www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Thu, 18 Apr 2019 04:00:06 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/04/18 04:00:05

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-google.de-diff.html 
                         malware-google.de.po malware-google.es.po 
                         malware-google.fr.po malware-google.pot 
                         malware-google.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.276&r2=1.277
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.407&r2=1.408
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.289&r2=1.290
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.262&r2=1.263
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.210&r2=1.211
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.503&r2=1.504
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.68&r2=1.69

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- de.po       17 Apr 2019 10:00:16 -0000      1.68
+++ de.po       18 Apr 2019 08:00:02 -0000      1.69
@@ -5391,6 +5391,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- es.po       17 Apr 2019 14:31:38 -0000      1.92
+++ es.po       18 Apr 2019 08:00:02 -0000      1.93
@@ -4034,6 +4034,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- fr.po       17 Apr 2019 10:46:13 -0000      1.120
+++ fr.po       18 Apr 2019 08:00:02 -0000      1.121
@@ -4373,6 +4373,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- it.po       17 Apr 2019 10:00:16 -0000      1.68
+++ it.po       18 Apr 2019 08:00:02 -0000      1.69
@@ -5049,6 +5049,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- ja.po       17 Apr 2019 10:00:17 -0000      1.68
+++ ja.po       18 Apr 2019 08:00:02 -0000      1.69
@@ -4351,6 +4351,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-google.de-diff.html 26 Mar 2019 10:33:48 -0000      1.23
+++ malware-google.de-diff.html 18 Apr 2019 08:00:02 -0000      1.24
@@ -313,28 +313,36 @@
 
 &lt;h3 id="surveillance"&gt;Google Surveillance&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of</em></ins></span> Android <span 
class="removed"><del><strong>apps is pervasive</strong></del></span> <span 
class="inserted"><ins><em>phones,</em></ins></span> and sometimes <span 
class="removed"><del><strong>very clever. Some trackers 
can</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902040"&gt;
     &lt;p&gt;Google invites people to &lt;a
     
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss"&gt;
-    let Google monitor their phone use, and all internet use</em></ins></span> 
in <span class="removed"><del><strong>popular Android 
apps</strong></del></span> <span class="inserted"><ins><em>their
+    let Google monitor their phone use, and all internet use in their
     homes, for an extravagant payment of $20&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>not a malicious functionality of a program with some 
other
-    purpose; this is the software's sole purpose,</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow</strong></del></span> <span class="inserted"><ins><em>Google says 
so. But
-    Google says it in</em></ins></span> a <span class="inserted"><ins><em>way 
that encourages most people to ignore the
+    &lt;p&gt;This is not</em></ins></span> a <span 
class="removed"><del><strong>user's movements around</strong></del></span> 
<span class="inserted"><ins><em>malicious functionality of</em></ins></span> a 
<span class="removed"><del><strong>physical store</strong></del></span> <span 
class="inserted"><ins><em>program with some other
+    purpose; this is the software's sole purpose, and Google says so. But
+    Google says it in a way that encourages most people to ignore the
     details. That, we believe, makes it fitting to list here.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
     &lt;p&gt;Some Google apps on Android &lt;a
     
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the</em></ins></span> user's <span 
class="removed"><del><strong>movements around a physical 
store</strong></del></span> <span class="inserted"><ins><em>location even when 
users disable &ldquo;location
+    record the user's location even when users disable &ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;There are other ways to turn off the other kinds of location
@@ -379,12 +387,10 @@
   &lt;li id="M201609210"&gt;
     &lt;p&gt;Google's new voice messaging app &lt;a
     
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    all conversations&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609140"&gt;
+  &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
     tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
@@ -393,10 +399,12 @@
     disable Google Play itself to completely stop the tracking.  This is
     yet another example of nonfree software pretending to obey the user,
     when it's actually doing something else.  Such a thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+    unthinkable with free software.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201507280"&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507280"&gt;
     &lt;p&gt;Google Chrome makes it easy for an extension to do &lt;a
     
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/"&gt;total
     snooping on the user's browsing&lt;/a&gt;, and many of them do 
so.&lt;/p&gt;
@@ -599,7 +607,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/26 10:33:48 $
+$Date: 2019/04/18 08:00:02 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-google.de.po        26 Mar 2019 10:33:48 -0000      1.38
+++ malware-google.de.po        18 Apr 2019 08:00:02 -0000      1.39
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2018-05-07 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -631,6 +631,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-google.es.po        26 Mar 2019 12:51:43 -0000      1.5
+++ malware-google.es.po        18 Apr 2019 08:00:02 -0000      1.6
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2019-03-26 13:32+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -482,6 +483,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- malware-google.fr.po        31 Mar 2019 11:07:09 -0000      1.62
+++ malware-google.fr.po        18 Apr 2019 08:00:03 -0000      1.63
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2019-03-31 13:02+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -485,6 +486,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-google.pot  26 Mar 2019 10:33:48 -0000      1.34
+++ malware-google.pot  18 Apr 2019 08:00:03 -0000      1.35
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -345,6 +345,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a "
 
"href=\"https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss\";>
 "
 "let Google monitor their phone use, and all internet use in their homes, for "

Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- malware-google.ru.po        26 Mar 2019 18:00:34 -0000      1.81
+++ malware-google.ru.po        18 Apr 2019 08:00:03 -0000      1.82
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-03-26 10:26+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2018-10-05 09:03+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -482,6 +483,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- nl.po       17 Apr 2019 10:00:17 -0000      1.68
+++ nl.po       18 Apr 2019 08:00:03 -0000      1.69
@@ -3583,6 +3583,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- pl.po       17 Apr 2019 10:00:17 -0000      1.68
+++ pl.po       18 Apr 2019 08:00:03 -0000      1.69
@@ -3095,6 +3095,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- pot 17 Apr 2019 10:00:17 -0000      1.68
+++ pot 18 Apr 2019 08:00:03 -0000      1.69
@@ -2931,6 +2931,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-surveillance.de-diff.html       9 Apr 2019 08:00:49 -0000       
1.61
+++ proprietary-surveillance.de-diff.html       18 Apr 2019 08:00:03 -0000      
1.62
@@ -777,6 +777,15 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201812060"&gt;
     &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
     
