www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-microsoft.fr.html malwa...


From: GNUN
Subject: www/proprietary malware-microsoft.fr.html malwa...
Date: Mon, 22 Apr 2019 08:00:13 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/04/22 08:00:09

Modified files:
        proprietary    : malware-microsoft.fr.html 
                         malware-mobiles.fr.html 
                         proprietary-sabotage.fr.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-microsoft.fr-en.html 
                         malware-mobiles.fr-en.html nl.po pl.po pot 
                         proprietary-sabotage.fr-en.html 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.412&r2=1.413
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.292&r2=1.293
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.509&r2=1.510
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.75&r2=1.76

Patches:
Index: malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- malware-microsoft.fr.html   21 Apr 2019 08:59:55 -0000      1.80
+++ malware-microsoft.fr.html   22 Apr 2019 12:00:07 -0000      1.81
@@ -302,7 +302,8 @@
 pourrait avoir intentionnellement désactivés, et regagner ainsi la totalité
 de son pouvoir sur lui. Microsoft a poussé à plusieurs reprises des versions
 défectueuses de ce programme sur les machines des utilisateurs, ce qui a
-causé de nombreux problèmes, certains critiques.</p>
+causé de nombreux problèmes, parfois <a
+href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>critiques</a>.</p>
 
     <p>Voilà un exemple de l'attitude arrogante et manipulatrice que les
 développeurs de logiciel privateur ont appris à adopter envers les gens
@@ -687,7 +688,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:07 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-mobiles.fr.html     9 Apr 2019 18:00:20 -0000       1.75
+++ malware-mobiles.fr.html     22 Apr 2019 12:00:07 -0000      1.76
@@ -398,6 +398,18 @@
 <h3 id="surveillance">Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201904131">
+    <p>Les données collectées par les applis surveillant le cycle menstruel 
et la
+grossesse sont souvent <a
+href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>accessibles
+aux employeurs et aux compagnies d'assurance</a>. Bien que ces données
+soient « anonymisées et agrégées », on peut facilement retrouver quelle
+femme utilise l'appli.</p>
+
+    <p>Ceci a des implications néfastes pour les droits des femmes à la
+non-discrimination dans l'emploi et au libre choix en matière de 
maternité.</p>
+  </li>
+
   <li id="M201903251">
     <p>Un grand nombre de téléphones sous Android sont livrés avec une 
quantité
 énorme d'<a
@@ -1084,7 +1096,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/22 12:00:07 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-sabotage.fr.html        21 Apr 2019 08:59:55 -0000      1.78
+++ proprietary-sabotage.fr.html        22 Apr 2019 12:00:07 -0000      1.79
@@ -55,7 +55,8 @@
 pourrait avoir intentionnellement désactivés, et regagner ainsi la totalité
 de son pouvoir sur lui. Microsoft a poussé à plusieurs reprises des versions
 défectueuses de ce programme sur les machines des utilisateurs, ce qui a
-causé de nombreux problèmes, certains critiques.</p>
+causé de nombreux problèmes, parfois <a
+href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>critiques</a>.</p>
 
     <p>Voilà un exemple de l'attitude arrogante et manipulatrice que les
 développeurs de logiciel privateur ont appris à adopter envers les gens
@@ -652,7 +653,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:07 $
 
 <!-- timestamp end -->
 </p>

Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/de.po    22 Apr 2019 11:01:27 -0000      1.75
+++ po/de.po    22 Apr 2019 12:00:07 -0000      1.76
@@ -10775,6 +10775,17 @@
 msgid "Latest additions"
 msgstr "Letzte Ergänzungen"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- po/es.po    22 Apr 2019 11:01:27 -0000      1.100
+++ po/es.po    22 Apr 2019 12:00:07 -0000      1.101
@@ -8660,6 +8660,17 @@
 msgid "Latest additions"
 msgstr "Añadidos recientes"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- po/fr.po    22 Apr 2019 11:41:32 -0000      1.131
+++ po/fr.po    22 Apr 2019 12:00:07 -0000      1.132
@@ -9011,6 +9011,17 @@
 msgid "Latest additions"
 msgstr "Ajouts récents"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/it.po    22 Apr 2019 11:01:27 -0000      1.75
+++ po/it.po    22 Apr 2019 12:00:07 -0000      1.76
@@ -10026,6 +10026,17 @@
 msgid "Latest additions"
 msgstr "Ultime aggiunte"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/ja.po    22 Apr 2019 11:01:29 -0000      1.75
+++ po/ja.po    22 Apr 2019 12:00:07 -0000      1.76
@@ -8578,6 +8578,17 @@
 msgid "Latest additions"
 msgstr "最新の追加"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""

