilisation à rallonge, presque "
-"incompréhensibles. De toute façon, « consentir » à l'espionnage ne le "
-"légitime pas."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -464,3 +455,27 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "Une étude portant sur 24 applis « santé » a montré que 19 d'entre 
elles "
+#~ "<a href=\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-";
+#~ "can-share-your-data-everywhere-new-study-shows\">envoient des données "
+#~ "personnelles sensibles à des tiers</a>, qui peuvent les utiliser à des "
+#~ "fins de publicité intrusive ou de discrimination contre les personnes qui 
"
+#~ "ont des problèmes médicaux."
+
+#~ msgid ""
+#~ "Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, &ldquo;"
+#~ "consent&rdquo; is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "Lorsque l'utilisateur doit donner son « consentement », ce dernier est 
"
+#~ "enfoui dans des conditions d'utilisation à rallonge, presque "
+#~ "incompréhensibles. De toute façon, « consentir » à l'espionnage ne 
le "
+#~ "légitime pas."

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/proprietary.it-diff.html     9 Apr 2019 09:00:37 -0000       
1.85
+++ proprietary/po/proprietary.it-diff.html     11 Apr 2019 07:00:33 -0000      
1.86
@@ -184,6 +184,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903280"&gt;
     &lt;p&gt;Car companies are coming up with a list of clever reasons why 
&lt;a
     
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"&gt;
@@ -222,18 +235,6 @@
     turned off the server for old models&lt;/a&gt;, so now if you try to
     reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -294,7 +295,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary/po/proprietary.it.po    9 Apr 2019 09:00:37 -0000       1.124
+++ proprietary/po/proprietary.it.po    11 Apr 2019 07:00:33 -0000      1.125
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -478,22 +494,6 @@
 "default settings, it bricks them instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary/po/proprietary.ja-diff.html     9 Apr 2019 09:00:37 -0000       
1.86
+++ proprietary/po/proprietary.ja-diff.html     11 Apr 2019 07:00:33 -0000      
1.87
@@ -181,6 +181,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903280"&gt;
     &lt;p&gt;Car companies are coming up with a list of clever reasons why 
&lt;a
     
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"&gt;
@@ -219,18 +232,6 @@
     turned off the server for old models&lt;/a&gt;, so now if you try to
     reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -291,7 +292,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/proprietary.ja.po    9 Apr 2019 09:00:37 -0000       1.107
+++ proprietary/po/proprietary.ja.po    11 Apr 2019 07:00:33 -0000      1.108
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -398,22 +414,6 @@
 "default settings, it bricks them instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/proprietary.nl-diff.html     9 Apr 2019 09:00:37 -0000       
1.85
+++ proprietary/po/proprietary.nl-diff.html     11 Apr 2019 07:00:33 -0000      
1.86
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903280"&gt;
     &lt;p&gt;Car companies are coming up with a list of clever reasons why 
&lt;a
     
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"&gt;
@@ -222,18 +235,6 @@
     turned off the server for old models&lt;/a&gt;, so now if you try to
     reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -294,7 +295,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/po/proprietary.nl.po    9 Apr 2019 09:00:37 -0000       1.96
+++ proprietary/po/proprietary.nl.po    11 Apr 2019 07:00:33 -0000      1.97
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -471,22 +487,6 @@
 "default settings, it bricks them instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary.pl-diff.html     9 Apr 2019 09:00:37 -0000       
1.103
+++ proprietary/po/proprietary.pl-diff.html     11 Apr 2019 07:00:33 -0000      
1.104
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
+instances of malicious functionalities (with more than 400 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -127,16 +127,16 @@
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -182,6 +182,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903280"&gt;
     &lt;p&gt;Car companies are coming up with a list of clever reasons why 
&lt;a
     