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
@@ -3361,7 +3370,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 08:00:49 $
+$Date: 2019/04/18 08:00:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.276
retrieving revision 1.277
diff -u -b -r1.276 -r1.277
--- proprietary-surveillance.de.po      9 Apr 2019 08:00:49 -0000       1.276
+++ proprietary-surveillance.de.po      18 Apr 2019 08:00:03 -0000      1.277
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1544,6 +1544,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.407
retrieving revision 1.408
diff -u -b -r1.407 -r1.408
--- proprietary-surveillance.fr.po      9 Apr 2019 17:33:06 -0000       1.407
+++ proprietary-surveillance.fr.po      18 Apr 2019 08:00:03 -0000      1.408
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2019-04-09 19:31+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -1115,6 +1116,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary-surveillance.it-diff.html       9 Apr 2019 08:00:49 -0000       
1.128
+++ proprietary-surveillance.it-diff.html       18 Apr 2019 08:00:03 -0000      
1.129
@@ -871,39 +871,49 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,
+      &lt;a href="http://www.bbc.com/news/uk-34444233"&gt;agencies can take 
over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to 
turn</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks</em></ins></span> the <span 
class="removed"><del><strong>phones
+      on</strong></del></span> <span class="inserted"><ins><em>movements of 
Android phones,</em></ins></span> and <span class="removed"><del><strong>off, 
listen</strong></del></span> <span class="inserted"><ins><em>sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
-      by sending hidden text messages which enable them to 
turn</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what</em></ins></span> the <span class="removed"><del><strong>phones
-      on and</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    what</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
+    &lt;p&gt;Android tracks</em></ins></span> location <span 
class="inserted"><ins><em>for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
-    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
     disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
     <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
       <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
@@ -957,141 +967,91 @@
     &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
       the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="inserted"><ins><em>Android 
that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal</em></ins></span> data <span 
class="removed"><del><strong>on the user's computer, but it does surveillance
+      too:</strong></del></span> <span class="inserted"><ins><em>to 
Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands to personal data 
in</strong></del></span>
+  &lt;li id="M201307250"&gt;
+    &lt;p&gt;A Motorola phone</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give Verizon the same
-   information about the users' searches that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the</strong></del></span>
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers &lt;a
+    
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
+    the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the
-    <span class="removed"><del><strong>user must explicitly opt-in 
before</strong></del></span> <span class="inserted"><ins><em>personal details 
of users that install</em></ins></span> the <span 
class="removed"><del><strong>app takes effect. However,</strong></del></span> 
<span class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Merely asking</em></ins></span> the
-    <span class="removed"><del><strong>app remains spyware&mdash;an 
&ldquo;optional&rdquo; piece</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>spyware</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> is
-    <span class="removed"><del><strong>still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller 
application</strong></del></span> not <span class="removed"><del><strong>only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
 <span class="inserted"><ins><em>enough to
-    legitimize actions like this.  At this point, most users have stopped
-    reading the &ldquo;Terms and Conditions&rdquo; that spell out what
+    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of users is not 
enough</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span>
+    <span class="inserted"><ins><em>legitimize actions like this.  At this 
point, most users have stopped
+    reading</em></ins></span> the <span class="removed"><del><strong>user's 
list</strong></del></span> <span class="inserted"><ins><em>&ldquo;Terms and 
Conditions&rdquo; that spell out what
     they are &ldquo;consenting&rdquo; to.  Google should clearly and
-    honestly identify the information it collects</em></ins></span> on <span 
class="removed"><del><strong>many sorts</strong></del></span> <span 
class="inserted"><ins><em>users, instead</em></ins></span> of <span 
class="removed"><del><strong>data</strong></del></span>
-    <span class="inserted"><ins><em>hiding it</em></ins></span> in <span 
class="removed"><del><strong>the phone,</strong></del></span> <span 
class="inserted"><ins><em>an obscurely worded EULA.&lt;/p&gt;
+    honestly identify the information it collects on users, 
instead</em></ins></span> of <span 
class="removed"><del><strong>other</strong></del></span>
+    <span class="inserted"><ins><em>hiding it in an obscurely worded 
EULA.&lt;/p&gt;
 
-    &lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</em></ins></span>
-    and <span class="inserted"><ins><em>other companies from getting this 
personal information</em></ins></span> in <span 
class="removed"><del><strong>server accounts, it can
-  alter them too&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for</strong></del></span>
-    <span class="inserted"><ins><em>first place!&lt;/p&gt;
+    &lt;p&gt;However, to truly protect</em></ins></span> people's <span 
class="removed"><del><strong>phone
+      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>privacy, we must prevent Google
+    and other companies from getting this personal information in the
+    first place!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201111170"&gt;
     &lt;p&gt;Some manufacturers add a &lt;a
     
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-    hidden general</em></ins></span> surveillance <span 
class="removed"><del><strong>is inadequate</strong></del></span> <span 
class="inserted"><ins><em>package such</em></ins></span> as <span 
class="removed"><del><strong>a protection against massive
-        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Carrier IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    hidden general surveillance package such as Carrier 
IQ&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app &lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Apps that include 
-      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-      Symphony surveillance software snoop on what radio</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInElectronicReaders"&gt;E-Readers&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, 
judging</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201603080"&gt;
-    &lt;p&gt;E-books can contain JavaScript code,</em></ins></span> and <span 
class="removed"><del><strong>TV programs 
-      are playing nearby&lt;/a&gt;.  Also on what users 
post</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;E-books can contain JavaScript code, and &lt;a
     
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;
-    sometimes this code snoops</em></ins></span> on <span 
class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>readers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    sometimes this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201410080"&gt;
+  &lt;li id="M201410080"&gt;
     &lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo;
-    the e-reader used by most US libraries,</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-      and suggests you</strong></del></span>
+    the e-reader used</em></ins></span> by <span 
class="inserted"><ins><em>most US libraries,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands to personal</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-    send lots of data</em></ins></span> to <span 
class="removed"><del><strong>share the picture you take 
according</strong></del></span> <span 
class="inserted"><ins><em>Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-    needed</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>check 
DRM!&lt;/p&gt;
+    send lots of</em></ins></span> data <span class="inserted"><ins><em>to 
Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+    needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201212030"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span class="inserted"><ins><em>many 
e-readers&mdash;not only</em></ins></span> the <span 
class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;This spyware feature seems to require online access to some
-      known-faces database, which means the pictures are likely to be
-      sent across the wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
+  &lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span> <span 
class="inserted"><ins><em>Kindle:</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some of its phones. The app will give Verizon the same
+   information about the users' searches that Google normally gets 
when</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;</em></ins></span>
 they <span class="removed"><del><strong>use its search engine.&lt;/p&gt;
 
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle: 
&lt;a
-    href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt; they
-    report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+   &lt;p&gt;Currently, the app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;, and</strong></del></span>
+    <span class="inserted"><ins><em>report even which page</em></ins></span> 
the user <span class="removed"><del><strong>must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>reads at what 
time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1109,43 +1069,32 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span>
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user data</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information</em></ins></span> to <span 
class="removed"><del><strong>realize that it</strong></del></span> <span 
class="inserted"><ins><em>identify who</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows the &lt;a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way
-      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
-      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result</em></ins></span> is
-    <span class="inserted"><ins><em>often</em></ins></span> a <span 
class="removed"><del><strong>typical example</strong></del></span> <span 
class="inserted"><ins><em>legal threat demanding a lot</em></ins></span> of
-      <span class="removed"><del><strong>the attitude</strong></del></span> 
<span class="inserted"><ins><em>money.&lt;/p&gt;
+    reports information</em></ins></span> to <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
+    often</em></ins></span> a <span class="removed"><del><strong>Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;The fact that this is used for repression</em></ins></span> of 
<span class="removed"><del><strong>the proprietary</strong></del></span> <span 
class="inserted"><ins><em>forbidden sharing
-    makes it even more vicious.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
+  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>legal 
threat demanding a lot</em></ins></span> of <span 
class="removed"><del><strong>data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>money.&lt;/p&gt;
 