Index: po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/malware-microsoft.fr-en.html     21 Apr 2019 08:59:55 -0000      1.74
+++ po/malware-microsoft.fr-en.html     22 Apr 2019 12:00:07 -0000      1.75
@@ -291,7 +291,9 @@
     &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
     them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which critical.</p>
+    users' machines, causing numerous problems, some of which <a
+    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>
+    critical</a>.</p>
 
     <p>This exemplifies the arrogant and manipulative attitude
     that proprietary software developers have learned to adopt
@@ -655,7 +657,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- po/malware-mobiles.fr-en.html       9 Apr 2019 18:00:20 -0000       1.65
+++ po/malware-mobiles.fr-en.html       22 Apr 2019 12:00:07 -0000      1.66
@@ -379,6 +379,18 @@
 <h3 id="surveillance">Mobile Surveillance</h3>
 
 <ul class="blurbs">
+  <li id="M201904131">
+    <p>Data collected by menstrual and pregnancy monitoring apps is often <a
+    
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance";>
+    available to employers and insurance companies</a>. Even though the
+    data is &ldquo;anonymized and aggregated,&rdquo; it can easily be
+    traced back to the woman who uses the app.</p>
+
+    <p>This has harmful implications for women's rights to equal employment
+    and control over their own body. Don't use these apps, even if someone
+    offers you a reward to do so.</p>
+  </li>
+
   <li id="M201903251">
     <p>Many Android phones come with a huge number of <a
     
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html";>
@@ -1020,7 +1032,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/22 12:00:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/nl.po    22 Apr 2019 11:01:29 -0000      1.75
+++ po/nl.po    22 Apr 2019 12:00:07 -0000      1.76
@@ -7036,6 +7036,17 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/pl.po    22 Apr 2019 11:01:29 -0000      1.75
+++ po/pl.po    22 Apr 2019 12:00:08 -0000      1.76
@@ -6546,6 +6546,17 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 # | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
 # | Free Software Foundation, Inc.
 #. type: Content of: <div><p>

Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/pot      22 Apr 2019 11:01:29 -0000      1.75
+++ po/pot      22 Apr 2019 12:00:08 -0000      1.76
@@ -6043,6 +6043,17 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- po/proprietary-sabotage.fr-en.html  21 Apr 2019 08:59:55 -0000      1.68
+++ po/proprietary-sabotage.fr-en.html  22 Apr 2019 12:00:08 -0000      1.69
@@ -47,7 +47,9 @@
     &ldquo;repair&rdquo; any components of the updating system that users
     may have intentionally disabled, and thus regain full power over
     them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which critical.</p>
+    users' machines, causing numerous problems, some of which <a
+    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/";>
+    critical</a>.</p>
 
     <p>This exemplifies the arrogant and manipulative attitude
     that proprietary software developers have learned to adopt
@@ -611,7 +613,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/21 08:59:55 $
+$Date: 2019/04/22 12:00:08 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-surveillance.de-diff.html    22 Apr 2019 11:01:29 -0000      
1.64
+++ po/proprietary-surveillance.de-diff.html    22 Apr 2019 12:00:08 -0000      
1.65
@@ -1121,17 +1121,15 @@
   &lt;li id="M201804160"&gt;
     &lt;p&gt;More than &lt;a
     