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"&gt;
@@ -220,18 +233,6 @@
     turned off the server for old models&lt;/a&gt;, so now if you try to
     reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -292,7 +293,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary.pl.po    9 Apr 2019 09:00:37 -0000       1.91
+++ proprietary/po/proprietary.pl.po    11 Apr 2019 07:00:33 -0000      1.92
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -553,22 +569,6 @@
 "default settings, it bricks them instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary.pot      9 Apr 2019 09:00:37 -0000       1.88
+++ proprietary/po/proprietary.pot      11 Apr 2019 07:00:33 -0000      1.89
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,23 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a "
+"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\";>
 "
+"two vulnerabilities that affect several models of implantable "
+"defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in "
+"2008. Apparently, nothing was done by the company to correct them. This "
+"means you can't rely on proprietary software developers to fix bugs in their "
+"products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a "
 
"href=\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html\";>
 "
 "they &ldquo;have to&rdquo; put cameras and microphones in the car</a>."
@@ -286,22 +303,6 @@
 "default settings, it bricks them instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a "
-"href=\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\";>
 "
-"send sensitive personal data to third parties</a>, which can use it for "
-"invasive advertising or discriminating against people in poor medical "
-"condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, "
-"&ldquo;consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary/po/proprietary.pt-br.po 9 Apr 2019 09:00:37 -0000       1.130
+++ proprietary/po/proprietary.pt-br.po 11 Apr 2019 07:00:33 -0000      1.131
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2019-04-07 09:35-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -345,30 +361,6 @@
 "kill-fix\"> desligou o servidor para modelos antigos</a>, então, agora, se "
 "você tentar reinstalar as configurações padrão, eles serão inutilizados."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"Um estudo de 24 aplicativos de “saúde” descobriu que 19 deles <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> enviam dados pessoais confidenciais "
-"para terceiros</a>, que podem usá-los para publicidade invasiva ou "
-"discriminar pessoas em más condições de médicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-"Sempre que o “consentimento” do usuário é solicitado, ele é soterrado 
com "
-"longos termos de serviço que são difíceis de entender. Em qualquer caso, "
-"“consentir” não é suficiente para legitimar a bisbilhotice."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -444,6 +436,28 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "Um estudo de 24 aplicativos de “saúde” descobriu que 19 deles <a 
href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
+#~ "your-data-everywhere-new-study-shows\"> enviam dados pessoais "
+#~ "confidenciais para terceiros</a>, que podem usá-los para publicidade "
+#~ "invasiva ou discriminar pessoas em más condições de médicas."
+
+#~ msgid ""
+#~ "Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, &ldquo;"
+#~ "consent&rdquo; is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "Sempre que o “consentimento” do usuário é solicitado, ele é 
soterrado com "
+#~ "longos termos de serviço que são difíceis de entender. Em qualquer 
caso, "
+#~ "“consentir” não é suficiente para legitimar a bisbilhotice."
+
+#~ msgid ""
 #~ "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 #~ "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 #~ "cameras inside cars</a> to monitor the driver for signs of impairment "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary/po/proprietary.ru.po    9 Apr 2019 09:30:43 -0000       1.207
+++ proprietary/po/proprietary.ru.po    11 Apr 2019 07:00:33 -0000      1.208
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -368,31 +385,6 @@
 "пытаешься переустановить исходные 
настройки, то вместо этого планшет выходит "
 "из строя."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"Исследование показало, что 19 из 24 
медицинских приложений <a href=\"https://";
-"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
-"everywhere-new-study-shows\"> отсылают 
конфиденциальные персональные данные "
-"третьим сторонам</a>, которые могут 
применять их для навязчивой рекламы или "
-"дискриминации людей с плохим состоянием 
здоровья."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-"Всякий раз, когда программа запрашивает 
&ldquo;разрешения&rdquo; "
-"пользователя, оно зарыто в условиях 
пользования службой, которые нелегко "
-"понять. В любом случае, &ldquo;согласия&rdquo; 
недостаточно, чтобы оправдать "
-"слежку."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -472,6 +464,29 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "Исследование показало, что 19 из 24 
медицинских приложений <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
+#~ "your-data-everywhere-new-study-shows\"> отсылают 
конфиденциальные "
+#~ "персональные данные третьим сторонам</a>, 
которые могут применять их для "
+#~ "навязчивой рекламы или дискриминации 
людей с плохим состоянием здоровья."
+
+#~ msgid ""
+#~ "Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, &ldquo;"
+#~ "consent&rdquo; is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "Всякий раз, когда программа запрашивает 
&ldquo;разрешения&rdquo; "
+#~ "пользователя, оно зарыто в условиях 
пользования службой, которые нелегко "
+#~ "понять. В любом случае, &ldquo;согласия&rdquo; 
недостаточно, чтобы "
+#~ "оправдать слежку."
+
+#~ msgid ""
 #~ "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/";
 #~ "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
 #~ "cameras inside cars</a> to monitor the driver for signs of impairment "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary.zh-tw-diff.html  9 Apr 2019 09:00:37 -0000       
1.63
+++ proprietary/po/proprietary.zh-tw-diff.html  11 Apr 2019 07:00:33 -0000      
1.64
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -126,9 +126,9 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,19 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201903210"&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities that affect several models of implantable
+    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+
+    &lt;p&gt;This protocol has been around since 2006, and similar
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by the company to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903280"&gt;
     &lt;p&gt;Car companies are coming up with a list of clever reasons why 
&lt;a
     