-    &lt;p&gt;This illustrates that making unauthorized copies of 
nonfree</em></ins></span> software <span class="removed"><del><strong>industry 
towards
-      those they have subjugated.&lt;/p&gt;
+    &lt;p&gt;The fact that this is used for repression of forbidden sharing
+    makes</em></ins></span> it <span class="removed"><del><strong>can
+  alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps for mobile devices report which 
other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    is <span class="removed"><del><strong>doing this in</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>way that at least is visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>cure for</em></ins></span> the <span 
class="removed"><del><strong>others do.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after the 
ride&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>even more vicious.&lt;/p&gt;</em></ins></span>
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps</strong></del></span> <span 
class="inserted"><ins><em>injustice of nonfree software. It may avoid
-    paying</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This <span 
class="removed"><del><strong>example</strong></del></span> illustrates <span 
class="removed"><del><strong>how &ldquo;getting the user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>that making unauthorized copies of nonfree 
software</em></ins></span>
+    is <span class="removed"><del><strong>inadequate as</strong></del></span> 
<span class="inserted"><ins><em>not</em></ins></span> a <span 
class="removed"><del><strong>protection against massive
+        surveillance.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>cure for the injustice of nonfree software. It may 
avoid
+    paying for the nasty thing, but cannot make it less 
nasty.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Google's new voice 
messaging app</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 &lt;div class="big-subsection"&gt;
@@ -1155,273 +1104,315 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+    &lt;p&gt;Many Android phones come with a huge number of</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Apps</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree</em></ins></span> apps <span 
class="removed"><del><strong>snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>that have 
access</em></ins></span> to <span class="inserted"><ins><em>sensitive data 
without
+    preinstalled nonfree apps</em></ins></span> that <span 
class="removed"><del><strong>include 
+      &lt;a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+      Symphony surveillance software snoop on what radio and TV programs 
+      are playing nearby&lt;/a&gt;.  Also on what users post on various sites 
+      such as Facebook, Google+ and Twitter.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
+      &lt;a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you to share the picture you take 
according</strong></del></span> <span class="inserted"><ins><em>have 
access</em></ins></span> to <span class="removed"><del><strong>who
+      is in</strong></del></span> <span class="inserted"><ins><em>sensitive 
data without
     users' knowledge&lt;/a&gt;. These hidden apps may either call home 
with</em></ins></span>
-    the <span class="removed"><del><strong>snooping done 
by</strong></del></span> <span class="inserted"><ins><em>data, or pass it on to 
user-installed apps that have access to</em></ins></span>
-    the <span class="removed"><del><strong>phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>network but no direct 
access to</em></ins></span> the <span 
class="removed"><del><strong>OS</strong></del></span> <span 
class="inserted"><ins><em>data. This results</em></ins></span> in <span 
class="inserted"><ins><em>massive
-    surveillance on which</em></ins></span> the
-      <span class="removed"><del><strong>phone.&lt;/p&gt;
+    the <span class="removed"><del><strong>frame.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by the question of whether the app 
developers get
-      users to say &ldquo;I agree&rdquo;. That is</strong></del></span> <span 
class="inserted"><ins><em>user has absolutely</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>control.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+      &lt;p&gt;This spyware feature seems</strong></del></span> <span 
class="inserted"><ins><em>data, or pass it on</em></ins></span> to <span 
class="removed"><del><strong>require online</strong></del></span> <span 
class="inserted"><ins><em>user-installed apps that have</em></ins></span> 
access to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span>
+    the <span class="removed"><del><strong>pictures are 
likely</strong></del></span> <span class="inserted"><ins><em>network but no 
direct access</em></ins></span> to <span class="removed"><del><strong>be
+      sent across</strong></del></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>data. This results in massive
+    surveillance on which</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>has absolutely no control.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201903201"&gt;
-    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 of 
them</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-      sends user data, including geolocation, for</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
-    send sensitive personal data to third parties&lt;/a&gt;, which 
can</em></ins></span> use <span class="removed"><del><strong>by 
companies.&lt;/a&gt;&lt;/p&gt;
+  &lt;li id="M201903201"&gt;
+    &lt;p&gt;A study of 24 &ldquo;health&rdquo; apps found that 19 
of</em></ins></span> them <span class="inserted"><ins><em>&lt;a
+    
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows"&gt;
+    send sensitive personal data</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;p&gt;The FTC criticized this app because</strong></del></span> it 
<span class="removed"><del><strong>asked the</strong></del></span>
-    <span class="inserted"><ins><em>for invasive advertising or discriminating 
against people in poor
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;, which can use it
+    for invasive advertising or discriminating against people in poor
     medical condition.&lt;/p&gt;
 
-    &lt;p&gt;Whenever</em></ins></span> user <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; is sought, it is buried in
-    lengthy terms of service that are difficult</em></ins></span> to
-      <span class="removed"><del><strong>approve sending</strong></del></span> 
<span class="inserted"><ins><em>understand. In any case,
-    &ldquo;consent&rdquo; is not sufficient to legitimize snooping.&lt;/p&gt;
+    &lt;p&gt;Whenever user &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
+      2015</strong></del></span> <span 
class="inserted"><ins><em>sought,</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit to increased snooping&lt;/a&gt;, and 
some</strong></del></span> <span class="inserted"><ins><em>is buried in
+    lengthy terms of service that</em></ins></span> are <span 
class="removed"><del><strong>starting</strong></del></span> <span 
class="inserted"><ins><em>difficult</em></ins></span> to <span 
class="removed"><del><strong>realize that it</strong></del></span> <span 
class="inserted"><ins><em>understand. In any case,
+    &ldquo;consent&rdquo;</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows the</strong></del></span> <span 
class="inserted"><ins><em>not sufficient to legitimize snooping.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library for building mobile apps, which also &lt;a
-    href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent</em></ins></span> personal data to <span 
class="removed"><del><strong>the app developer but did</strong></del></span> 
<span class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots of companies built 
apps that
-    way and released them, apparently</em></ins></span> not
-      <span class="removed"><del><strong>ask about sending 
it</strong></del></span> <span class="inserted"><ins><em>realizing that all the 
personal
-    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>other companies.  This</strong></del></span> <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It</em></ins></span> shows <span class="inserted"><ins><em>that 
no one can trust a nonfree program, not even</em></ins></span> the
-      <span class="removed"><del><strong>weakness</strong></del></span>
-    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo; to surveillance: why should a flashlight
-      app send any information to anyone?  A free software flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
+    library for building mobile apps, which also</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+      twisted ways</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
+    sent personal data to Facebook&lt;/a&gt;. Lots of companies built 
apps</em></ins></span> that <span class="removed"><del><strong>they present 
snooping as a</strong></del></span>
+    way
+      <span class="removed"><del><strong>to &ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
+      whether</strong></del></span> <span class="inserted"><ins><em>and 
released them, apparently not realizing that all the personal
+    data</em></ins></span> they <span class="removed"><del><strong>want that. 
This is</strong></del></span> <span class="inserted"><ins><em>collected would 
go to Facebook as well.&lt;/p&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span>
+    &lt;p&gt;It shows that no one can trust</em></ins></span> a <span 
class="removed"><del><strong>typical example of</strong></del></span> <span 
class="inserted"><ins><em>nonfree program, not even</em></ins></span> the <span 
class="removed"><del><strong>attitude</strong></del></span>
+    <span class="inserted"><ins><em>developers</em></ins></span> of <span 
class="removed"><del><strong>the proprietary software industry towards
+      those they have subjugated.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
-    &lt;p&gt;The AppCensus database gives information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span class="inserted"><ins><em>href="https://www.appcensus.mobi"&gt; how 
Android apps use</em></ins></span> and <span class="removed"><del><strong>then 
sends</strong></del></span>
-    <span class="inserted"><ins><em>misuse users'</em></ins></span> personal 
<span class="removed"><del><strong>data about them to
-      nVidia servers&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Many 
proprietary</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Angry Birds</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt;. As of March 2019, nearly
-    78,000 have been analyzed, of which 24,000 (31%) transmit 
the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201902140"&gt;
+    &lt;p&gt;The AppCensus database gives information on &lt;a
+    href="https://www.appcensus.mobi"&gt; how Android</em></ins></span> apps 
<span class="removed"><del><strong>for mobile devices 
report</strong></del></span> <span class="inserted"><ins><em>use and
+    misuse users' personal data&lt;/a&gt;. As of March 2019, nearly
+    78,000 have been analyzed, of</em></ins></span> which <span 
class="removed"><del><strong>other
+    apps</strong></del></span> <span class="inserted"><ins><em>24,000 (31%) 
transmit</em></ins></span> the <span class="removed"><del><strong>user has
+    installed.</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
-    Advertising ID&lt;/a&gt; to other</em></ins></span> companies, and <span 
class="inserted"><ins><em>&lt;a
+    Advertising ID&lt;/a&gt; to other companies, and &lt;a
     href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of</em></ins></span> the <span 
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span 
class="removed"><del><strong>spy through</strong></del></span> <span 
class="inserted"><ins><em>hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+    18,000 (23% of the total) link</em></ins></span> this <span 
class="removed"><del><strong>in a way</strong></del></span> <span 
class="inserted"><ins><em>ID to hardware identifiers&lt;/a&gt;,
+    so</em></ins></span> that <span class="removed"><del><strong>at 
least</strong></del></span> <span class="inserted"><ins><em>users cannot escape 
tracking by resetting it.&lt;/p&gt;
 