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of the 5,855 Android apps studied by researchers were found to 
snoop</em></ins></span>
-    and <span class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of</em></ins></span> the <span 
class="removed"><del><strong>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>apps were
-    found</em></ins></span> to <span class="removed"><del><strong>read logs
-      for</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch on its users.  Furthermore, they could
+    of the 5,855 Android apps studied by researchers were found to snoop
+    and collect information about its users&lt;/a&gt;.  40% of the apps were
+    found to insecurely snitch on its users.  Furthermore, they could
     detect only some methods of snooping, in these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
-    in</em></ins></span> other <span class="inserted"><ins><em>ways.&lt;/p&gt;
+    in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary</em></ins></span> apps <span 
class="inserted"><ins><em>generally work against
-    their users.  To protect their privacy</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN 
developers</strong></del></span> <span class="inserted"><ins><em>freedom, 
Android users
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
     Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
     and the proprietary apps by getting apps from the free software
@@ -1146,11 +1144,8 @@
     which users are HIV-positive, then provides the information to
     companies&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Grindr should not</em></ins></span> have <span 
class="removed"><del><strong>confirmed this.&lt;/dd&gt;
-
-    &lt;dt&gt;HideMyAss&lt;/dt&gt;
-    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>so much information about its users.
-    It could be designed so that users communicate such info</em></ins></span> 
to <span class="removed"><del><strong>LinkedIn. Also, it stores detailed 
logs</strong></del></span> <span class="inserted"><ins><em>each
+    &lt;p&gt;Grindr should not have so much information about its users.
+    It could be designed so that users communicate such info to each
     other but not to the server's database.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1158,14 +1153,20 @@
     &lt;p&gt;The moviepass app and dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
+    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>after 
going</em></ins></span> to <span class="removed"><del><strong>read logs
+      for other</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711240"&gt;
-    &lt;p&gt;Tracking software in popular Android apps
-    is pervasive and sometimes very clever. Some trackers can &lt;a
+    &lt;p&gt;Tracking software in popular Android</em></ins></span> apps
+    <span class="inserted"><ins><em>is pervasive</em></ins></span> and <span 
class="removed"><del><strong>also core system logs. TigerVPN developers
+      have confirmed this.&lt;/dd&gt;
+
+    &lt;dt&gt;HideMyAss&lt;/dt&gt;
+    &lt;dd&gt;Sends traffic</strong></del></span> <span 
class="inserted"><ins><em>sometimes very clever. Some trackers can &lt;a
     
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
     follow a user's movements around a physical store by noticing WiFi
     networks&lt;/a&gt;.&lt;/p&gt;
@@ -1175,7 +1176,7 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article misuses the words
+    book</em></ins></span> to <span class="removed"><del><strong>LinkedIn. 
Also, it stores detailed logs</strong></del></span> <span 
class="inserted"><ins><em>developer's server.  Note that this article misuses 
the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -1202,14 +1203,14 @@
 
     &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
     &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
+      roughly 5 tracking libraries. Developers of this app have
+      confirmed that</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>non-premium version</strong></del></span> 
<span class="inserted"><ins><em>responsibility for the injustice of their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google</em></ins></span> have
-      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
+    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="inserted"><ins><em>preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
@@ -1247,17 +1248,18 @@
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+&lt;li&gt;
+  &lt;p&gt;A study found 234 Android apps</strong></del></span> <span 
class="inserted"><ins><em>they don't.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
+  &lt;li id="M201705040"&gt;
     &lt;p&gt;A study found 234 Android apps that track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
-    to ultrasound from beacons placed in stores or played by TV <span 
class="removed"><del><strong>programs&lt;/a&gt;.
-       &lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>programs&lt;/a&gt;.&lt;/p&gt;
+    to ultrasound from beacons placed in stores or played by TV
+    programs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201704260"&gt;
@@ -1274,179 +1276,140 @@
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said that users gave consent for this,
-    would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    If the fine print of the app said</em></ins></span> that <span 
class="removed"><del><strong>track</strong></del></span> users <span 
class="removed"><del><strong>by</strong></del></span> <span 
class="inserted"><ins><em>gave consent for this,
+    would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>ultrasound from 
beacons placed in stores or played by TV programs&lt;/a&gt;.
+       &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>design
     the app to snoop at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201704074"&gt;</em></ins></span>
-    &lt;p&gt;Pairs of <span class="removed"><del><strong>Android apps can 
collude to transmit users' personal</strong></del></span> <span 
class="inserted"><ins><em>Android apps can collude
+    &lt;p&gt;Pairs of Android apps can collude
     to transmit users' personal data to servers. &lt;a
     
