www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 20 Apr 2019 03:31:43 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/04/20 03:31:42

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-cars.de-diff.html malware-cars.de.po 
                         malware-cars.fr.po malware-cars.pot 
                         malware-cars.ru.po nl.po pl.po pot 
                         proprietary-deception.de-diff.html 
                         proprietary-deception.de.po 
                         proprietary-deception.es.po 
                         proprietary-deception.fr.po 
                         proprietary-deception.ja-diff.html 
                         proprietary-deception.ja.po 
                         proprietary-deception.pot 
                         proprietary-deception.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.70&r2=1.71

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- de.po       18 Apr 2019 10:00:39 -0000      1.70
+++ de.po       20 Apr 2019 07:31:35 -0000      1.71
@@ -4007,6 +4007,56 @@
 msgid "Some examples of malware in cars are listed below."
 msgstr "Beispiele für Schadsoftware in Pkws:"
 
+# | [-<a
+# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>-]Volkswagen
+# | programmed its car engine computers to {+<a
+# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
+# | detect the Environmental Protection Agency's emission tests</a>, and run
+# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
+# | standards by a factor of up to 35.+}
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#| "rest of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde „saubere“ Emissionstests nachweisen zu 
können</a> "
+"und fuhr ansonsten unsauber."
+
+# | Using free software would not have stopped Volkswagen from programming it
+# | this way, but would have made it harder to [-conceal.-] {+conceal, and
+# | given the users the possibility of correcting the deception.+}
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu 
"
+"programmieren, hätte es aber erschwert es zu verbergen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
 #. type: Content of: <ul><li><p>
 msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
@@ -4266,49 +4316,6 @@
 "Has A Cunning Plan How To Deal With It, eroHedge.com 2015.\">Hintertür zur "
 "Abschaltung des Motors via Fernzugriff</a> ausgestattet."
 
-# | [-<a
-# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>-]Volkswagen
-# | programmed its car engine computers to {+<a
-# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
-# | detect the Environmental Protection Agency's emission tests</a>, and run
-# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
-# | standards by a factor of up to 35.+}
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
-#| "rest of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
-"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
-"der US-Umweltschutzbehörde „saubere“ Emissionstests nachweisen zu 
können</a> "
-"und fuhr ansonsten unsauber."
-
-# | Using free software would not have stopped Volkswagen from programming it
-# | this way, but would have made it harder to [-conceal.-] {+conceal, and
-# | given the users the possibility of correcting the deception.+}
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu 
"
-"programmieren, hätte es aber erschwert es zu verbergen."
-
 #. type: Content of: <ul><li><p>
 msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- es.po       19 Apr 2019 15:59:32 -0000      1.95
+++ es.po       20 Apr 2019 07:31:37 -0000      1.96
@@ -2837,6 +2837,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen programó los ordenadores que controlan el motor de sus coches "
+"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-";
+"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
+"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En 
"
+"situaciones reales, los coches producían emisiones que llegaban a "
+"multiplicar por 35 los estándares permitidos."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"El uso de software libre no habría impedido que Volkswagen lo programara de "
+"esa manera, pero lo habría hecho más difícil de ocultar, y habría dado a 
los "
+"usuarios la posibilidad de corregir el engaño."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3054,31 +3086,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen programó los ordenadores que controlan el motor de sus coches "
-"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-";
-"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
-"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En 
"
-"situaciones reales, los coches producían emisiones que llegaban a "
-"multiplicar por 35 los estándares permitidos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"El uso de software libre no habría impedido que Volkswagen lo programara de "
-"esa manera, pero lo habría hecho más difícil de ocultar, y habría dado a 
los "
-"usuarios la posibilidad de corregir el engaño."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- fr.po       18 Apr 2019 10:48:27 -0000      1.123
+++ fr.po       20 Apr 2019 07:31:37 -0000      1.124
@@ -3172,6 +3172,39 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-";
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des États-Unis)</a>&hellip; et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'à 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile 
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3414,32 +3447,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
-"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-";
-"software-to-cheat-on-emissions\">détectent les essais antipollution de "
-"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
-"l'environnement des États-Unis)</a>&hellip; et polluent le reste du temps. "
-"En conditions réelles, les voitures excédaient les normes d'émission d'un "
-"facteur allant jusqu'à 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
-"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile 
à "
-"cacher et les utilisateurs auraient eu une chance de la corriger."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- it.po       18 Apr 2019 10:00:39 -0000      1.70
+++ it.po       20 Apr 2019 07:31:37 -0000      1.71
@@ -3774,6 +3774,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3997,22 +4020,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- ja.po       18 Apr 2019 10:00:40 -0000      1.70
+++ ja.po       20 Apr 2019 07:31:37 -0000      1.71
@@ -3221,6 +3221,42 @@
 msgstr "こちらがゲームのマルウェアの例です。"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"フォルクスワーゲンは車のエンジンのコンピュータを環境保護局の排気テストを検出"
+"するようにプログラム
し、そのほかの時には汚して走るようにしました。"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"自由ソフトウェアを使うことはフォルクスワーゲンがこのようにしてプログラãƒ
 ã™ã‚‹"
+"ことを止められなかったかもしれませんが、隠
すことを困難にはしたでしょう。"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
@@ -3423,35 +3459,6 @@
 
"plan-how-deal-it\">エンジンを止めるバックドア付で</a>来ました。"
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests, and run dirty the rest "
-#| "of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"フォルクスワーゲンは車のエンジンのコンピュータを環境保護局の排気テストを検出"
-"するようにプログラム
し、そのほかの時には汚して走るようにしました。"
-
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"自由ソフトウェアを使うことはフォルクスワーゲンがこのようにしてプログラãƒ
 ã™ã‚‹"
-"ことを止められなかったかもしれませんが、隠
すことを困難にはしたでしょう。"
-
-#. type: Content of: <ul><li><p>
 msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "

Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-cars.de-diff.html   5 Apr 2019 10:32:23 -0000       1.27
+++ malware-cars.de-diff.html   20 Apr 2019 07:31:37 -0000      1.28
@@ -64,6 +64,22 @@
 &lt;div class="column-limit" id="malware-cars"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903290"&gt;</em></ins></span>
     &lt;p&gt;Tesla <span 
class="removed"><del><strong>used</strong></del></span> <span 
class="inserted"><ins><em>cars collect lots of personal data, and &lt;a
     