-    &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
-      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Collecting hardware identifiers</em></ins></span> is <span 
class="removed"><del><strong>visible and
+    optional&lt;/a&gt;. Not as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInToys"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
-    and, once informed, was</em></ins></span> in <span 
class="removed"><del><strong>Toys&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
-      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>no 
hurry</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>take action. This proves
-    that</em></ins></span> the <span class="removed"><del><strong>toys 
with</strong></del></span> <span class="inserted"><ins><em>policies 
of</em></ins></span> a <span class="removed"><del><strong>mobile phone. This 
would
-      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
-    preventing nonfree software developers from including 
malware</em></ins></span> in <span 
class="removed"><del><strong>on</strong></del></span>
-    <span class="inserted"><ins><em>their programs.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;FTC says most mobile</strong></del></span> <span 
class="inserted"><ins><em>in apparent violation of
+    Google's policies. But it seems that Google wasn't aware of it,
+    and, once informed, was in no hurry to take action. This proves
+    that the policies of a development platform are ineffective at
+    preventing nonfree software developers from including malware in
+    their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have</em></ins></span> a <span 
class="removed"><del><strong>child's speech, and even speak
-      into</strong></del></span> <span class="inserted"><ins><em>surveillance 
feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting with 
the app.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Many nonfree</em></ins></span> apps <span 
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for 
<span class="removed"><del><strong>children don't respect 
privacy:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be</em></ins></span> on <span class="removed"><del><strong>its users 
through the proprietary control app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting the temperature</strong></del></span> <span 
class="inserted"><ins><em>Google Play had one or more malicious 
functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead</em></ins></span> of <span 
class="inserted"><ins><em>&ldquo;beautifying&rdquo; them,
-    pushing unwanted and often malicious ads on users, and redirecting
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps 
that</em></ins></span> used <span class="inserted"><ins><em>to
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads</em></ins></span> on <span 
class="inserted"><ins><em>users, and redirecting
     them to phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether it</strong></del></span> <span 
class="inserted"><ins><em>user interface of most of them</em></ins></span> was 
<span class="removed"><del><strong>surrounded by</strong></del></span> <span 
class="inserted"><ins><em>designed to make uninstallation
+    the <span class="removed"><del><strong>user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>user interface of 
most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>person's
-      body), as well as the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
-    there is no easy way of knowing what they really do.&lt;/p&gt;
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    there</em></ins></span> is <span class="inserted"><ins><em>no easy way of 
knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902010"&gt;
-    &lt;p&gt;An investigation of</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements 
about</strong></del></span> <span class="inserted"><ins><em>150 most popular
-    gratis VPN apps in Google Play found that &lt;a
+    &lt;p&gt;An investigation of the 150 most popular
+    gratis VPN apps</em></ins></span> in <span 
class="removed"><del><strong>addition</strong></del></span> <span 
class="inserted"><ins><em>Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect</em></ins></span> their <span 
class="removed"><del><strong>products, rather than free software which 
users</strong></del></span> <span class="inserted"><ins><em>users’ 
privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
-    source code&mdash;often used for invasive 
advertising&mdash;that</em></ins></span> could <span 
class="removed"><del><strong>have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span>
-    <span class="inserted"><ins><em>potentially also be used to spy on users. 
Other technical flaws were
+    25% fail</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="removed"><del><strong>the
+      phone.&lt;/p&gt;
+
+      &lt;p&gt;Don't</strong></del></span> <span 
class="inserted"><ins><em>their
+    source code&mdash;often used for invasive advertising&mdash;that could
+    potentially also</em></ins></span> be <span 
class="removed"><del><strong>distracted by the question</strong></del></span> 
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
-    &lt;p&gt;Moreover, a previous investigation had found</em></ins></span> 
that <span class="removed"><del><strong>made the vibrator</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>personal 
information</strong></del></span>
-    <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy 
privacy policies&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;It is unfortunate that these articles talk</em></ins></span> 
about <span class="removed"><del><strong>how
-       people used it&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;free
-    apps.&rdquo; These apps are gratis, but they are &lt;em&gt;not&lt;/em&gt; 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Moreover, a previous investigation had found that &lt;a
+    
href="https://www.top10vpn.com/free-vpn-app-investigation/"&gt;half</em></ins></span>
 of <span class="removed"><del><strong>whether</strong></del></span>
+    the <span class="removed"><del><strong>app developers get
+      users to say &ldquo;I agree&rdquo;. That</strong></del></span> <span 
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy 
policies&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>no 
excuse for malware.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that these articles talk about &ldquo;free
+    apps.&rdquo; These apps are gratis, but they are 
&lt;em&gt;not&lt;/em&gt;</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+      sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201901050"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="inserted"><ins><em>Weather Channel app &lt;a
+    &lt;p&gt;The <span class="removed"><del><strong>FTC criticized 
this</strong></del></span> <span class="inserted"><ins><em>Weather 
Channel</em></ins></span> app <span class="removed"><del><strong>because it 
asked the user to
+      approve sending personal data</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"&gt;
-    stored users' locations to the</em></ins></span> company's <span 
class="removed"><del><strong>statement</strong></del></span> <span 
class="inserted"><ins><em>server&lt;/a&gt;. The company is
-    being sued, demanding</em></ins></span> that it <span 
class="removed"><del><strong>was anonymizing</strong></del></span> <span 
class="inserted"><ins><em>notify</em></ins></span> the <span 
class="removed"><del><strong>data may be
-      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>users of what</em></ins></span> it <span 
class="removed"><del><strong>had sold</strong></del></span> <span 
class="inserted"><ins><em>will do
-    with</em></ins></span> the <span class="removed"><del><strong>data 
to</strong></del></span> <span class="inserted"><ins><em>data.&lt;/p&gt;
-
-    &lt;p&gt;I think that lawsuit is about</em></ins></span> a
-      <span class="removed"><del><strong>data broker,</strong></del></span> 
<span class="inserted"><ins><em>side issue. What the company does
-    with</em></ins></span> the data <span class="removed"><del><strong>broker 
would have been able to figure out
-      who</strong></del></span> <span class="inserted"><ins><em>is a secondary 
issue. The principal wrong here is that</em></ins></span>
-    the <span class="removed"><del><strong>user was.&lt;/p&gt;
+    stored users' locations</em></ins></span> to the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending it to other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>company's 
server&lt;/a&gt;. The company is
+    being sued, demanding that it notify</em></ins></span> the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> of <span 
class="inserted"><ins><em>what it will do
+    with</em></ins></span> the <span 
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
<span class="inserted"><ins><em>data.&lt;/p&gt;
+
+    &lt;p&gt;I think that lawsuit is about</em></ins></span> a <span 
class="removed"><del><strong>flashlight
+      app send any information to anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
     
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>company gets that data at all.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware in Games&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal</strong></del></span> 
<span class="inserted"><ins><em>side issue. What the company does
+    with the</em></ins></span> data <span class="removed"><del><strong>about 
them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>is a secondary issue. The principal wrong here is that
+    the company gets that data at all.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps"&gt;
     Other weather apps&lt;/a&gt;, including Accuweather and WeatherBug, are
-    tracking people's locations.&lt;/p&gt; 
+    tracking people's locations.&lt;/p&gt;</em></ins></span> 
   &lt;/li&gt;
 