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
     study found tens of thousands of pairs that collude&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201703300"&gt;
-    &lt;p&gt;Verizon &lt;a
-    
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-    announced an opt-in proprietary search app that it will&lt;/a&gt; 
pre-install
-    on some of its phones. The app will give Verizon the same information
-    about the users' searches that Google normally gets when they use
-    its search engine.&lt;/p&gt;
-
-    &lt;p&gt;Currently, the app is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;, and the user must
-    explicitly opt-in before the app takes effect. However, the app
-    remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201701210"&gt;
-    &lt;p&gt;The Meitu photo-editing app &lt;a
-    
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user</em></ins></span> data to <span class="removed"><del><strong>servers. 
&lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
-       tens of thousands of pairs that 
collude&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Google Play intentionally sends</strong></del></span>
+&lt;p&gt;Google Play intentionally sends app developers</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber</em></ins></span> app <span 
class="removed"><del><strong>developers</strong></del></span> <span 
class="inserted"><ins><em>tracks</em></ins></span> &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201703300"&gt;
+    &lt;p&gt;Verizon</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
-the personal details of users that install</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>app&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Merely asking</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
+the personal details of users</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+    announced an opt-in proprietary search app</em></ins></span> that <span 
class="removed"><del><strong>install the app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This example illustrates how &ldquo;getting</em></ins></span> the 
<span class="removed"><del><strong>&ldquo;consent&rdquo; of 
users</strong></del></span> <span class="inserted"><ins><em>user's
-    consent&rdquo; for surveillance</em></ins></span> is <span 
class="removed"><del><strong>not enough
+&lt;p&gt;Merely asking the &ldquo;consent&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>it will&lt;/a&gt; pre-install
+    on some</em></ins></span> of <span class="removed"><del><strong>users is 
not enough
 to legitimize actions like this.  At this point, most users have
-stopped reading</strong></del></span> <span 
class="inserted"><ins><em>inadequate as a protection against
-    massive surveillance.&lt;/p&gt;
-  &lt;/li&gt;
+stopped reading</strong></del></span> <span class="inserted"><ins><em>its 
phones. The app will give Verizon</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms and 
Conditions&rdquo;</strong></del></span> <span class="inserted"><ins><em>same 
information
+    about the users' searches</em></ins></span> that <span 
class="removed"><del><strong>spell out
+what they are &ldquo;consenting&rdquo; to.</strong></del></span> Google <span 
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span 
class="inserted"><ins><em>normally gets when they use
+    its search engine.&lt;/p&gt;
 
-  &lt;li id="M201611160"&gt;
-    &lt;p&gt;A &lt;a
-    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>&ldquo;Terms</strong></del></span> <span 
class="inserted"><ins><em>privacy</em></ins></span> and <span 
class="removed"><del><strong>Conditions&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>security of
-    283 Android VPN apps concluded</em></ins></span> that <span 
class="removed"><del><strong>spell out
-what they are &ldquo;consenting&rdquo; to.  Google should clearly
-and honestly identify the information it collects on users, 
instead</strong></del></span> <span class="inserted"><ins><em>&ldquo;in 
spite</em></ins></span> of <span class="removed"><del><strong>hiding it in an 
obscurely worded EULA.&lt;/p&gt;
+    &lt;p&gt;Currently,</em></ins></span> the <span 
class="removed"><del><strong>information it collects</strong></del></span> 
<span class="inserted"><ins><em>app is &lt;a
+    
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</em></ins></span> on <span 
class="removed"><del><strong>users, instead
+of hiding it in an obscurely worded EULA.&lt;/p&gt;
 
-&lt;p&gt;However, to truly protect people's</strong></del></span> <span 
class="inserted"><ins><em>the promises
-    for</em></ins></span> privacy, <span class="removed"><del><strong>we must 
prevent Google</strong></del></span> <span 
class="inserted"><ins><em>security,</em></ins></span> and <span 
class="removed"><del><strong>other companies from getting this personal 
information in</strong></del></span> <span class="inserted"><ins><em>anonymity 
given by</em></ins></span> the <span class="removed"><del><strong>first
+&lt;p&gt;However, to truly protect people's privacy, we must prevent 
Google</strong></del></span> <span class="inserted"><ins><em>only one 
phone&lt;/a&gt;,</em></ins></span> and <span class="removed"><del><strong>other 
companies from getting this personal information in</strong></del></span> the 
<span class="removed"><del><strong>first
 place!&lt;/p&gt;
 &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>majority</em></ins></span> of <span 
class="removed"><del><strong>Android) &lt;a
-    
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
-    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Google Play (a component</strong></del></span> <span 
class="inserted"><ins><em>user must
+    explicitly opt-in before the app takes effect. However, the app
+    remains spyware&mdash;an &ldquo;optional&rdquo; piece</em></ins></span> of 
<span class="removed"><del><strong>Android)</strong></del></span> <span 
class="inserted"><ins><em>spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
-    disable Google Play itself to completely stop the tracking.  This is
-    yet another example</strong></del></span> <span 
class="inserted"><ins><em>VPN
-    apps&mdash;millions</em></ins></span> of <span 
class="removed"><del><strong>nonfree software pretending</strong></del></span> 
<span class="inserted"><ins><em>users may be unawarely 
subject</em></ins></span> to <span class="removed"><del><strong>obey the user,
-    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>poor security
-    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+  &lt;li id="M201701210"&gt;
+    &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Following is</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
-    unthinkable with free software.&lt;/p&gt;
+  &lt;li id="M201611280"&gt;
+    &lt;p&gt;The Uber app</em></ins></span> tracks <span 
class="removed"><del><strong>the users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;/li&gt;
+    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+    movements before</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
+    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
+    yet another</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
   