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
@@ -156,26 +172,26 @@
     
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969"&gt;
     Audi's proprietary software used a simple method to cheat on emissions
     tests&lt;/a&gt;: to activate a special low-emission gearshifting mode until
-    the first time the car made a <span 
class="removed"><del><strong>turn.</strong></del></span> <span 
class="inserted"><ins><em>turn.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    the first time the car made a <span class="removed"><del><strong>turn.
+&lt;/li&gt;
   
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
 &lt;p&gt;Caterpillar vehicles come with a &lt;a
 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
-back-door</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201608110"&gt;
-    &lt;p&gt;Due</em></ins></span> to <span 
class="removed"><del><strong>shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
-&lt;/li&gt;
+back-door to shutoff the engine&lt;/a&gt; 
remotely.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
   
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a
 href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
-Volkswagen programmed its car engine computers</strong></del></span> <span 
class="inserted"><ins><em>weak security, &lt;a
+Volkswagen programmed its car engine computers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201608110"&gt;
+    &lt;p&gt;Due</em></ins></span> to <span 
class="removed"><del><strong>detect the
+Environmental Protection Agency's emission tests&lt;/a&gt;,
+and run dirty</strong></del></span> <span class="inserted"><ins><em>weak 
security, &lt;a
     
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844"&gt;it
-    is easy</em></ins></span> to <span 
class="removed"><del><strong>detect</strong></del></span> <span 
class="inserted"><ins><em>open</em></ins></span> the
-<span class="removed"><del><strong>Environmental Protection Agency's emission 
tests&lt;/a&gt;,
-and run dirty the rest</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> of <span 
class="removed"><del><strong>the time.&lt;/p&gt;
+    is easy to open</em></ins></span> the <span 
class="removed"><del><strong>rest</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> of <span 
class="removed"><del><strong>the time.&lt;/p&gt;
 
 &lt;p&gt;In real driving, the</strong></del></span> <span 
class="inserted"><ins><em>100 million</em></ins></span> cars <span 
class="removed"><del><strong>exceeded emissions standards</strong></del></span> 
<span class="inserted"><ins><em>built</em></ins></span> by <span 
class="removed"><del><strong>a factor
 of up to 35.&lt;/p&gt;
@@ -213,33 +229,20 @@
     href="/philosophy/free-software-even-more-important.html"&gt;which means
     it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car remotely, the <span 
class="removed"><del><strong>cell phone modem
-enables</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+    &lt;p&gt;Even if no one connects to the car remotely, the cell phone modem
     enables the phone company to track the car's movements all the time;
-    it is possible to physically remove the cell phone modem, though.&lt;/p&gt;
+    it is possible to physically remove the cell phone <span 
class="removed"><del><strong>modem</strong></del></span> <span 
class="inserted"><ins><em>modem,</em></ins></span> though.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511194"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511194"&gt;
     &lt;p&gt;Caterpillar vehicles come with &lt;a
     
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;
     a back door to shutoff the engine&lt;/a&gt; remotely.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201509210"&gt;
-    &lt;p&gt;Volkswagen programmed its car engine computers to &lt;a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
-    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
-    run dirty</em></ins></span> the <span class="removed"><del><strong>phone 
company to track</strong></del></span> <span class="inserted"><ins><em>rest 
of</em></ins></span> the <span class="removed"><del><strong>car's movements 
all</strong></del></span> <span class="inserted"><ins><em>time. In real 
driving,</em></ins></span> the <span 
class="removed"><del><strong>time;</strong></del></span> <span 
class="inserted"><ins><em>cars exceeded
-    emissions standards by a factor of up to 35.&lt;/p&gt;
-
-    &lt;p&gt;Using free software would not have stopped Volkswagen from
-    programming</em></ins></span> it <span class="removed"><del><strong>is 
possible</strong></del></span> <span class="inserted"><ins><em>this way, but 
would have made it harder</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>conceal,
-    and given</em></ins></span> the <span class="removed"><del><strong>cell 
phone modem though.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users the possibility of correcting the 
deception.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201508120"&gt;</em></ins></span>
+  &lt;li id="M201508120"&gt;</em></ins></span>
     &lt;p&gt;Security researchers discovered a &lt;a
     
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text"&gt;
     vulnerability in diagnostic dongles used for vehicle tracking and
@@ -389,7 +392,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/05 10:32:23 $
+$Date: 2019/04/20 07:31:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-cars.de.po  5 Apr 2019 10:32:23 -0000       1.17
+++ malware-cars.de.po  20 Apr 2019 07:31:37 -0000      1.18
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -106,6 +106,56 @@
 "Einzelheiten aufzuzeigen."
 
 #. type: Content of: <ul><li><p>
+# | [-<a
+# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>-]Volkswagen
+# | programmed its car engine computers to {+<a
+# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
+# | detect the Environmental Protection Agency's emission tests</a>, and run
+# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
+# | standards by a factor of up to 35.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#| "rest of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde „saubere“ Emissionstests nachweisen zu 
können</a> "
+"und fuhr ansonsten unsauber."
+
+#. type: Content of: <ul><li><p>
+# | Using free software would not have stopped Volkswagen from programming it
+# | this way, but would have made it harder to [-conceal.-] {+conceal, and
+# | given the users the possibility of correcting the deception.+}
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu 
"
+"programmieren, hätte es aber erschwert es zu verbergen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
@@ -365,49 +415,6 @@
 "Abschaltung des Motors via Fernzugriff</a> ausgestattet."
 