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html"&gt;
@@ -223,18 +236,6 @@
     turned off the server for old models&lt;/a&gt;, so now if you try to
     reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of them 
&lt;a
-    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which can use it
-    for invasive advertising or discriminating against people in poor
-    medical condition.&lt;/p&gt;
-
-    &lt;p&gt;Whenever user &ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult to understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -295,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary.zh-tw.po 9 Apr 2019 09:00:37 -0000       1.74
+++ proprietary/po/proprietary.zh-tw.po 11 Apr 2019 07:00:33 -0000      1.75
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Car companies are coming up with a list of clever reasons why <a href="
 "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "
@@ -387,22 +403,6 @@
 "default settings, it bricks them instead."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user &ldquo;consent&rdquo; is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, &ldquo;"
-"consent&rdquo; is not sufficient to legitimize snooping."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/pt-br.po     11 Apr 2019 02:59:08 -0000      1.82
+++ proprietary/po/pt-br.po     11 Apr 2019 07:00:33 -0000      1.83
@@ -1306,6 +1306,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary/po/ru.po        11 Apr 2019 02:59:08 -0000      1.140
+++ proprietary/po/ru.po        11 Apr 2019 07:00:33 -0000      1.141
@@ -1740,6 +1740,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/zh-tw.po     11 Apr 2019 02:59:08 -0000      1.62
+++ proprietary/po/zh-tw.po     11 Apr 2019 07:00:33 -0000      1.63
@@ -1285,6 +1285,22 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: server/home-pkgblurbs.af.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.af.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.af.html       10 Dec 2018 11:59:53 -0000      1.73
+++ server/home-pkgblurbs.af.html       11 Apr 2019 07:00:34 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ar.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ar.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ar.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.ar.html       11 Apr 2019 07:00:34 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.bg.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.bg.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.bg.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.bg.html       11 Apr 2019 07:00:34 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ca.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ca.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ca.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.ca.html       11 Apr 2019 07:00:34 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.cs.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.cs.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.cs.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.cs.html       11 Apr 2019 07:00:34 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.da.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.da.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- server/home-pkgblurbs.da.html       10 Dec 2018 11:59:54 -0000      1.46
+++ server/home-pkgblurbs.da.html       11 Apr 2019 07:00:34 -0000      1.47
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.de.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.de.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- server/home-pkgblurbs.de.html       30 Jan 2019 12:29:02 -0000      1.146
+++ server/home-pkgblurbs.de.html       11 Apr 2019 07:00:34 -0000      1.147
@@ -1,6 +1,6 @@
 
 
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf">
   <!-- TRANSLATORS: stale -->
@@ -2460,6 +2460,16 @@
 Matrizen. <small>(<a href="/manual/#jacal">Handbuch</a>)</small></p>
 
 <!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.  <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-Getopt</a></h4><p>
@@ -3522,17 +3532,6 @@
 href="/manual/#remotecontrol">Handbuch</a>)</small></p>
 