-  &lt;li&gt;&lt;p&gt;More than 73% of</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from</em></ins></span> the 
<span class="removed"><del><strong>most popular Android</strong></del></span> 
<span class="inserted"><ins><em>research paper,
-    of some proprietary VPN</em></ins></span> apps
-  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-  behavioral</strong></del></span> <span class="inserted"><ins><em>that track 
users</em></ins></span> and <span class="removed"><del><strong>location 
information&lt;/a&gt; of</strong></del></span> <span 
class="inserted"><ins><em>infringe</em></ins></span> their <span 
class="removed"><del><strong>users with third parties.&lt;/p&gt;
+    &lt;p&gt;This</em></ins></span> example <span 
class="removed"><del><strong>of nonfree software pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how 
&ldquo;getting</em></ins></span> the <span class="removed"><del><strong>user,
+    when it's actually doing something else.  Such</strong></del></span> <span 
class="inserted"><ins><em>user's
+    consent&rdquo; for surveillance is inadequate as</em></ins></span> a <span 
class="removed"><del><strong>thing would be almost
+    unthinkable with free software.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>protection against
+    massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span>
-    <span class="inserted"><ins><em>privacy:&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
 
-    &lt;dl class="compact"&gt;
-      &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries such as NativeX and Appflood,
-      meant</em></ins></span> to <span class="inserted"><ins><em>track users 
and show them targeted ads.&lt;/dd&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
+    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
+  behavioral</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated the privacy</em></ins></span> 
and <span class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>app's functionality,
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
   was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning it has full access to users'
-      text messages.&lt;/dd&gt;
+  found in the 500 most popular gratis</strong></del></span>
+    <span class="inserted"><ins><em>283</em></ins></span> Android <span 
class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>500 most popular gratis Android 
apps&lt;/a&gt;.&lt;/p&gt;
-
-  &lt;p&gt;The article should not have described these apps as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</strong></del></span> <span 
class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>say
+  &lt;p&gt;The article should not have described these</strong></del></span> 
<span class="inserted"><ins><em>VPN</em></ins></span> apps <span 
class="removed"><del><strong>as
+  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
   &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>read logs</em></ins></span>
-      for <span class="removed"><del><strong>granted that the usual analytics 
tools are
-  legitimate, but is that valid?  Software</strong></del></span> <span 
class="inserted"><ins><em>other apps and also core system logs. 
TigerVPN</em></ins></span> developers have <span 
class="removed"><del><strong>no right</strong></del></span>
-      <span class="inserted"><ins><em>confirmed this.&lt;/dd&gt;
-
-      &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic</em></ins></span> to
-  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
+  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>concluded</em></ins></span> that <span 
class="inserted"><ins><em>&ldquo;in spite of</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers have no right to
+  analyze what</strong></del></span> <span class="inserted"><ins><em>promises
+    for privacy, security, and anonymity given by the majority of VPN
+    apps&mdash;millions of</em></ins></span> users <span 
class="removed"><del><strong>are doing or how.  &ldquo;Analytics&rdquo; tools 
that snoop are
   just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span class="inserted"><ins><em>LinkedIn. 
Also, it stores detailed logs and
-      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>the UK government if requested.&lt;/dd&gt;
-
-      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection is to display ads. Uses
-      roughly five tracking libraries. Also, it redirects the user's
-      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
-
-      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on</strong></del></span> <span class="inserted"><ins><em>also uses 
roughly
-      five tracking libraries. Developers of this app have confirmed 
that</em></ins></span>
-      the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of the app does JavaScript 
injection for
-      tracking the user and displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
-      Some Motorola phones modify Android to</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+      connect</strong></del></span> <span class="inserted"><ins><em>may be 
unawarely subject</em></ins></span> to <span class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>poor security
+    guarantees</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on the average.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>abusive practices inflicted by VPN 
apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices when they are sold.
+      Some Motorola phones modify Android to
+      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> a
+      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+    of some proprietary VPN apps that track users and infringe their
+    privacy:&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries</em></ins></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
-    and suggests you</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>picture you take according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>NativeX and Appflood,
+      meant</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
@@ -1456,143 +1419,222 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>who is</em></ins></span>
-    in <span class="removed"><del><strong>iThings&lt;/h4&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="inserted"><ins><em>show them targeted ads.&lt;/dd&gt;
 