 #. type: Content of: <ul><li><p>
-# | [-<a
-# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>-]Volkswagen
-# | programmed its car engine computers to {+<a
-# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
-# | detect the Environmental Protection Agency's emission tests</a>, and run
-# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
-# | standards by a factor of up to 35.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
-#| "rest of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
-"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
-"der US-Umweltschutzbehörde „saubere“ Emissionstests nachweisen zu 
können</a> "
-"und fuhr ansonsten unsauber."
-
-#. type: Content of: <ul><li><p>
-# | Using free software would not have stopped Volkswagen from programming it
-# | this way, but would have made it harder to [-conceal.-] {+conceal, and
-# | given the users the possibility of correcting the deception.+}
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu 
"
-"programmieren, hätte es aber erschwert es zu verbergen."
-
-#. type: Content of: <ul><li><p>
 msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "

Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-cars.fr.po  7 Apr 2019 14:11:19 -0000       1.27
+++ malware-cars.fr.po  20 Apr 2019 07:31:37 -0000      1.28
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2019-04-07 16:10+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -80,6 +81,39 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-";
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des États-Unis)</a>&hellip; et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'à 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile 
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -322,32 +356,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
-"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-";
-"software-to-cheat-on-emissions\">détectent les essais antipollution de "
-"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
-"l'environnement des États-Unis)</a>&hellip; et polluent le reste du temps. "
-"En conditions réelles, les voitures excédaient les normes d'émission d'un "
-"facteur allant jusqu'à 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
-"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile 
à "
-"cacher et les utilisateurs auraient eu une chance de la corriger."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-cars.pot    5 Apr 2019 10:32:23 -0000       1.12
+++ malware-cars.pot    20 Apr 2019 07:31:37 -0000      1.13
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a "
+"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>
 "
+"detect the Environmental Protection Agency's emission tests</a>, and run "
+"dirty the rest of the time. In real driving, the cars exceeded emissions "
+"standards by a factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a "
+"href=\"https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison\";>
 "
+"charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a "
 
"href=\"https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html\";>
 "
 "when they go to a junkyard the driver's personal data goes with them</a>."
@@ -224,22 +247,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a "
-"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>
 "
-"detect the Environmental Protection Agency's emission tests</a>, and run "
-"dirty the rest of the time. In real driving, the cars exceeded emissions "
-"standards by a factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a "
 
"href=\"http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text\";>
 "
 "vulnerability in diagnostic dongles used for vehicle tracking and "

Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-cars.ru.po  5 Apr 2019 18:59:55 -0000       1.33
+++ malware-cars.ru.po  20 Apr 2019 07:31:37 -0000      1.34
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2018-09-27 04:21-0500\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -82,6 +83,37 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"В Фольксвагене запрограммировали 
компьютеры в двигателях своих автомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\">обнаружение тестов выхлопных 
газов, проводимых Агентством по "
+"охране окружающей среды</a> США, и 
загрязнять воздух все остальное время.  "
+"При движении в реальных условиях 
автомобили превышали нормы выхлопа в 35 раз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Применение свободных программ не 
помешало бы Фольксвагену 
запрограммировать "
+"компьютер таким образом, но это было бы 
труднее скрыть, и у пользователей "
+"была бы возможность исправить обман."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -319,30 +351,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"В Фольксвагене запрограммировали 
компьютеры в двигателях своих автомобилей "
-"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-"emissions\">обнаружение тестов выхлопных 
газов, проводимых Агентством по "
-"охране окружающей среды</a> США, и 
загрязнять воздух все остальное время.  "
-"При движении в реальных условиях 
автомобили превышали нормы выхлопа в 35 раз."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Применение свободных программ не 
помешало бы Фольксвагену 
запрограммировать "
-"компьютер таким образом, но это было бы 
труднее скрыть, и у пользователей "
-"была бы возможность исправить обман."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- nl.po       18 Apr 2019 10:00:40 -0000      1.70
+++ nl.po       20 Apr 2019 07:31:37 -0000      1.71
@@ -2708,6 +2708,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2865,22 +2888,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- pl.po       18 Apr 2019 10:00:40 -0000      1.70
+++ pl.po       20 Apr 2019 07:31:37 -0000      1.71
@@ -2275,6 +2275,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2432,22 +2455,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- pot 18 Apr 2019 10:00:40 -0000      1.70
+++ pot 20 Apr 2019 07:31:38 -0000      1.71
@@ -2130,6 +2130,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2287,22 +2310,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-deception.de-diff.html  17 Apr 2019 10:00:17 -0000      1.26
+++ proprietary-deception.de-diff.html  20 Apr 2019 07:31:38 -0000      1.27
@@ -49,22 +49,38 @@
 &lt;div class="column-limit" id="proprietary-deception"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>possibility 
of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903281"&gt;
-    &lt;p&gt;OfficeMax cheated customers by &lt;a
-    
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/"&gt;
+    &lt;p&gt;OfficeMax cheated customers by</em></ins></span> &lt;a
+    <span 
class="inserted"><ins><em>href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/"&gt;
     using proprietary &ldquo;PC Health Check&rdquo; software&lt;/a&gt; rigged
     to give false results, deceiving the customer into thinking per
-    computer was infected and buy unneeded support services 
from</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span>
-    <span class="inserted"><ins><em>company.&lt;/p&gt;
+    computer was infected and buy unneeded support services from the
+    company.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.2"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos instead of &ldquo;beautifying&rdquo; them&lt;/a&gt;,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
@@ -97,46 +113,19 @@
     &lt;p&gt;The</em></ins></span> proprietor of the Pokémon Go game &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business"&gt;
     invites restaurants and other businesses to pay to have the game lure
-    people <span class="removed"><del><strong>there&lt;/a&gt;.
-  &lt;/li&gt;
-  &lt;li&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;
-      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-      interfaces designed to mislead users, or make option settings
-      hard to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
-    users to turn this off&rdquo; while ensuring that few will
-    understand how to actually turn it off.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;
     &lt;p&gt;A top-ranking proprietary Instagram client promising
     to tell users who's been watching their pictures was in reality &lt;a
     