-  &lt;li id="M201812290"&gt;
-    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry 
Birds</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201812290"&gt;
+    &lt;p&gt;Around 40% of gratis Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies for companies, and</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report"&gt;
-    report on</em></ins></span> the <span class="removed"><del><strong>company 
has been ordered</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span class="removed"><del><strong>pay a 
total</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
+    report on</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>user's 
actions</em></ins></span> to <span class="removed"><del><strong>spy 
through</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Often they send the machine's &ldquo;advertising ID,&rdquo; so 
that
-    Facebook can correlate the data it obtains from the same machine via
-    various apps. Some</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them send Facebook detailed information about
-    the user's activities in the app; others only say that the user is
+    Facebook can correlate the data</em></ins></span> it <span 
class="removed"><del><strong>too&lt;/a&gt;.
+      Here's</strong></del></span> <span class="inserted"><ins><em>obtains 
from the same machine via
+    various apps. Some of them send Facebook detailed</em></ins></span> 
information <span class="removed"><del><strong>on
+      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
+      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
+      More</strong></del></span> about <span class="removed"><del><strong>NSA 
app spying&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Spyware in Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
+      a speech recognition company based</strong></del></span>
+    <span class="inserted"><ins><em>the user's activities</em></ins></span> in 
the <span class="removed"><del><strong>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span 
class="removed"><del><strong>toys with a mobile phone. This would
+      enable crackers to listen in on a child's speech, and even speak
+      into</strong></del></span> <span class="inserted"><ins><em>user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    &lt;p&gt;This spying occurs regardless of whether</em></ins></span> the 
<span class="removed"><del><strong>toys 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>user has a Facebook
     account.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201810244"&gt;
-    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    &lt;p&gt;Some Android apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
-    track</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>phones of users 
that have deleted them&lt;/a&gt;.&lt;/p&gt;
+    track</em></ins></span> the <span 
class="removed"><del><strong>temperature</strong></del></span> <span 
class="inserted"><ins><em>phones</em></ins></span> of <span 
class="removed"><del><strong>the vibrator minute by
+      minute (thus, indirectly, whether it was surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note the totally inadequate proposed response: a labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free software which</strong></del></span> 
users <span class="removed"><del><strong>could have
+      checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company</strong></del></span> that <span 
class="removed"><del><strong>made the vibrator</strong></del></span> <span 
class="inserted"><ins><em>have deleted them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808030"&gt;
-    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span>
+    &lt;p&gt;Some Google apps on Android</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile"&gt;
-    record the user's location even when users disable &ldquo;location
+    record</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>user's location even when users disable 
&ldquo;location
     tracking&rdquo;&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>turn off</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
-      collected</strong></del></span> <span class="inserted"><ins><em>other 
kinds of location
-    tracking, but most users will be tricked</em></ins></span> by the <span 
class="removed"><del><strong>manufacturer's snooping.&lt;/p&gt;
+    &lt;p&gt;There are other ways</em></ins></span> to <span 
class="removed"><del><strong>a
+      data broker,</strong></del></span> <span class="inserted"><ins><em>turn 
off</em></ins></span> the <span class="removed"><del><strong>data broker would 
have been able to figure out
+      who</strong></del></span> <span class="inserted"><ins><em>other kinds of 
location
+    tracking, but most users will be tricked by</em></ins></span> the <span 
class="removed"><del><strong>user was.&lt;/p&gt;
 
-    &lt;p&gt;That</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>misleading control.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201806110"&gt;
-    &lt;p&gt;The Spanish football streaming app &lt;a
-    
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
-    the <span class="removed"><del><strong>manufacturer</strong></del></span> 
<span class="inserted"><ins><em>user's movements</em></ins></span> and <span 
class="inserted"><ins><em>listens through</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>microphone&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Spanish football streaming app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html"&gt;tracks</em></ins></span>
+    the <span class="removed"><del><strong>company has been 
ordered</strong></del></span> <span class="inserted"><ins><em>user's movements 
and listens through the microphone&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This makes them act as spies for licensing enforcement.&lt;/p&gt;
 
-    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span class="removed"><del><strong>these conversations
-      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
-  
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>save
-    a recording. But I can't be sure from the article.&lt;/p&gt;
+    &lt;p&gt;I expect it implements DRM, too&mdash;that there is no 
way</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>save</em></ins></span>
+    a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>recording. 
But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn</em></ins></span> to <span 
class="removed"><del><strong>its customers.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>care much less about sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
-    and <span class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;
+    of</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers</strong></del></span>
 <span class="inserted"><ins><em>5,855 Android apps studied by researchers 
were</em></ins></span> found <span class="removed"><del><strong>a 
way</strong></del></span> to <span class="removed"><del><strong>access the 
data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="inserted"><ins><em>collect information about its 
users&lt;/a&gt;.  40% of</em></ins></span> the <span 
class="removed"><del><strong>FBI could listen to these conversations
+      was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
+  
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span> <span class="inserted"><ins><em>apps were
+    found</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span 
class="removed"><del><strong>children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
-    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
-    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span class="inserted"><ins><em>these proprietary apps whose
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
@@ -1885,12 +1876,9 @@
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;div style="clear: left;"&gt;&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
@@ -1932,7 +1920,7 @@
     settings unchanged.&lt;/p&gt;
 
     &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter), the easiest way to make sure it isn't spying on you is
+    matter), the easiest way to make</em></ins></span> sure <span 
class="inserted"><ins><em>it isn't spying on you is
     to disconnect it from the Internet, and use a terrestrial antenna
     instead. Unfortunately, this is not always possible. Another option,
     if you are technically oriented, is to get your own router (which can
@@ -2003,10 +1991,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch, and even what they wanted to
     record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2066,22 +2053,13 @@
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
-Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>patch to 
stop this, but any
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    &lt;p&gt;Meanwhile, LG TVs &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2091,64 +2069,93 @@
     Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
-    and use its camera to watch</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch the people who are watching TV.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+&lt;li&gt;&lt;p&gt;</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
+Note</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
-    passes by, the user's front door.&lt;/p&gt;
+    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
+    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
+    at <span class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
-    at the videos freely.  It appears Amazon has tried to prevent that
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows</strong></del></span> <span class="inserted"><ins><em>the videos 
freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span>
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give the manufacturer an unencrypted copy of everything they
-    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    give</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
+  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
+    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them, it suggested that these
-    manufacturers promise not to look at what's in the videos. That's not
+    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
+    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype
+      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span> <span class="inserted"><ins><em>the 
videos. That's not
     security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -3095,7 +3102,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 08:00:49 $
+$Date: 2019/04/18 08:00:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.289
retrieving revision 1.290
diff -u -b -r1.289 -r1.290
--- proprietary-surveillance.it.po      9 Apr 2019 08:00:49 -0000       1.289
+++ proprietary-surveillance.it.po      18 Apr 2019 08:00:03 -0000      1.290
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1499,6 +1499,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary-surveillance.ja-diff.html       9 Apr 2019 08:00:49 -0000       
1.138
+++ proprietary-surveillance.ja-diff.html       18 Apr 2019 08:00:03 -0000      
1.139
@@ -795,39 +795,48 @@
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201812060"&gt;
-    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>Edward Snowden,</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and 
sometimes</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
       by sending hidden text messages which enable them to 
turn</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
-    upload call logs automatically from Android phones&lt;/a&gt; while 
disguising
-    what</em></ins></span> the <span class="removed"><del><strong>phones
-      on and</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves</em></ins></span> the <span class="removed"><del><strong>phones
+      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has</em></ins></span> to <span 
class="inserted"><ins><em>be responsible for sending</em></ins></span>
+    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span 
class="inserted"><ins><em>location</em></ins></span> data <span 
class="inserted"><ins><em>to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201812060"&gt;
+    &lt;p&gt;Facebook's app got &ldquo;consent&rdquo; to &lt;a
+    
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent"&gt;
+    upload call logs automatically</em></ins></span> from <span 
class="inserted"><ins><em>Android phones&lt;/a&gt; while disguising
+    what</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call,</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; was for.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711210"&gt;
-    &lt;p&gt;Android tracks location for Google &lt;a
+    &lt;p&gt;Android tracks</em></ins></span> location <span 
class="inserted"><ins><em>for Google &lt;a
     
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-    even when &ldquo;location services&rdquo; are turned</em></ins></span> 
off, <span class="removed"><del><strong>listen to</strong></del></span> <span 
class="inserted"><ins><em>even when</em></ins></span>
-    the <span class="removed"><del><strong>microphone, retrieve 
geo-location</strong></del></span> <span class="inserted"><ins><em>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;
+    even when &ldquo;location services&rdquo; are turned off, even when
+    the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611150"&gt;
     &lt;p&gt;Some portable phones &lt;a
     
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-    sold with spyware sending lots of</em></ins></span> data <span 
class="removed"><del><strong>from</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+    sold with spyware sending lots of data to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609140"&gt;
     &lt;p&gt;Google Play (a component of Android) &lt;a
     