-    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
-      would</strong></del></span> require <span 
class="removed"><del><strong>circumventing the iOS DRM.&lt;/p&gt;
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
+      illegal</strong></del></span> <span class="inserted"><ins><em>has full 
access</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because this
+      would require circumventing the iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi and Bluetooth</strong></del></span> <span class="inserted"><ins><em>online 
access to some
-    known-faces database, which means</em></ins></span> the
+  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>users'
+      text messages.&lt;/dd&gt;
+
+      &lt;dt&gt;DroidVPN</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests</em></ins></span> the
       <span class="removed"><del><strong>obvious way &lt;a
  
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
       A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>pictures are likely</em></ins></span> to be 
<span class="removed"><del><strong>spied on&rdquo;.&lt;/p&gt;
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;
   &lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span>
-    <span class="inserted"><ins><em>sent across the wire</em></ins></span> to 
<span class="removed"><del><strong>use it without having your fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>Facebook's servers and face-recognition
+      &mdash; which would mean no way</strong></del></span> <span 
class="inserted"><ins><em>read logs
+      for other apps and also core system logs. TigerVPN developers have
+      confirmed this.&lt;/dd&gt;
+
+      &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>stores detailed logs and
+      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>UK government if requested.&lt;/dd&gt;
+
+      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
+      users. The stated purpose of the JS injection</em></ins></span> is <span 
class="removed"><del><strong>snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span> <span class="inserted"><ins><em>to display 
ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
+
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
+      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> app <span 
class="removed"><del><strong>on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span> <span 
class="inserted"><ins><em>have confirmed</em></ins></span> that
+      the <span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>non-premium 
version of</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers</strong></del></span> <span class="inserted"><ins><em>app 
does JavaScript injection</em></ins></span> for <span 
class="removed"><del><strong>at least 30
+        days.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
+      without giving a valid email address and receiving the code Apple
+      sends to it.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span>
+      <span class="inserted"><ins><em>tracking</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
+      &lt;a class="not-a-duplicate" 
+        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+       behavioral</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app &lt;a
+    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</em></ins></span>
+    all <span class="removed"><del><strong>the photos and
+      videos they make.&lt;/p&gt;
+
+    &lt;blockquote&gt;&lt;p&gt;
+      iCloud</strong></del></span> <span 
class="inserted"><ins><em>conversations&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic</em></ins></span> Photo <span 
class="removed"><del><strong>Library stores every</strong></del></span> <span 
class="inserted"><ins><em>app &lt;a
+    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    scans your mobile phone's</em></ins></span> photo <span 
class="inserted"><ins><em>collections for known 
faces&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>video</strong></del></span> <span 
class="inserted"><ins><em>suggests</em></ins></span> you <span 
class="removed"><del><strong>take,
+      and keeps them up</strong></del></span> to <span 
class="removed"><del><strong>date on all your devices.
+      Any edits</strong></del></span> <span class="inserted"><ins><em>share 
the picture</em></ins></span> you <span class="removed"><del><strong>make are 
automatically updated everywhere. [...]
+    &lt;/p&gt;&lt;/blockquote&gt;
+
+    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>take according to 
who</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span>
+    <span class="inserted"><ins><em>in</em></ins></span> the
+      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems to require online access to some
+    known-faces database, which</em></ins></span> means
+      <span class="removed"><del><strong>&ldquo;please don't ask 
where.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>the pictures are likely</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>be
+    sent across the wire to Facebook's servers and face-recognition
     algorithms.&lt;/p&gt;
 