 <!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-<b>GNU Ring</b> ist ein Programm für die universelle Kommunikation, das die
-Freiheiten und die Privatsphäre der Nutzer respektiert. Ring verwendet
-verteilte Hash-Tabellen für den Aufbau der Kommunikation. Dies vermeidet die
-Aufbewahrung zentraler Register von Nutzern und die Speicherung
-personenbezogener Daten. <small>(<a
-href="/manual/#ring">Handbuch</a>)</small></p>
-
-<!--#endif -->
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rot[t]log</a></h4><p>
@@ -4233,4 +4232,4 @@
 Funktionsumfang. <small>(<a href="/manual/#zile">Handbuch</a>)</small></p>
 
 <!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.el.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.el.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.el.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.el.html       11 Apr 2019 07:00:35 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.es.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.es.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.es.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.es.html       11 Apr 2019 07:00:35 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.fa.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.fa.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.fa.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.fa.html       11 Apr 2019 07:00:35 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.fr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.fr.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- server/home-pkgblurbs.fr.html       10 Dec 2018 11:59:54 -0000      1.135
+++ server/home-pkgblurbs.fr.html       11 Apr 2019 07:00:35 -0000      1.136
@@ -1,6 +1,6 @@
 
 
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf">
   <!-- TRANSLATORS: stale -->
@@ -2492,6 +2492,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 
 <!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.  <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3575,16 +3585,6 @@
 href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 
 <!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring est un logiciel de communication universelle qui respecte les libertés
-et la vie privée de ses utilisateurs. Il utilise des tables de hachage
-distribuées pour établir la communication. Cela évite les registres
-centralisés d'utilisateurs et le stockage des données
-personnelles. <small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-
-<!--#endif -->
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -4292,4 +4292,4 @@
 href="/manual/manual.html#zile">doc</a>)</small></p>
 
 <!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.he.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.he.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.he.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.he.html       11 Apr 2019 07:00:36 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.hr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.hr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.hr.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.hr.html       11 Apr 2019 07:00:36 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.id.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.id.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.id.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.id.html       11 Apr 2019 07:00:36 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.it.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.it.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.it.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.it.html       11 Apr 2019 07:00:36 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ja.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ja.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- server/home-pkgblurbs.ja.html       10 Dec 2018 11:59:54 -0000      1.144
+++ server/home-pkgblurbs.ja.html       11 Apr 2019 07:00:36 -0000      1.145
@@ -1,6 +1,6 @@
 
 
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf">
   <!-- TRANSLATORS: stale -->
@@ -1854,6 +1854,16 @@
 href="/manual/manual.html#jacal">ドキュメント</a>)</small></p>
 
 <!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.  <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -2681,13 +2691,6 @@
 href="/manual/manual.html#remotecontrol">ドキュメント</a>)</small></p>
 
 <!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ringはユーザの自由とプライバシを尊重する普遍的な通信のプログラãƒ
 
です。Ringは通信を確立するために分散ハッシュテーブルを用います。これで、中心的なユーザのレジストリを保持し、個人データを保管することを避けます。<small>(<a
-href="/manual/manual.html#ring">ドキュメント</a>)</small></p>
-
-<!--#endif -->
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3231,4 +3234,4 @@
 href="/manual/manual.html#zile">ドキュメント</a>)</small></p>
 
 <!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ko.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ko.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ko.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.ko.html       11 Apr 2019 07:00:37 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.lt.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.lt.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- server/home-pkgblurbs.lt.html       10 Dec 2018 11:59:54 -0000      1.52
+++ server/home-pkgblurbs.lt.html       11 Apr 2019 07:00:37 -0000      1.53
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ml.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ml.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ml.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.ml.html       11 Apr 2019 07:00:37 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.nb.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.nb.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.nb.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.nb.html       11 Apr 2019 07:00:37 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.nl.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.nl.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.nl.html       10 Dec 2018 11:59:54 -0000      1.73
+++ server/home-pkgblurbs.nl.html       11 Apr 2019 07:00:37 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.pl.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.pl.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.pl.html       10 Dec 2018 11:59:55 -0000      1.73
+++ server/home-pkgblurbs.pl.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.pt-br.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.pt-br.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- server/home-pkgblurbs.pt-br.html    26 Dec 2018 10:03:27 -0000      1.79
+++ server/home-pkgblurbs.pt-br.html    11 Apr 2019 07:00:38 -0000      1.80
@@ -1,6 +1,6 @@
 