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks</em></ins></span> the
-      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
-      browsing history,</strong></del></span> <span 
class="inserted"><ins><em>users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
+    &lt;p&gt;Even if you disable Google Maps</em></ins></span> and <span 
class="removed"><del><strong>web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>location tracking, you must
     disable Google Play itself to completely stop</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>tracking.</em></ins></span>  This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span>
     <span class="inserted"><ins><em>yet another example of nonfree software 
pretending</em></ins></span> to
       <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>obey the user,
@@ -881,20 +890,26 @@
     &lt;p&gt;Spyware</em></ins></span> is <span 
class="removed"><del><strong>to restrict
       the</strong></del></span> <span class="inserted"><ins><em>present in 
some Android devices when they are
     sold.  Some Motorola phones, made when this company was owned
-    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="removed"><del><strong>data 
on the user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>Android 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-    sends personal data</em></ins></span> to <span 
class="removed"><del><strong>get the user's list of other 
people's</strong></del></span> <span 
class="inserted"><ins><em>Motorola&lt;/a&gt;.&lt;/p&gt;
+    by Google,</em></ins></span> use <span class="inserted"><ins><em>a 
modified version</em></ins></span> of <span class="inserted"><ins><em>Android 
that &lt;a
+    
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+    sends personal</em></ins></span> data <span 
class="removed"><del><strong>on</strong></del></span> <span 
class="inserted"><ins><em>to Motorola&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201307250"&gt;
-    &lt;p&gt;A Motorola</em></ins></span> phone
-      <span 
class="removed"><del><strong>numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;A Motorola phone &lt;a
     
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-    listens for voice all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    listens for voice all</em></ins></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
+      too:</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+
+  &lt;li id="M201302150"&gt;
+    &lt;p&gt;Google Play intentionally sends app developers</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
+      it tries to get</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>user's list</strong></del></span> 
<span class="inserted"><ins><em>personal details</em></ins></span> of <span 
class="removed"><del><strong>other people's phone
+      numbers.&lt;/a&gt;&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -904,18 +919,13 @@
 
 &lt;ul&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201302150"&gt;
-    &lt;p&gt;Google Play intentionally sends</em></ins></span> app <span 
class="removed"><del><strong>tracks</strong></del></span> <span 
class="inserted"><ins><em>developers</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks &lt;a 
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before and after</strong></del></span> <span 
class="inserted"><ins><em>users that install</em></ins></span> the <span 
class="removed"><del><strong>ride&lt;/a&gt;.&lt;/p&gt;
 
-        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span class="inserted"><ins><em>personal 
details of users that install</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
-        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> <span 
class="inserted"><ins><em>app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Merely asking the &ldquo;consent&rdquo; of 
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a 
protection against massive
+    &lt;p&gt;Merely asking</em></ins></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
+        for surveillance</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;consent&rdquo; of users</em></ins></span> is 
<span class="removed"><del><strong>inadequate as a protection against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -985,7 +995,9 @@
     report</em></ins></span> even <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>which page</em></ins></span> the user <span 
class="removed"><del><strong>didn't &ldquo;upload&rdquo; them to the 
service.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>reads 
at what time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Like most &ldquo;music 
screaming&rdquo; disservices, Spotify
+      is based on proprietary malware (DRM and snooping). In August
+      2015 it</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1003,13 +1015,12 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811020"&gt;
-    &lt;p&gt;Foundry's graphics software &lt;a
-    
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
-    reports information to identify who</em></ins></span> is <span 
class="removed"><del><strong>based on proprietary malware (DRM and snooping). 
In August
-      2015 it &lt;a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    &lt;p&gt;Foundry's graphics software</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
       demanded users submit to increased snooping&lt;/a&gt;, and some
-      are starting to realize</strong></del></span> <span 
class="inserted"><ins><em>running it&lt;/a&gt;. The result is
+      are starting</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/"&gt;
+    reports information</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>identify who is running it&lt;/a&gt;. The result is
     often a legal threat demanding a lot of money.&lt;/p&gt;
 
     &lt;p&gt;The fact</em></ins></span> that <span 
class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>used for repression of forbidden sharing
@@ -1063,24 +1074,24 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201902230"&gt;
     &lt;p&gt;Facebook offered a convenient proprietary
-    library</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:
-      &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+    library</em></ins></span> for <span class="removed"><del><strong>children 
don't respect privacy:</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
       
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used</strong></del></span> <span 
class="inserted"><ins><em>building mobile apps, which also</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html"&gt;
-    sent personal data to Facebook&lt;/a&gt;. Lots of companies 
built</em></ins></span> apps <span class="removed"><del><strong>snoop 
on</strong></del></span> <span class="inserted"><ins><em>that
-    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>user&lt;/a&gt;. This is in 
addition</strong></del></span> <span class="inserted"><ins><em>personal
-    data they collected would go</em></ins></span> to <span 
class="inserted"><ins><em>Facebook as well.&lt;/p&gt;
-
-    &lt;p&gt;It shows that no one can trust a nonfree program, not 
even</em></ins></span> the <span class="removed"><del><strong>snooping done by 
the phone company, and perhaps by the OS in the
+    sent personal data</em></ins></span> to
+      <span class="removed"><del><strong>the snooping done by the phone 
company, and perhaps by the OS in the
       phone.&lt;/p&gt;
 
-      &lt;p&gt;Don't be distracted by the question of whether the 
app</strong></del></span>
-    developers <span class="removed"><del><strong>get
-      users to say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>of 
other nonfree programs.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Don't be distracted by the question</strong></del></span> <span 
class="inserted"><ins><em>Facebook&lt;/a&gt;. Lots</em></ins></span> of <span 
class="removed"><del><strong>whether</strong></del></span> <span 
class="inserted"><ins><em>companies built apps that
+    way and released them, apparently not realizing that all</em></ins></span> 
the <span class="removed"><del><strong>app developers get
+      users</strong></del></span> <span class="inserted"><ins><em>personal
+    data they collected would go</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That 
is</strong></del></span> <span class="inserted"><ins><em>Facebook as 
well.&lt;/p&gt;
+
+    &lt;p&gt;It shows that</em></ins></span> no <span 
class="removed"><del><strong>excuse for 
malware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>one 
can trust a nonfree program, not even the
+    developers of other nonfree programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Brightest 
Flashlight app</strong></del></span>
@@ -1109,46 +1120,45 @@
       &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
       app send any information to anyone?  A free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
     preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>flashlight
-      app would not.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
-    their programs.&lt;/p&gt;</em></ins></span>
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
-    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt;</em></ins></span> in <span 
class="removed"><del><strong>Games&lt;/h4&gt;
+  &lt;h4 id="SpywareInGames"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware</em></ins></span> 
in <span class="removed"><del><strong>Games&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInGames"&gt;#SpywareInGames&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce 
Experience</strong></del></span> <span class="inserted"><ins><em>interacting 
with the app.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;nVidia's proprietary GeForce Experience &lt;a 
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
+      users identify themselves and then sends personal data about them to
+      nVidia servers&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>their programs.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis"&gt;makes
-      users identify themselves</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
-    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
-    pushing unwanted</em></ins></span> and <span 
class="removed"><del><strong>then sends personal data 
about</strong></del></span> <span class="inserted"><ins><em>often malicious ads 
on users, and redirecting</em></ins></span>
-    them to
-      <span class="removed"><del><strong>nVidia servers&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Angry Birds
+      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+      spies</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201902060"&gt;
+    &lt;p&gt;Many nonfree apps have a surveillance feature</em></ins></span> 
for <span class="removed"><del><strong>companies, and</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
+    recording all</em></ins></span> the <span class="removed"><del><strong>NSA 
takes advantage</strong></del></span> <span class="inserted"><ins><em>users' 
actions&lt;/a&gt; in interacting with the app.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Angry Birds
-      &lt;a 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-      spies for companies, and</strong></del></span> <span 
class="inserted"><ins><em>phishing sites that stole their credentials. 
Furthermore,</em></ins></span>
-    the <span class="removed"><del><strong>NSA takes 
advantage</strong></del></span> <span class="inserted"><ins><em>user interface 
of most of them was designed</em></ins></span> to <span 
class="removed"><del><strong>spy through it too&lt;/a&gt;.
-      Here's information on
-      &lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
-      more spyware apps&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201902041.1"&gt;
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>spy through it 
too&lt;/a&gt;.
+      Here's information</strong></del></span>
+    <span class="inserted"><ins><em>be</em></ins></span> on
+      <span class="removed"><del><strong>&lt;a 
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>Google Play had one or</em></ins></span> more 
<span class="removed"><del><strong>spyware apps&lt;/a&gt;.&lt;/p&gt;
       &lt;p&gt;&lt;a 
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>make uninstallation
+      More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
+    pushing unwanted and often malicious ads on users, and redirecting
+    them to phishing sites that stole their credentials. Furthermore,
+    the user interface of most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
@@ -1223,14 +1233,13 @@
       minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> it <span 
class="removed"><del><strong>is surrounded by a person's
       body), and the vibration frequency.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
-      standard with which manufacturers would make 
statements</strong></del></span> <span class="inserted"><ins><em>same machine 
via
-    various apps. Some of them send Facebook detailed 
information</em></ins></span> about
-      <span class="removed"><del><strong>their products, 
rather</strong></del></span>
-    <span class="inserted"><ins><em>the user's activities in the app; others 
only say that the user is
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>obtains from</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed 
response:</strong></del></span> <span class="inserted"><ins><em>same machine via
+    various apps. Some of them send Facebook detailed information about
+    the user's activities in the app; others only say that the user is
     using that app, but that alone is often quite informative.&lt;/p&gt;
 