-    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="removed"><del><strong>tell whether</strong></del></span> the <span 
class="removed"><del><strong>phone is snooping</strong></del></span> <span 
class="inserted"><ins><em>service.&lt;/p&gt;
+    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="inserted"><ins><em>the service.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a
-    
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop</em></ins></span> on
-      <span class="removed"><del><strong>them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>what people are listening to or watching&lt;/a&gt;. 
In addition,
-    it may be analyzing people's conversations to serve them with targeted
+    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>or 
watching&lt;/a&gt;. In addition,
+    it may be analyzing people's conversations</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any 
of</strong></del></span> <span 
class="inserted"><ins><em>serve</em></ins></span> them <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>with targeted
     advertisements.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span>
+    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> data <span 
class="removed"><del><strong>to Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and 
in server accounts,
-    it</em></ins></span> can
-        <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>alter</em></ins></span> them <span 
class="removed"><del><strong>from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    spy on many sorts of data</em></ins></span> in <span 
class="removed"><del><strong>iThings:
+      the &lt;a class="not-a-duplicate"
+            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>phone,</em></ins></span> and <span 
class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>in server 
accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps</em></ins></span> that <span 
class="inserted"><ins><em>include &lt;a
+    &lt;p&gt;Apps that include &lt;a
     
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
     Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
-    such as Facebook, Google+ and Twitter.&lt;/p&gt;
+    are playing nearby&lt;/a&gt;.  Also on what users post on 
various</em></ins></span> sites
+    <span class="inserted"><ins><em>such as Facebook, Google+ and 
Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511190"&gt;
     &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated to</em></ins></span> the <span class="removed"><del><strong>user 
types into it&lt;/a&gt;;</strong></del></span> <span 
class="inserted"><ins><em>app's functionality, was &lt;a
-    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in</em></ins></span> the <span class="removed"><del><strong>server 
records</strong></del></span> <span class="inserted"><ins><em>500 most popular 
gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+    unrelated</em></ins></span> to <span class="removed"><del><strong>track 
users, which is</strong></del></span> <span class="inserted"><ins><em>the app's 
functionality, was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The article should not have described</em></ins></span> these 
<span class="removed"><del><strong>numbers for at least 30
-        days.&lt;/p&gt;
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span 
class="inserted"><ins><em>should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that the usual analytics tools are
+    legitimate,</em></ins></span> but <span 
class="removed"><del><strong>it</strong></del></span> is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
 <span class="inserted"><ins><em>apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear 
way</em></ins></span>
-    to <span class="removed"><del><strong>install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>say &ldquo;zero price&rdquo; is 
&ldquo;gratis.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>code Apple
-      sends</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
-    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
+  &lt;li&gt;&lt;p&gt;The iThing also
+      &lt;a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> that <span class="removed"><del><strong>can be
+      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
+    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
     that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and</em></ins></span> 47% of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, from Android 
and</em></ins></span> iOS <span 
class="removed"><del><strong>apps</strong></del></span>
-    <span class="inserted"><ins><em>respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
-        
href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share</em></ins></span>
-    personal, behavioral and <span class="removed"><del><strong>location 
information&lt;/a&gt; of their</strong></del></span> <span 
class="inserted"><ins><em>location information&lt;/a&gt; of their users with
-    third parties.&lt;/p&gt;
+    &lt;p&gt;More than 73% and 47% of mobile applications, from 
Android</em></ins></span> and <span class="removed"><del><strong>regularly 
does,</strong></del></span> <span class="inserted"><ins><em>iOS
+    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
+    personal, behavioral and location information&lt;/a&gt; of their users with
+    third parties.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201508210"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
+      Either Apple helps the NSA snoop</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
     &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based on proprietary malware (DRM and snooping). In August 2015 it &lt;a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded</em></ins></span> users <span class="removed"><del><strong>with 
third parties.&lt;/p&gt;
+    based</em></ins></span> on <span class="removed"><del><strong>all the data 
in an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>proprietary 
malware (DRM and snooping). In August 2015</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iThings automatically upload</strong></del></span> <span 
class="inserted"><ins><em>submit</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers all the photos and
-      videos they make.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>exist for no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;, and some are starting
+    to realize that it</em></ins></span> is <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
 
-    &lt;blockquote&gt;&lt;p&gt;
-      iCloud Photo Library stores every photo and video you 
take,</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>keeps them up to date on all your devices.
-      Any edits you make</strong></del></span> <span 
class="inserted"><ins><em>some</em></ins></span> are <span 
class="removed"><del><strong>automatically updated everywhere. [...]
-    &lt;/p&gt;&lt;/blockquote&gt;
+    &lt;p&gt;This article shows</em></ins></span> the &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
 