 
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf">
   <!-- TRANSLATORS: stale -->
@@ -2366,6 +2366,16 @@
 href="/manual/manual.html#jacal">doc</a>)</small></p>
 
 <!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.  <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3406,16 +3416,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 
 <!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring é um programa de comunicação universal que respeita as liberdades e a
-privacidade de seus usuários. Ring usa tabelas de hash distribuídas para
-estabelecer comunicação. Isso evita manter registros centralizados de
-usuários e armazenar dados pessoais.  <small>(<a
-href="/manual/manual.html#ring">doc</a>)</small></p>
-
-<!--#endif -->
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -4092,4 +4092,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 
 <!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ro.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ro.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ro.html       10 Dec 2018 11:59:55 -0000      1.73
+++ server/home-pkgblurbs.ro.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ru.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ru.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- server/home-pkgblurbs.ru.html       29 Jan 2019 09:01:20 -0000      1.149
+++ server/home-pkgblurbs.ru.html       11 Apr 2019 07:00:38 -0000      1.150
@@ -1,6 +1,6 @@
 
 
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf">
   <!-- TRANSLATORS: stale -->
@@ -2378,6 +2378,16 @@
 href="/manual/manual.html#jacal">док</a>)</small></p>
 
 <!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.  <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3411,16 +3421,6 @@
 href="/manual/manual.html#remotecontrol">док</a>)</small></p>
 
 <!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring&nbsp;&mdash; универсальная программа для 
связи, уважающая свободу и
-неприкосновенность личной жизни 
пользователей. Ring устанавливает связь с
-помощью распределенных таблиц хешей. Это 
позволяет избежать централизованной
-регистрации пользователей и хранения их 
персональных данных. <small>(<a
-href="/manual/manual.html#ring">док</a>)</small></p>
-
-<!--#endif -->
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -4110,4 +4110,4 @@
 меньше функций. <small>(<a 
href="/manual/manual.html#zile">док</a>)</small></p>
 
 <!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.sk.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sk.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sk.html       10 Dec 2018 11:59:55 -0000      1.73
+++ server/home-pkgblurbs.sk.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.sq.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sq.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sq.html       10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.sq.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.sr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sr.html       10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.sr.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.sv.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sv.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sv.html       10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.sv.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.ta.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ta.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ta.html       10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.ta.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.te.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.te.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- server/home-pkgblurbs.te.html       10 Dec 2018 11:59:56 -0000      1.4
+++ server/home-pkgblurbs.te.html       11 Apr 2019 07:00:38 -0000      1.5
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.tr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.tr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.tr.html       10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.tr.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.uk.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.uk.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.uk.html       10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.uk.html       11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.zh-cn.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.zh-cn.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.zh-cn.html    10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.zh-cn.html    11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/home-pkgblurbs.zh-tw.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.zh-tw.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.zh-tw.html    10 Dec 2018 11:59:56 -0000      1.73
+++ server/home-pkgblurbs.zh-tw.html    11 Apr 2019 07:00:38 -0000      1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->
 
 <!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
 <h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
 <small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
 <!--#endif -->
 
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+  <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
 <!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
 <h4 id="java-getopt">
   <a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
 <small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
 <!--#endif -->
 
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
-  <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
 <!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
 <h4 id="rottlog">
   <a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
 <small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
 <!--#endif -->
 
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10 
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31 
(UTC+0100) -->

Index: server/po/home-pkgblurbs.de.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.de.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- server/po/home-pkgblurbs.de.po      30 Jan 2019 12:29:03 -0000      1.207
+++ server/po/home-pkgblurbs.de.po      11 Apr 2019 07:00:38 -0000      1.208
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: home-pkgblurbs.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2018-11-10 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
 
 #. type: Attribute 'alt' of: <h4><img>
 msgid "logo for 3dldf"
@@ -4133,6 +4134,42 @@
 "Matrizen. <small>(<a href=\"/manual/#jacal\">Handbuch</a>)</small>"
 