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
     their credentials&lt;/a&gt;, advertising itself on their feed, and posting
     images without their consent.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201509210"&gt;</em></ins></span>
-    &lt;p&gt;Volkswagen programmed its car engine computers to <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;</em></ins></span>
-    detect the Environmental Protection Agency's emission <span 
class="removed"><del><strong>tests,</strong></del></span> <span 
class="inserted"><ins><em>tests&lt;/a&gt;,</em></ins></span> and
-    run dirty the rest of the <span 
class="removed"><del><strong>time.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a 
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;In</strong></del></span> <span class="inserted"><ins><em>time. 
In</em></ins></span> real driving, the cars exceeded
-    emissions standards by a factor of up to 35.&lt;/p&gt;
-
-    &lt;p&gt;Using free software would not have stopped Volkswagen from
-    programming it this way, but would have made it harder to conceal,
-    and given the users the possibility of correcting the deception.&lt;/p&gt;
-  &lt;/li&gt;
-
-  <span class="inserted"><ins><em>&lt;li id="M201308290"&gt;
+  &lt;li id="M201308290"&gt;</em></ins></span>
     &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
     interfaces designed to mislead users, or make option settings hard
@@ -145,7 +134,29 @@
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
     to actually turn it off.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A top-ranking proprietary Instagram client promising to tell
+      users who's been watching their pictures was in reality
+      &lt;a 
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
 their credentials&lt;/a&gt;,
+      advertising itself on their feed, and posting images without
+      their consent.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Volkswagen programmed its car engine computers to detect the
+      Environmental Protection Agency's emission tests,
+      and run dirty the rest of the time.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a 
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In real driving, the cars exceeded emissions standards by a
+      factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+      programming it this way, but would have made it harder to
+      conceal, and given the users the possibility of correcting the
+      deception.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
 
@@ -206,7 +217,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/20 07:31:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-deception.de.po 17 Apr 2019 10:00:17 -0000      1.38
+++ proprietary-deception.de.po 20 Apr 2019 07:31:38 -0000      1.39
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2018-08-29 02:43+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -84,6 +84,47 @@
 "Einzelheiten aufzuzeigen."
 
 #. type: Content of: <ul><li><p>
+# | Volkswagen programmed its car engine computers to {+<a
+# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
+# | detect the Environmental Protection Agency's emission [-tests,-]
+# | {+tests</a>,+} and run dirty the rest of the time. {+In real driving, the
+# | cars exceeded emissions standards by a factor of up to 35.+}
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde „saubere“ Emissionstests nachweisen zu 
können</a> "
+"und fuhr ansonsten unsauber."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu 
"
+"programmieren, hätte aber erschwert es zu verschleiern und Nutzern die "
+"Möglichkeit gegeben, diese Unehrlichkeit zu korrigieren."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-";
 "policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
@@ -178,40 +219,6 @@
 "und veröffentlichte Bilder ohne deren Zustimmung."
 
 #. type: Content of: <ul><li><p>
-# | Volkswagen programmed its car engine computers to {+<a
-# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
-# | detect the Environmental Protection Agency's emission [-tests,-]
-# | {+tests</a>,+} and run dirty the rest of the time. {+In real driving, the
-# | cars exceeded emissions standards by a factor of up to 35.+}
-#, fuzzy
-#| msgid ""
-#| "Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests, and run dirty the rest "
-#| "of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
-"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
-"der US-Umweltschutzbehörde „saubere“ Emissionstests nachweisen zu 
können</a> "
-"und fuhr ansonsten unsauber."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu 
"
-"programmieren, hätte aber erschwert es zu verschleiern und Nutzern die "
-"Möglichkeit gegeben, diese Unehrlichkeit zu korrigieren."
-
-#. type: Content of: <ul><li><p>
 msgid ""
 "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
 "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"

Index: proprietary-deception.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-deception.es.po 18 Apr 2019 10:29:55 -0000      1.3
+++ proprietary-deception.es.po 20 Apr 2019 07:31:38 -0000      1.4
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2019-04-18 12:05+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -72,6 +73,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen programó los ordenadores que controlan el motor de sus coches "
+"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-";
+"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
+"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En 
"
+"situaciones reales, los coches producían emisiones que llegaban a "
+"multiplicar por 35 los estándares permitidos."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"El uso de software libre no habría impedido que Volkswagen lo programara de "
+"esa manera, pero lo habría hecho más difícil de ocultar, y habría dado a 
los "
+"usuarios la posibilidad de corregir el engaño."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-";
 "policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
 "virus-scans/\"> using proprietary &ldquo;PC Health Check&rdquo; software</a> "
@@ -168,31 +201,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen programó los ordenadores que controlan el motor de sus coches "
-"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-";
-"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
-"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En 
"
-"situaciones reales, los coches producían emisiones que llegaban a "
-"multiplicar por 35 los estándares permitidos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"El uso de software libre no habría impedido que Volkswagen lo programara de "
-"esa manera, pero lo habría hecho más difícil de ocultar, y habría dado a 
los "
-"usuarios la posibilidad de corregir el engaño."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
 "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
 "you\">user interfaces designed to mislead users, or make option settings "

Index: proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-deception.fr.po 17 Apr 2019 10:46:13 -0000      1.42
+++ proprietary-deception.fr.po 20 Apr 2019 07:31:38 -0000      1.43
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2019-04-17 12:45+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: fr <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -70,6 +71,39 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-";
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des États-Unis)</a>&hellip; et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'à 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile 
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-";
 "policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
 "virus-scans/\"> using proprietary &ldquo;PC Health Check&rdquo; software</a> "
@@ -168,32 +202,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
-"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-";
-"software-to-cheat-on-emissions\">détectent les essais antipollution de "
-"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
-"l'environnement des États-Unis)</a>&hellip; et polluent le reste du temps. "
-"En conditions réelles, les voitures excédaient les normes d'émission d'un "
-"facteur allant jusqu'à 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
-"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile 
à "
-"cacher et les utilisateurs auraient eu une chance de la corriger."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
 "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
 "you\">user interfaces designed to mislead users, or make option settings "

Index: proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-deception.ja-diff.html  17 Apr 2019 10:00:17 -0000      1.29
+++ proprietary-deception.ja-diff.html  20 Apr 2019 07:31:38 -0000      1.30
@@ -44,7 +44,7 @@
 <span class="inserted"><ins><em>&lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
-to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to</em></ins></span> &lt;a <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
@@ -52,6 +52,22 @@
 &lt;div class="column-limit" id="proprietary-deception"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903281"&gt;
     &lt;p&gt;OfficeMax cheated customers by &lt;a
     