-    &lt;p&gt;This spying occurs regardless of whether the user has a Facebook
+    &lt;p&gt;This spying occurs regardless of whether the user 
has</em></ins></span> a <span class="removed"><del><strong>labeling
+      standard with which manufacturers would make 
statements</strong></del></span> <span class="inserted"><ins><em>Facebook
     account.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1260,7 +1269,8 @@
     &lt;p&gt;I expect it implements DRM, too&mdash;that there is no way to save
     a recording. But I can't be sure from the article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
+    &lt;p&gt;If you learn to care much less</em></ins></span> about
+      <span class="removed"><del><strong>their products, 
rather</strong></del></span> <span class="inserted"><ins><em>sports, you will 
benefit in
     many ways. This is one more.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1288,16 +1298,17 @@
     &lt;p&gt;Grindr collects information about &lt;a
     
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status"&gt;</em></ins></span>
     which users <span class="removed"><del><strong>can check
-      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>are HIV-positive, then provides the information to
+      and change.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Grindr should not have so much information about its users.
     It could be designed so that users communicate such info to each
-    other but not to the server's database.&lt;/p&gt;</em></ins></span>
+    other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201803050"&gt;
+  &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
@@ -2930,7 +2941,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/09 08:00:49 $
+$Date: 2019/04/18 08:00:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.262
retrieving revision 1.263
diff -u -b -r1.262 -r1.263
--- proprietary-surveillance.ja.po      9 Apr 2019 08:00:49 -0000       1.262
+++ proprietary-surveillance.ja.po      18 Apr 2019 08:00:03 -0000      1.263
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -1225,6 +1225,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.210
retrieving revision 1.211
diff -u -b -r1.210 -r1.211
--- proprietary-surveillance.pot        9 Apr 2019 08:00:49 -0000       1.210
+++ proprietary-surveillance.pot        18 Apr 2019 08:00:03 -0000      1.211
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -802,6 +802,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a "
 
"href=\"https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent\";>
 "
 "upload call logs automatically from Android phones</a> while disguising what "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.503
retrieving revision 1.504
diff -u -b -r1.503 -r1.504
--- proprietary-surveillance.ru.po      9 Apr 2019 09:30:43 -0000       1.503
+++ proprietary-surveillance.ru.po      18 Apr 2019 08:00:03 -0000      1.504
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-09 07:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1102,6 +1103,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Facebook's app got &ldquo;consent&rdquo; to <a href=\"https://www.";
 "theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
 "over-call-log-consent\"> upload call logs automatically from Android phones</"