 #. type: Content of: <h4>
+# | <a [-href=\"/software/gama/\">Gama</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+# | [-Ring-]{+Jami+} is a program for universal communication which respects
+# | freedoms and privacy of its users. [-Ring-] {+Jami+} uses distributed hash
+# | tables for establishing communication. This avoids keeping centralized
+# | registries of users and storing personal data.  <small>(<a
+# | [-href=\"/manual/manual.html#ring\">doc</a>)</small>-]
+# | {+href=\"/manual/manual.html#jami\">doc</a>)</small>+}
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data.  <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"<b>GNU Ring</b> ist ein Programm für die universelle Kommunikation, das die "
+"Freiheiten und die Privatsphäre der Nutzer respektiert. Ring verwendet "
+"verteilte Hash-Tabellen für den Aufbau der Kommunikation. Dies vermeidet die 
"
+"Aufbewahrung zentraler Register von Nutzern und die Speicherung "
+"personenbezogener Daten. <small>(<a href=\"/manual/#ring\">Handbuch</a>)</"
+"small>"
+
+#. type: Content of: <h4>
 msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 msgstr "<a href=\"/software/java-getopt/\">Java-Getopt</a>"
 
@@ -5924,25 +5961,6 @@
 "a>)</small>"
 
 #. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"<b>GNU Ring</b> ist ein Programm für die universelle Kommunikation, das die "
-"Freiheiten und die Privatsphäre der Nutzer respektiert. Ring verwendet "
-"verteilte Hash-Tabellen für den Aufbau der Kommunikation. Dies vermeidet die 
"
-"Aufbewahrung zentraler Register von Nutzern und die Speicherung "
-"personenbezogener Daten. <small>(<a href=\"/manual/#ring\">Handbuch</a>)</"
-"small>"
-
-#. type: Content of: <h4>
 msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
 msgstr "<a href=\"/software/rottlog/\">Rot[t]log</a>"
 
@@ -7119,6 +7137,9 @@
 "ähnlich der Standard-Emacs-Konfiguration, hat aber ein viel einfacheren "
 "Funktionsumfang. <small>(<a href=\"/manual/#zile\">Handbuch</a>)</small>"
 
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
 #~ msgid ""
 #~ "GNU gleem is a library for Java and C++ offering a set of 3D widgets that "
 #~ "support direct user interaction with a 3D scene.  These widgets are used "

Index: server/po/home-pkgblurbs.fr.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.fr.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- server/po/home-pkgblurbs.fr.po      12 Nov 2018 08:46:32 -0000      1.160
+++ server/po/home-pkgblurbs.fr.po      11 Apr 2019 07:00:38 -0000      1.161
@@ -9,7 +9,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-11-11 17:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2018-11-12 09:43+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -17,6 +17,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -4165,6 +4166,41 @@
 "(<a href=\"/manual/manual.html#jacal\">doc</a>)</small>"
 
 #. type: Content of: <h4>
+# | <a [-href=\"/software/gama/\">Gama</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+# | [-Ring-]{+Jami+} is a program for universal communication which respects
+# | freedoms and privacy of its users. [-Ring-] {+Jami+} uses distributed hash
+# | tables for establishing communication. This avoids keeping centralized
+# | registries of users and storing personal data.  <small>(<a
+# | [-href=\"/manual/manual.html#ring\">doc</a>)</small>-]
+# | {+href=\"/manual/manual.html#jami\">doc</a>)</small>+}
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data.  <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ring est un logiciel de communication universelle qui respecte les libertés "
+"et la vie privée de ses utilisateurs. Il utilise des tables de hachage "
+"distribuées pour établir la communication. Cela évite les registres "
+"centralisés d'utilisateurs et le stockage des données personnelles. <small>"
+"(<a href=\"/manual/manual.html#ring\">doc</a>)</small>"
+
+#. type: Content of: <h4>
 msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 
@@ -5976,24 +6012,6 @@
 "\">doc</a>)</small>"
 