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/"&gt;
@@ -63,8 +79,8 @@
 
   &lt;li id="M201902041.2"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a
-    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    be on Google Play had one or more malicious functionalities, such as &lt;a
+    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos instead of &ldquo;beautifying&rdquo; them&lt;/a&gt;,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
@@ -99,45 +115,17 @@
     invites restaurants and other businesses to pay to have the game lure
     people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo;
-      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-      interfaces designed to mislead users, or make option settings
-      hard to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
-    users to turn this off&rdquo; while ensuring that few will
-    understand how to actually turn it off.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;
     &lt;p&gt;A top-ranking proprietary Instagram client promising
     to tell users who's been watching their pictures was in reality &lt;a
     
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
     their credentials&lt;/a&gt;, advertising itself on their feed, and posting
     images without their consent.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201509210"&gt;</em></ins></span>
-    &lt;p&gt;Volkswagen programmed its car engine computers to <span 
class="inserted"><ins><em>&lt;a
-    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;</em></ins></span>
-    detect the Environmental Protection Agency's emission <span 
class="removed"><del><strong>tests,</strong></del></span> <span 
class="inserted"><ins><em>tests&lt;/a&gt;,</em></ins></span> and
-    run dirty the rest of the <span 
class="removed"><del><strong>time.&lt;/p&gt;
-
-    &lt;p&gt;&lt;a 
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;In</strong></del></span> <span class="inserted"><ins><em>time. 
In</em></ins></span> real driving, the cars exceeded
-    emissions standards by a factor of up to 35.&lt;/p&gt;
-
-    &lt;p&gt;Using free software would not have stopped Volkswagen from
-    programming it this way, but would have made it harder to
-      <span 
class="removed"><del><strong>conceal.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>conceal,
-    and given the users the possibility of correcting the deception.&lt;/p&gt;
-  &lt;/li&gt;
 
-  &lt;li id="M201308290"&gt;
+  &lt;li id="M201308290"&gt;</em></ins></span>
     &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
     
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
     interfaces designed to mislead users, or make option settings hard
@@ -145,8 +133,29 @@
 
     &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
     to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;</em></ins></span>
+    to actually turn it off.&lt;/p&gt;
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A top-ranking proprietary Instagram client promising to tell
+      users who's been watching their pictures was in reality
+      &lt;a 
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
 their credentials&lt;/a&gt;,
+      advertising itself on their feed, and posting images without
+      their consent.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;
+    &lt;p&gt;Volkswagen programmed its car engine computers to detect the
+      Environmental Protection Agency's emission tests,
+      and run dirty the rest of the time.&lt;/p&gt;
+
+    &lt;p&gt;&lt;a 
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In real driving, the cars exceeded emissions standards by a
+      factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+      programming it this way, but would have made it harder to
+      conceal.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
 &lt;/ul&gt;
 
 
@@ -208,7 +217,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/20 07:31:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-deception.ja.po 17 Apr 2019 10:00:17 -0000      1.37
+++ proprietary-deception.ja.po 20 Apr 2019 07:31:38 -0000      1.38
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2016-11-18 13:31+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -66,6 +66,42 @@
 msgstr ""
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"フォルクスワーゲンは車のエンジンのコンピュータを環境保護局の排気テストを検出"
+"するようにプログラム
し、そのほかの時には汚して走るようにしました。"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"自由ソフトウェアを使うことはフォルクスワーゲンがこのようにしてプログラãƒ
 ã™ã‚‹"
+"ことを止められなかったかもしれませんが、隠
すことを困難にはしたでしょう。"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-";
 "policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
@@ -149,35 +185,6 @@
 
"をユーザのフィードに広告し、同意なしに画像を投稿するのです。"
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests, and run dirty the rest "
-#| "of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"フォルクスワーゲンは車のエンジンのコンピュータを環境保護局の排気テストを検出"
-"するようにプログラム
し、そのほかの時には汚して走るようにしました。"
-
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"自由ソフトウェアを使うことはフォルクスワーゲンがこのようにしてプログラãƒ
 ã™ã‚‹"
-"ことを止められなかったかもしれませんが、隠
すことを困難にはしたでしょう。"
-
-#. type: Content of: <ul><li><p>
 msgid ""
 "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
 "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"

Index: proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-deception.pot   17 Apr 2019 10:00:17 -0000      1.23
+++ proprietary-deception.pot   20 Apr 2019 07:31:38 -0000      1.24
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a "
+"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>
 "
+"detect the Environmental Protection Agency's emission tests</a>, and run "
+"dirty the rest of the time. In real driving, the cars exceeded emissions "
+"standards by a factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a "
+"href=\"https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison\";>
 "
+"charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "OfficeMax cheated customers by <a "
 
"href=\"https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/\";>
 "
 "using proprietary &ldquo;PC Health Check&rdquo; software</a> rigged to give "
@@ -118,22 +141,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a "
-"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>
 "
-"detect the Environmental Protection Agency's emission tests</a>, and run "
-"dirty the rest of the time. In real driving, the cars exceeded emissions "
-"standards by a factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "&ldquo;Dark patterns&rdquo; are <a "
 
"href=\"http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you\";>user
 "
 "interfaces designed to mislead users, or make option settings hard to "