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary.de-diff.html    17 Apr 2019 10:00:17 -0000      1.77
+++ proprietary.de-diff.html    18 Apr 2019 08:00:03 -0000      1.78
@@ -127,9 +127,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -185,6 +185,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -233,16 +242,6 @@
     The only way it can deserve rational trust is if the software is
     free.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -303,7 +302,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.de.po   17 Apr 2019 10:00:17 -0000      1.119
+++ proprietary.de.po   18 Apr 2019 08:00:03 -0000      1.120
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -488,17 +501,6 @@
 "the software is free."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.es.po   17 Apr 2019 10:00:17 -0000      1.143
+++ proprietary.es.po   18 Apr 2019 08:00:03 -0000      1.144
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -307,6 +307,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -387,25 +400,6 @@
 "serían peligrosos. Pero ¿podemos confiar en esa afirmación? La única 
manera "
 "de que mereciera una confianza razonable sería que el software fuera libre."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Muchos teléfonos Android vienen con gran cantidad de <a href=\"https://";
-"elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\">aplicaciones "
-"privativas que tienen acceso a datos sensibles sin el conocimiento de los "
-"usuarios</a>. Estas aplicaciones ocultas pueden enviar los datos a sus "
-"desarrolladores, o bien pasárselos a aplicaciones instaladas por el usuario "
-"que tienen acceso a la red pero no acceso directo a los datos. El resultado "
-"es una vigilancia masiva sobre la que el usuario no tiene ningún control en "
-"absoluto."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +479,24 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais.";
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Muchos teléfonos Android vienen con gran cantidad de <a href=\"https://";
+#~ "elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"
+#~ "\">aplicaciones privativas que tienen acceso a datos sensibles sin el "
+#~ "conocimiento de los usuarios</a>. Estas aplicaciones ocultas pueden "
+#~ "enviar los datos a sus desarrolladores, o bien pasárselos a aplicaciones "
+#~ "instaladas por el usuario que tienen acceso a la red pero no acceso "
+#~ "directo a los datos. El resultado es una vigilancia masiva sobre la que "
+#~ "el usuario no tiene ningún control en absoluto."
+
+#~ msgid ""
 #~ "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 #~ "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 #~ "contacts.html\"> when they go to a junkyard the driver's personal data "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.fr.po   17 Apr 2019 10:46:13 -0000      1.175
+++ proprietary.fr.po   18 Apr 2019 08:00:03 -0000      1.176
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2019-04-17 12:45+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -385,25 +399,6 @@
 "seule chose qui lui ferait mériter notre confiance éclairée serait que son 
"
 "logiciel soit libre."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Un grand nombre de téléphones sous Android sont livrés avec une quantité "
-"énorme d'<a href=\"https://elpais.com/elpais/2019/03/22/";
-"inenglish/1553244778_819882.html\">applis non libres préinstallés qui ont "
-"accès à des données sensibles à l'insu de l'utilisateur</a>. Ces applis "
-"cachées peuvent envoyer ces données à leur développeur, ou bien les "
-"transmettre à des applis installées par l'utilisateur, ayant accès à "
-"Internet mais pas d'accès direct aux données. Il en résulte une 
surveillance "
-"massive que l'utilisateur n'a absolument aucun moyen de contrôler."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -477,3 +472,22 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais.";
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Un grand nombre de téléphones sous Android sont livrés avec une 
quantité "
+#~ "énorme d'<a href=\"https://elpais.com/elpais/2019/03/22/";
+#~ "inenglish/1553244778_819882.html\">applis non libres préinstallés qui 
ont "
+#~ "accès à des données sensibles à l'insu de l'utilisateur</a>. Ces 
applis "
+#~ "cachées peuvent envoyer ces données à leur développeur, ou bien les "
+#~ "transmettre à des applis installées par l'utilisateur, ayant accès à "
+#~ "Internet mais pas d'accès direct aux données. Il en résulte une "
+#~ "surveillance massive que l'utilisateur n'a absolument aucun moyen de "
+#~ "contrôler."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.it-diff.html    17 Apr 2019 10:00:17 -0000      1.89
+++ proprietary.it-diff.html    18 Apr 2019 08:00:03 -0000      1.90
@@ -45,10 +45,10 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -232,16 +241,6 @@
     The only way it can deserve rational trust is if the software is
     free.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -302,7 +301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.it.po   17 Apr 2019 10:00:17 -0000      1.128
+++ proprietary.it.po   18 Apr 2019 08:00:03 -0000      1.129
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -492,17 +505,6 @@
 "the software is free."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary.ja-diff.html    17 Apr 2019 10:00:17 -0000      1.90
+++ proprietary.ja-diff.html    18 Apr 2019 08:00:04 -0000      1.91
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -157,10 +157,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -181,6 +181,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -229,16 +238,6 @@
     The only way it can deserve rational trust is if the software is
     free.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -299,7 +298,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.ja.po   17 Apr 2019 10:00:17 -0000      1.111
+++ proprietary.ja.po   18 Apr 2019 08:00:04 -0000      1.112
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -412,17 +425,6 @@
 "the software is free."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.nl-diff.html    17 Apr 2019 10:00:17 -0000      1.89
+++ proprietary.nl-diff.html    18 Apr 2019 08:00:04 -0000      1.90
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -184,6 +184,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -232,16 +241,6 @@
     The only way it can deserve rational trust is if the software is
     free.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -302,7 +301,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.nl.po   17 Apr 2019 10:00:17 -0000      1.100
+++ proprietary.nl.po   18 Apr 2019 08:00:04 -0000      1.101
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -485,17 +498,6 @@
 "the software is free."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary.pl-diff.html    17 Apr 2019 10:00:17 -0000      1.107
+++ proprietary.pl-diff.html    18 Apr 2019 08:00:04 -0000      1.108
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
+instances of malicious functionalities (with more than 450 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -126,16 +126,16 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -182,6 +182,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -230,16 +239,6 @@
     The only way it can deserve rational trust is if the software is
     free.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -300,7 +299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.pl.po   17 Apr 2019 10:00:17 -0000      1.95
+++ proprietary.pl.po   18 Apr 2019 08:00:04 -0000      1.96
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -567,17 +580,6 @@
 "the software is free."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary.pot     17 Apr 2019 10:00:17 -0000      1.92
+++ proprietary.pot     18 Apr 2019 08:00:04 -0000      1.93
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a "
+"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
+"saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a "
@@ -302,17 +315,6 @@
 "the software is free."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a "
-"href=\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\";>
 "
-"preinstalled nonfree apps that have access to sensitive data without users' "
-"knowledge</a>. These hidden apps may either call home with the data, or pass "
-"it on to user-installed apps that have access to the network but no direct "
-"access to the data. This results in massive surveillance on which the user "
-"has absolutely no control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary.pt-br.po        17 Apr 2019 10:00:17 -0000      1.138
+++ proprietary.pt-br.po        18 Apr 2019 08:00:04 -0000      1.139
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2019-04-16 00:31-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -298,6 +298,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -380,24 +393,6 @@
 "microfones não são perigosos. Mas devemos confiar nesta afirmação? A 
única "
 "maneira que pode merecer confiança racional é se o software for livre."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Muitos telefones Android vêm com um grande número de <a href=\"https://";
-"elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> aplicativos "
-"não livres pré-instalados que têm acesso a dados confidenciais sem o "
-"conhecimento dos usuários</a>. Esses aplicativos ocultos podem ligar para "
-"casa com os dados ou transmiti-los a aplicativos instalados pelo usuário que 
"
-"tenham acesso à rede, mas sem acesso direto aos dados. Isso resulta em uma "
-"vigilância maciça na qual o usuário não tem absolutamente nenhum 
controle."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +468,24 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais.";
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Muitos telefones Android vêm com um grande número de <a href=\"https://";
+#~ "elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> "
+#~ "aplicativos não livres pré-instalados que têm acesso a dados "
+#~ "confidenciais sem o conhecimento dos usuários</a>. Esses aplicativos "
+#~ "ocultos podem ligar para casa com os dados ou transmiti-los a aplicativos "
+#~ "instalados pelo usuário que tenham acesso à rede, mas sem acesso direto "
+#~ "aos dados. Isso resulta em uma vigilância maciça na qual o usuário não 
"
+#~ "tem absolutamente nenhum controle."
+
+#~ msgid ""
 #~ "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 #~ "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 #~ "contacts.html\"> when they go to a junkyard the driver's personal data "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- proprietary.ru.po   17 Apr 2019 13:30:15 -0000      1.214
+++ proprietary.ru.po   18 Apr 2019 08:00:04 -0000      1.215
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-18 07:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -391,25 +405,6 @@
 "следует ли нам доверять этому заявлению? 
Единственный способ, которым оно "
 "может заслужить разумное доверие,&mdash; это 
если программы будут свободны."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-"Многие телефоны на базе Android продаются с 
большим количеством <a href="
-"\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html\";> "
-"предустановленных несвободных 
приложений, которые получают доступ к "
-"конфиденциальным данным без ведома 
пользователя</a>. Эти скрытые приложения "
-"могут либо отсылать эти данные к себе 
домой, либо передавать их в "
-"приложения, установленные пользователем, 
у которых есть доступ к сети, но "
-"нет прямого доступа к данным. Это приводит 
к массовой слежке, над которой у "
-"пользователя нет абсолютно никакого 
контроля."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -489,6 +484,24 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Many Android phones come with a huge number of <a href=\"https://elpais.";
+#~ "com/elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled "
+#~ "nonfree apps that have access to sensitive data without users' knowledge</"
+#~ "a>. These hidden apps may either call home with the data, or pass it on "
+#~ "to user-installed apps that have access to the network but no direct "
+#~ "access to the data. This results in massive surveillance on which the "
+#~ "user has absolutely no control."
+#~ msgstr ""
+#~ "Многие телефоны на базе Android продаются с 
большим количеством <a href="
+#~ "\"https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html";
+#~ "\"> предустановленных несвободных 
приложений, которые получают доступ к "
+#~ "конфиденциальным данным без ведома 
пользователя</a>. Эти скрытые "
+#~ "приложения могут либо отсылать эти 
данные к себе домой, либо передавать "
+#~ "их в приложения, установленные 
пользователем, у которых есть доступ к "
+#~ "сети, но нет прямого доступа к данным. 
Это приводит к массовой слежке, "
+#~ "над которой у пользователя нет 
абсолютно никакого контроля."
+
+#~ msgid ""
 #~ "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 #~ "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 #~ "contacts.html\"> when they go to a junkyard the driver's personal data "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.zh-tw-diff.html 17 Apr 2019 10:00:17 -0000      1.67
+++ proprietary.zh-tw-diff.html 18 Apr 2019 08:00:04 -0000      1.68
@@ -127,9 +127,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -185,6 +185,15 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904130"&gt;
+    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
+    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
+    saves the data for years&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
+    the location data to Google.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -233,16 +242,6 @@
     The only way it can deserve rational trust is if the software is
     free.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903251"&gt;
-    &lt;p&gt;Many Android phones come with a huge number of &lt;a
-    
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html"&gt;
-    preinstalled nonfree apps that have access to sensitive data without
-    users' knowledge&lt;/a&gt;. These hidden apps may either call home with
-    the data, or pass it on to user-installed apps that have access to
-    the network but no direct access to the data. This results in massive
-    surveillance on which the user has absolutely no control.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -303,7 +302,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/18 08:00:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.zh-tw.po        17 Apr 2019 10:00:17 -0000      1.78
+++ proprietary.zh-tw.po        18 Apr 2019 08:00:04 -0000      1.79
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-18 07:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";
@@ -401,17 +414,6 @@
 "the software is free."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android phones come with a huge number of <a href=\"https://elpais.com/";
-"elpais/2019/03/22/inenglish/1553244778_819882.html\"> preinstalled nonfree "
-"apps that have access to sensitive data without users' knowledge</a>. These "
-"hidden apps may either call home with the data, or pass it on to user-"
-"installed apps that have access to the network but no direct access to the "
-"data. This results in massive surveillance on which the user has absolutely "
-"no control."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- pt-br.po    17 Apr 2019 10:00:17 -0000      1.90
+++ pt-br.po    18 Apr 2019 08:00:04 -0000      1.91
@@ -3242,6 +3242,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- ru.po       17 Apr 2019 14:01:01 -0000      1.153
+++ ru.po       18 Apr 2019 08:00:04 -0000      1.154
@@ -4353,6 +4353,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- zh-tw.po    17 Apr 2019 10:00:17 -0000      1.68
+++ zh-tw.po    18 Apr 2019 08:00:05 -0000      1.69
@@ -3051,6 +3051,19 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Google tracks the movements of Android phones, and sometimes <a href="
+"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
+"police.html\"> saves the data for years</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Nonfree software in the phone has to be responsible for sending the location "
+"data to Google."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google invites people to <a href=\"https://www.commondreams.org/";
 "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
 "origin=rss\"> let Google monitor their phone use, and all internet use in "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]