 #. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ring est un logiciel de communication universelle qui respecte les libertés "
-"et la vie privée de ses utilisateurs. Il utilise des tables de hachage "
-"distribuées pour établir la communication. Cela évite les registres "
-"centralisés d'utilisateurs et le stockage des données personnelles. <small>"
-"(<a href=\"/manual/manual.html#ring\">doc</a>)</small>"
-
-#. type: Content of: <h4>
 msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
 msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
 
@@ -7176,3 +7194,6 @@
 "GNU Zile est un clone léger d'Emacs. Il s'utilise comme la configuration par 
"
 "défaut d'Emacs mais possède un moindre choix de fonctionnalités.  
<small>(<a "
 "href=\"/manual/manual.html#zile\">doc</a>)</small>"
+
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"

Index: server/po/home-pkgblurbs.ja.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.ja.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- server/po/home-pkgblurbs.ja.po      11 Nov 2018 18:00:25 -0000      1.200
+++ server/po/home-pkgblurbs.ja.po      11 Apr 2019 07:00:38 -0000      1.201
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-11-11 17:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2016-11-18 11:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3891,6 +3891,32 @@
 "manual/manual.html#jacal\">ドキュメント</a>)</small>"
 
 #. type: Content of: <h4>
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data.  <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ringはユーザの自由とプライバシを尊重する普遍的な通信のプログラãƒ
 ã§ã™ã€‚Ringは"
+"通信を確立するために分散ハッシュテーブルを用います。これで、中心的なユーザの"
+"レジストリを保持し、個人データを保管することを避けます。<small>(<a
 href=\"/"
+"manual/manual.html#ring\">ドキュメント</a>)</small>"
+
+#. type: Content of: <h4>
 msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 
@@ -5590,23 +5616,6 @@
 "ト</a>)</small>"
 
 #. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ringはユーザの自由とプライバシを尊重する普遍的な通信のプログラãƒ
 ã§ã™ã€‚Ringは"
-"通信を確立するために分散ハッシュテーブルを用います。これで、中心的なユーザの"
-"レジストリを保持し、個人データを保管することを避けます。<small>(<a
 href=\"/"
-"manual/manual.html#ring\">ドキュメント</a>)</small>"
-
-#. type: Content of: <h4>
 msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
 msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
 
@@ -6721,6 +6730,9 @@
 "と同様の使い方ができますが機能はだ
いぶ軽いものです。<small>(<a href=\"/"
 "manual/manual.html#zile\">ドキュメント</a>)</small>"
 
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
 #~ msgid ""
 #~ "See <a href=\"#sipwitch\">sipwitch</a>.  <small>(<a href=\"/manual/manual."
 #~ "html#gnucomm\">doc</a>)</small>"

Index: server/po/home-pkgblurbs.pot.opt
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.pot.opt,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- server/po/home-pkgblurbs.pot.opt    10 Dec 2018 11:59:56 -0000      1.64
+++ server/po/home-pkgblurbs.pot.opt    11 Apr 2019 07:00:38 -0000      1.65
@@ -7,13 +7,13 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
 "Language: \n"
 "MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
 "Content-Transfer-Encoding: 8bit\n"
 
 #. type: Attribute 'alt' of: <h4><img>
@@ -2944,6 +2944,19 @@
 msgstr ""
 
 #. type: Content of: <h4>
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data.  <small>(<a "
+"href=\"/manual/manual.html#jami\">doc</a>)</small>"
+msgstr ""
+
+#. type: Content of: <h4>
 msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 msgstr ""
 
@@ -4230,19 +4243,6 @@
 msgstr ""
 
 #. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data.  <small>(<a "
-"href=\"/manual/manual.html#ring\">doc</a>)</small>"
-msgstr ""
-
-#. type: Content of: <h4>
 msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
 msgstr ""
 

Index: server/po/home-pkgblurbs.pt-br.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.pt-br.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- server/po/home-pkgblurbs.pt-br.po   26 Dec 2018 10:03:28 -0000      1.15
+++ server/po/home-pkgblurbs.pt-br.po   11 Apr 2019 07:00:38 -0000      1.16
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2018-12-13 07:23-0200\n"
 "Last-Translator: André N Batista <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -4032,6 +4033,33 @@
 "html#jacal\">doc</a>)</small>"
 