Index: proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary-deception.ru.po 17 Apr 2019 10:00:17 -0000      1.53
+++ proprietary-deception.ru.po 20 Apr 2019 07:31:38 -0000      1.54
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2018-09-27 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -71,6 +72,37 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"В Фольксвагене запрограммировали 
компьютеры в двигателях своих автомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\">обнаружение тестов выхлопных 
газов, проводимых Агентством по "
+"охране окружающей среды</a> США, и 
загрязнять воздух все остальное время.  "
+"При движении в реальных условиях 
автомобили превышали нормы выхлопа в 35 раз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Применение свободных программ не 
помешало бы Фольксвагену 
запрограммировать "
+"компьютер таким образом, но это было бы 
труднее скрыть, и у пользователей "
+"была бы возможность исправить обман."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-";
 "policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
 "virus-scans/\"> using proprietary &ldquo;PC Health Check&rdquo; software</a> "
@@ -168,30 +200,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"В Фольксвагене запрограммировали 
компьютеры в двигателях своих автомобилей "
-"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-"emissions\">обнаружение тестов выхлопных 
газов, проводимых Агентством по "
-"охране окружающей среды</a> США, и 
загрязнять воздух все остальное время.  "
-"При движении в реальных условиях 
автомобили превышали нормы выхлопа в 35 раз."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Применение свободных программ не 
помешало бы Фольксвагену 
запрограммировать "
-"компьютер таким образом, но это было бы 
труднее скрыть, и у пользователей "
-"была бы возможность исправить обман."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
 "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
 "you\">user interfaces designed to mislead users, or make option settings "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.de-diff.html    18 Apr 2019 10:00:40 -0000      1.79
+++ proprietary.de-diff.html    20 Apr 2019 07:31:38 -0000      1.80
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
@@ -102,17 +102,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -127,9 +127,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -185,6 +185,22 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
@@ -223,19 +239,6 @@
     computer was infected and buy unneeded support services from the
     company.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
-
-    &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -296,7 +299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/18 10:00:40 $
+$Date: 2019/04/20 07:31:38 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.de.po   18 Apr 2019 10:00:40 -0000      1.121
+++ proprietary.de.po   20 Apr 2019 07:31:38 -0000      1.122
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -430,6 +430,56 @@
 msgstr "Letzte Ergänzungen"
 
 #. type: Content of: <ul><li><p>
+# | [-<a
+# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>-]Volkswagen
+# | programmed its car engine computers to {+<a
+# | 
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>+}
+# | detect the Environmental Protection Agency's emission tests</a>, and run
+# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
+# | standards by a factor of up to 35.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#| "rest of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde „saubere“ Emissionstests nachweisen zu 
können</a> "
+"und fuhr ansonsten unsauber."
+
+#. type: Content of: <ul><li><p>
+# | Using free software would not have stopped Volkswagen from programming it
+# | this way, but would have made it harder to [-conceal.-] {+conceal, and
+# | given the users the possibility of correcting the deception.+}
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu 
"
+"programmieren, hätte es aber erschwert es zu verbergen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
@@ -477,22 +527,6 @@
 "computer was infected and buy unneeded support services from the company."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.es.po   19 Apr 2019 15:53:55 -0000      1.146
+++ proprietary.es.po   20 Apr 2019 07:31:38 -0000      1.147
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -298,6 +299,38 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen programó los ordenadores que controlan el motor de sus coches "
+"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-";
+"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
+"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En 
"
+"situaciones reales, los coches producían emisiones que llegaban a "
+"multiplicar por 35 los estándares permitidos."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"El uso de software libre no habría impedido que Volkswagen lo programara de "
+"esa manera, pero lo habría hecho más difícil de ocultar, y habría dado a 
los "
+"usuarios la posibilidad de corregir el engaño."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -369,31 +402,6 @@
 "infectado y así este contratara sin necesidad servicios de mantenimiento de "
 "la compañía."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"El protocolo de telemetría Conexus, de Medtronics, tiene <a href=\"http://";
-"www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\">dos vulnerabilidades que afectan a varios modelos de "
-"desfibriladores implantables</a> y a los dispositivos a los que se conectan."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"Este protocolo se ha estado utilizando aproximadamente desde 2006, y en 2008 "
-"se descubrieron vulnerabilidades similares en un protocolo de comunicaciones "
-"anterior de Medtronics. Es obvio que la compañía no hizo nada por "
-"solucionarlo. Esto significa que no se puede confiar en que los "
-"desarrolladores de software privativo arreglen los fallos de sus productos."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +481,32 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "El protocolo de telemetría Conexus, de Medtronics, tiene <a 
href=\"http://";
+#~ "www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\">dos vulnerabilidades que afectan a varios modelos de "
+#~ "desfibriladores implantables</a> y a los dispositivos a los que se "
+#~ "conectan."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "Este protocolo se ha estado utilizando aproximadamente desde 2006, y en "
+#~ "2008 se descubrieron vulnerabilidades similares en un protocolo de "
+#~ "comunicaciones anterior de Medtronics. Es obvio que la compañía no hizo "
+#~ "nada por solucionarlo. Esto significa que no se puede confiar en que los "
+#~ "desarrolladores de software privativo arreglen los fallos de sus "
+#~ "productos."
+
+#~ msgid ""
 #~ "Car companies are coming up with a list of clever reasons why <a href="
 #~ "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 #~ "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary.fr.po   18 Apr 2019 10:48:27 -0000      1.178
+++ proprietary.fr.po   20 Apr 2019 07:31:38 -0000      1.179
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2019-04-18 12:46+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,39 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-";
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des États-Unis)</a>&hellip; et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'à 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile 
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -365,31 +399,6 @@
 "de faux résultats</a> leur faisant croire que leur ordinateur était 
infecté, "
 "afin de leur vendre des services de maintenance inutiles."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"Le protocole « Conexus » de télémétrie, conçu par Medtronics, 
contient <a "
-"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-";
-"vulnerable-to-hacking/507470932/\">deux vulnérabilités qui affectent "
-"plusieurs modèles de défibrillateurs implantables</a> et les appareils "
-"auxquels ils se connectent."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"Ce protocole existe depuis 2006 et des vulnérabilités similaires ont été "
-"découvertes en 2008 dans un protocole de communication plus ancien de "
-"Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs "
-"de logiciel privateur pour corriger les bogues de leurs programmes."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -463,3 +472,28 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "Le protocole « Conexus » de télémétrie, conçu par Medtronics, 
contient <a "
+#~ "href=\"http://www.startribune.com/750-000-medtronic-defibrillators-";
+#~ "vulnerable-to-hacking/507470932/\">deux vulnérabilités qui affectent "
+#~ "plusieurs modèles de défibrillateurs implantables</a> et les appareils "
+#~ "auxquels ils se connectent."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "Ce protocole existe depuis 2006 et des vulnérabilités similaires ont 
été "
+#~ "découvertes en 2008 dans un protocole de communication plus ancien de "
+#~ "Medtronics. Cela montre qu'on ne peut pas faire confiance aux "
+#~ "développeurs de logiciel privateur pour corriger les bogues de leurs "
+#~ "programmes."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.it-diff.html    18 Apr 2019 10:00:40 -0000      1.91
+++ proprietary.it-diff.html    20 Apr 2019 07:31:39 -0000      1.92
@@ -40,15 +40,15 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
 <span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
 #TOC { width: 55em; }
@@ -101,18 +101,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,22 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
@@ -222,19 +238,6 @@
     computer was infected and buy unneeded support services from the
     company.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
-
-    &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -295,7 +298,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/18 10:00:40 $
+$Date: 2019/04/20 07:31:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.it.po   18 Apr 2019 10:00:40 -0000      1.130
+++ proprietary.it.po   20 Apr 2019 07:31:39 -0000      1.131
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -481,22 +504,6 @@
 "computer was infected and buy unneeded support services from the company."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary.ja-diff.html    18 Apr 2019 10:00:41 -0000      1.92
+++ proprietary.ja-diff.html    20 Apr 2019 07:31:39 -0000      1.93
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -181,6 +181,22 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
@@ -219,19 +235,6 @@
     computer was infected and buy unneeded support services from the
     company.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
-
-    &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -292,7 +295,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary.ja.po   18 Apr 2019 10:00:41 -0000      1.113
+++ proprietary.ja.po   20 Apr 2019 07:31:39 -0000      1.114
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -354,6 +354,42 @@
 msgstr "最新の追加"
 
 #. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"フォルクスワーゲンは車のエンジンのコンピュータを環境保護局の排気テストを検出"
+"するようにプログラム
し、そのほかの時には汚して走るようにしました。"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"自由ソフトウェアを使うことはフォルクスワーゲンがこのようにしてプログラãƒ
 ã™ã‚‹"
+"ことを止められなかったかもしれませんが、隠
すことを困難にはしたでしょう。"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
@@ -401,22 +437,6 @@
 "computer was infected and buy unneeded support services from the company."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.nl-diff.html    18 Apr 2019 10:00:41 -0000      1.91
+++ proprietary.nl-diff.html    20 Apr 2019 07:31:39 -0000      1.92
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,22 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
@@ -222,19 +238,6 @@
     computer was infected and buy unneeded support services from the
     company.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
-
-    &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -295,7 +298,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary.nl.po   18 Apr 2019 10:00:41 -0000      1.102
+++ proprietary.nl.po   20 Apr 2019 07:31:39 -0000      1.103
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -474,22 +497,6 @@
 "computer was infected and buy unneeded support services from the company."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.pl-diff.html    18 Apr 2019 10:00:41 -0000      1.109
+++ proprietary.pl-diff.html    20 Apr 2019 07:31:39 -0000      1.110
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
-instances of malicious functionalities (with more than 450 references to
+&lt;p&gt;As of April, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -126,18 +126,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -182,6 +182,22 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
@@ -220,19 +236,6 @@
     computer was infected and buy unneeded support services from the
     company.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
-
-    &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -293,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:39 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.pl.po   18 Apr 2019 10:00:41 -0000      1.97
+++ proprietary.pl.po   20 Apr 2019 07:31:39 -0000      1.98
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -556,22 +579,6 @@
 "computer was infected and buy unneeded support services from the company."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.pot     18 Apr 2019 10:00:41 -0000      1.94
+++ proprietary.pot     20 Apr 2019 07:31:39 -0000      1.95
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a "
+"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\";>
 "
+"detect the Environmental Protection Agency's emission tests</a>, and run "
+"dirty the rest of the time. In real driving, the cars exceeded emissions "
+"standards by a factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a "
+"href=\"https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison\";>
 "
+"charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a "
 
"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
 "saves the data for years</a>."
@@ -290,23 +313,6 @@
 "infected and buy unneeded support services from the company."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a "
-"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\";>
 "
-"two vulnerabilities that affect several models of implantable "
-"defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in "
-"2008. Apparently, nothing was done by the company to correct them. This "
-"means you can't rely on proprietary software developers to fix bugs in their "
-"products."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.pt-br.po        18 Apr 2019 10:00:41 -0000      1.140
+++ proprietary.pt-br.po        20 Apr 2019 07:31:39 -0000      1.141
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2019-04-16 00:31-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -298,6 +298,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -350,32 +373,6 @@
 "pensar que o computador estava infectado e comprar serviços de suporte "
 "desnecessários da empresa."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"O Protocolo de Telemetria da Medtronics Conexus tem <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> duas vulnerabilidades que afetam vários modelos de "
-"desfibriladores implantáveis </a> e os dispositivos aos quais eles se "
-"conectam."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"Esse protocolo existe desde 2006, e vulnerabilidades semelhantes foram "
-"descobertas em um protocolo de comunicação anterior da Medtronics em 2008. "
-"Aparentemente, nada foi feito pela empresa para corrigi-las. Isso significa "
-"que você não pode confiar em desenvolvedores de software proprietários 
para "
-"corrigir erros em seus produtos."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -451,6 +448,31 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "O Protocolo de Telemetria da Medtronics Conexus tem <a href=\"http://www.";
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> duas vulnerabilidades que afetam vários modelos de "
+#~ "desfibriladores implantáveis </a> e os dispositivos aos quais eles se "
+#~ "conectam."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "Esse protocolo existe desde 2006, e vulnerabilidades semelhantes foram "
+#~ "descobertas em um protocolo de comunicação anterior da Medtronics em "
+#~ "2008. Aparentemente, nada foi feito pela empresa para corrigi-las. Isso "
+#~ "significa que você não pode confiar em desenvolvedores de software "
+#~ "proprietários para corrigir erros em seus produtos."
+
+#~ msgid ""
 #~ "Car companies are coming up with a list of clever reasons why <a href="
 #~ "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 #~ "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary.ru.po   18 Apr 2019 12:29:50 -0000      1.218
+++ proprietary.ru.po   20 Apr 2019 07:31:39 -0000      1.219
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,37 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"В Фольксвагене запрограммировали 
компьютеры в двигателях своих автомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\">обнаружение тестов выхлопных 
газов, проводимых Агентством по "
+"охране окружающей среды</a> США, и 
загрязнять воздух все остальное время.  "
+"При движении в реальных условиях 
автомобили превышали нормы выхлопа в 35 раз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Применение свободных программ не 
помешало бы Фольксвагену 
запрограммировать "
+"компьютер таким образом, но это было бы 
труднее скрыть, и у пользователей "
+"была бы возможность исправить обман."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -370,31 +402,6 @@
 "на мысль, что их компьютер заражен, и они 
покупали у компании ненужные "
 "услуги поддержки."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"В протоколе телеметрии Medtronics Conexus есть <a 
href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> две уязвимости, которым 
подвержены несколько моделей "
-"имплантируемых дефибрилляторов</a> и 
устройств, с которыми они соединяются."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"Этот протокол применяется с 2006 года, и сх
одные уязвимости были обнаружены "
-"в более раннем протоколе Medtronics 
в&nbsp;2008&nbsp;году. Очевидно, "
-"компания ничего не предпринимала для их 
устранения. Это значит, что нельзя "
-"рассчитывать, что разработчики 
несвободных программ будут устранять 
ошибки в "
-"своих продуктах."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -474,6 +481,31 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "В протоколе телеметрии Medtronics Conexus есть <a 
href=\"http://www.";
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> две уязвимости, которым 
подвержены несколько "
+#~ "моделей имплантируемых 
дефибрилляторов</a> и устройств, с которыми 
они "
+#~ "соединяются."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "Этот протокол применяется с 2006 года, и сх
одные уязвимости были "
+#~ "обнаружены в более раннем протоколе 
Medtronics в&nbsp;2008&nbsp;году. "
+#~ "Очевидно, компания ничего не 
предпринимала для их устранения. Это 
значит, "
+#~ "что нельзя рассчитывать, что 
разработчики несвободных программ будут "
+#~ "устранять ошибки в своих продуктах."
+
+#~ msgid ""
 #~ "Car companies are coming up with a list of clever reasons why <a href="
 #~ "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-";
 #~ "privacy.html\"> they &ldquo;have to&rdquo; put cameras and microphones in "