 #. type: Content of: <h4>
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data.  <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ring é um programa de comunicação universal que respeita as liberdades e a 
"
+"privacidade de seus usuários. Ring usa tabelas de hash distribuídas para "
+"estabelecer comunicação. Isso evita manter registros centralizados de "
+"usuários e armazenar dados pessoais.  <small>(<a href=\"/manual/manual."
+"html#ring\">doc</a>)</small>"
+
+#. type: Content of: <h4>
 msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 
@@ -5798,24 +5826,6 @@
 "<small>(<a href=\"/manual/manual.html#remotecontrol\">doc</a>)</small>"
 
 #. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ring é um programa de comunicação universal que respeita as liberdades e a 
"
-"privacidade de seus usuários. Ring usa tabelas de hash distribuídas para "
-"estabelecer comunicação. Isso evita manter registros centralizados de "
-"usuários e armazenar dados pessoais.  <small>(<a href=\"/manual/manual."
-"html#ring\">doc</a>)</small>"
-
-#. type: Content of: <h4>
 msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
 msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
 
@@ -6968,6 +6978,9 @@
 "padrão do Emacs, mas carrega um conjunto de recursos muito mais leve.  "
 "<small>(<a href=\"/manual/manual.html#zile\">doc</a>)</small>"
 
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
 #~ msgid ""
 #~ "See <a href=\"#sipwitch\">sipwitch</a>.  <small>(<a href=\"/manual/manual."
 #~ "html#gnucomm\">doc</a>)</small>"

Index: server/po/home-pkgblurbs.ru.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.ru.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- server/po/home-pkgblurbs.ru.po      29 Jan 2019 09:01:20 -0000      1.207
+++ server/po/home-pkgblurbs.ru.po      11 Apr 2019 07:00:38 -0000      1.208
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
 "PO-Revision-Date: 2019-01-29 17:34+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
 
 #. type: Attribute 'alt' of: <h4><img>
 msgid "logo for 3dldf"
@@ -4038,6 +4039,41 @@
 "manual.html#jacal\">док</a>)</small>"
 
 #. type: Content of: <h4>
+# | <a [-href=\"/software/gama/\">Gama</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+# | [-Ring-]{+Jami+} is a program for universal communication which respects
+# | freedoms and privacy of its users. [-Ring-] {+Jami+} uses distributed hash
+# | tables for establishing communication. This avoids keeping centralized
+# | registries of users and storing personal data.  <small>(<a
+# | [-href=\"/manual/manual.html#ring\">doc</a>)</small>-]
+# | {+href=\"/manual/manual.html#jami\">doc</a>)</small>+}
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data.  <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ring&nbsp;&mdash; универсальная программа для 
связи, уважающая свободу и "
+"неприкосновенность личной жизни 
пользователей. Ring устанавливает связь с "
+"помощью распределенных таблиц хешей. Это 
позволяет избежать централизованной "
+"регистрации пользователей и хранения их 
персональных данных. <small>(<a href="
+"\"/manual/manual.html#ring\">док</a>)</small>"
+
+#. type: Content of: <h4>
 msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
 
@@ -5792,24 +5828,6 @@
 "\">док</a>)</small>"
 
 #. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data.  <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ring&nbsp;&mdash; универсальная программа для 
связи, уважающая свободу и "
-"неприкосновенность личной жизни 
пользователей. Ring устанавливает связь с "
-"помощью распределенных таблиц хешей. Это 
позволяет избежать централизованной "
-"регистрации пользователей и хранения их 
персональных данных. <small>(<a href="
-"\"/manual/manual.html#ring\">док</a>)</small>"
-
-#. type: Content of: <h4>
 msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
 msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
 
@@ -6973,6 +6991,9 @@
 "пользуются примерно как Emacs в исходной 
конфигурации, но в Zile гораздо "
 "меньше функций. <small>(<a 
href=\"/manual/manual.html#zile\">док</a>)</small>"
 
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
 #~ msgid ""
 #~ "GNU gleem is a library for Java and C++ offering a set of 3D widgets that "
 #~ "support direct user interaction with a 3D scene.  These widgets are used "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]