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.zh-tw-diff.html 18 Apr 2019 10:00:41 -0000      1.69
+++ proprietary.zh-tw-diff.html 20 Apr 2019 07:31:41 -0000      1.70
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
@@ -102,17 +102,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -127,9 +127,9 @@
    &lt;ul&gt;
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
@@ -160,10 +160,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -185,6 +185,22 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904150"&gt;
+    &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
+    
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
+    detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
+    run dirty the rest of the time. In real driving, the cars exceeded
+    emissions standards by a factor of up to 35.&lt;/p&gt;
+
+    &lt;p&gt;Using free software would not have stopped Volkswagen from
+    programming it this way, but would have made it harder to conceal,
+    and given the users the possibility of correcting the deception.&lt;/p&gt;
+
+    &lt;p&gt;Former executives of Volkswagen have been &lt;a
+    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    charged with this fraud&lt;/a&gt; in Germany.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904130"&gt;
     &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
     
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
@@ -223,19 +239,6 @@
     computer was infected and buy unneeded support services from the
     company.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
-    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
-
-    &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in an earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done by the company to
-    correct them. This means you can't rely on proprietary software
-    developers to fix bugs in their products.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -296,7 +299,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:41 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary.zh-tw.po        18 Apr 2019 10:00:41 -0000      1.80
+++ proprietary.zh-tw.po        20 Apr 2019 07:31:42 -0000      1.81
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google tracks the movements of Android phones, and sometimes <a href="
 "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
 "police.html\"> saves the data for years</a>."
@@ -390,22 +413,6 @@
 "computer was infected and buy unneeded support services from the company."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- pt-br.po    18 Apr 2019 10:00:41 -0000      1.92
+++ pt-br.po    20 Apr 2019 07:31:42 -0000      1.93
@@ -2313,6 +2313,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2499,22 +2522,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- ru.po       18 Apr 2019 12:02:32 -0000      1.157
+++ ru.po       20 Apr 2019 07:31:42 -0000      1.158
@@ -3164,6 +3164,37 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"В Фольксвагене запрограммировали 
компьютеры в двигателях своих автомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
+"emissions\">обнаружение тестов выхлопных 
газов, проводимых Агентством по "
+"охране окружающей среды</a> США, и 
загрязнять воздух все остальное время.  "
+"При движении в реальных условиях 
автомобили превышали нормы выхлопа в 35 раз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Применение свободных программ не 
помешало бы Фольксвагену 
запрограммировать "
+"компьютер таким образом, но это было бы 
труднее скрыть, и у пользователей "
+"была бы возможность исправить обман."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3401,30 +3432,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"В Фольксвагене запрограммировали 
компьютеры в двигателях своих автомобилей "
-"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
-"emissions\">обнаружение тестов выхлопных 
газов, проводимых Агентством по "
-"охране окружающей среды</a> США, и 
загрязнять воздух все остальное время.  "
-"При движении в реальных условиях 
автомобили превышали нормы выхлопа в 35 раз."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Применение свободных программ не 
помешало бы Фольксвагену 
запрограммировать "
-"компьютер таким образом, но это было бы 
труднее скрыть, и у пользователей "
-"была бы возможность исправить обман."
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -4401,8 +4408,8 @@
 "airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
 "a>."
 msgstr ""
-"Было обнаружено, что телефон на базе Android 
отслеживает местоположение "
-"даже в режиме полета. В этом режиме данные 
от не отсылал. Вместо этого <a href="
+"Было обнаружено, что телефон на базе Android 
отслеживает местоположение даже "
+"в режиме полета. В этом режиме данные от не 
отсылал. Вместо этого <a href="
 "\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
 "airplane-mode-turned-on/\"> от сохранял данные и 
отсылал их впоследствии</a>."
 

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- zh-tw.po    18 Apr 2019 10:00:41 -0000      1.70
+++ zh-tw.po    20 Apr 2019 07:31:42 -0000      1.71
@@ -2233,6 +2233,29 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www.";
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian.";
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc.";
 "com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
 "contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2390,22 +2413,6 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www.";
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
 "Security researchers discovered a <a href=\"http://www.theguardian.com/";
 "technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
 "diagnostic dongles used for vehicle tracking and insurance</a> that let them "



reply via email to

[Prev in Thread] Current Thread [Next in Thread]