-    &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>starting
-    to realize that it</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span> <span class="inserted"><ins><em>nasty.&lt;/p&gt;
-
-    &lt;p&gt;This article shows</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo; means
-      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;There is a way to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping</em></ins></span> as a
-      <span class="removed"><del><strong>surveillance functionality.&lt;/p&gt;
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage of 
this</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to
-      <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;serve&rdquo;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Tracking</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
     users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to break 
Apple's
-      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>the attitude</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
-  &lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>the proprietary software industry
+    typical example of the attitude of the proprietary</em></ins></span> 
software <span class="inserted"><ins><em>industry
     towards those they have subjugated.&lt;/p&gt;
 
     &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
@@ -1601,145 +1643,147 @@
   &lt;li id="M201506264"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
-    study</em></ins></span> in <span 
class="removed"><del><strong>iThings:</strong></del></span> <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of</em></ins></span> 
the <span class="removed"><del><strong>&lt;a class="not-a-duplicate"
-            
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> <span class="inserted"><ins><em>top-ranked gratis 
proprietary
-    Android apps contained recognizable tracking libraries. 
For</em></ins></span> the <span class="removed"><del><strong>iThing is,
-      and get other info too.&lt;/p&gt;
-  &lt;/li&gt;
+    study</em></ins></span> in <span 
class="removed"><del><strong>popular</strong></del></span> <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of the top-ranked 
gratis proprietary</em></ins></span>
+    Android apps <span class="removed"><del><strong>is pervasive and
+      sometimes very clever. Some trackers can &lt;a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
+      follow a user's movements around a physical store by noticing WiFi
+      networks&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which is
-      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That</strong></del></span> <span 
class="inserted"><ins><em>paid
+  &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
+      even when &ldquo;location services&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>contained recognizable tracking libraries. For the 
paid
     proprietary apps, it was only 60%.&lt;/p&gt;
 
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span 
class="inserted"><ins><em>confusingly describes gratis apps as
-    &ldquo;free&rdquo;,</em></ins></span> but <span 
class="removed"><del><strong>it
-      is still true</strong></del></span> <span class="inserted"><ins><em>most 
of them are not</em></ins></span> in <span class="removed"><del><strong>iOS 
7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>fact</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;.  It also uses the
-    ugly word &ldquo;monetize&rdquo;. A good replacement for</em></ins></span> 
that <span class="removed"><del><strong>can be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>word
-    is &ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis Android apps (but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for</strong></del></span>
-    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect to 100 &lt;a
-    
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking
-    and advertising&lt;/a&gt; URLs, on</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>average.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>turned off, even
+      when</strong></del></span> <span class="inserted"><ins><em>not in fact 
&lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also 
uses</em></ins></span> the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span>
+    <span class="inserted"><ins><em>ugly word &ldquo;monetize&rdquo;. A good 
replacement for that word
+    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis Android apps (but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+      sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;According</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;) connect</em></ins></span> to <span 
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>100</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;
+      by sending hidden text messages which enable them to turn the phones
+      on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</em></ins></span>
+    and <span class="removed"><del><strong>off, listen to the microphone, 
retrieve geo-location data from</strong></del></span> <span 
class="inserted"><ins><em>advertising&lt;/a&gt; URLs, on</em></ins></span> the
+      <span class="removed"><del><strong>GPS, take photographs, read text 
messages, read call, location and web
+      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>average.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504060"&gt;
+  &lt;li id="M201504060"&gt;
     &lt;p&gt;Widely used &lt;a
     
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-    QR-code scanner apps</em></ins></span> snoop on <span 
class="removed"><del><strong>all</strong></del></span> the <span 
class="removed"><del><strong>data in an iThing,
-      or it</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;. This</em></ins></span> is <span 
class="removed"><del><strong>totally incompetent.&lt;/a&gt;&lt;/p&gt;
+    QR-code scanner apps snoop on</em></ins></span> the <span 
class="removed"><del><strong>contact list.</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.</em></ins></span> This <span 
class="removed"><del><strong>malware</strong></del></span> is <span 
class="removed"><del><strong>designed</strong></del></span> <span 
class="inserted"><ins><em>in addition</em></ins></span> to
+      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>in addition to
-    the snooping done by the phone company, and perhaps by the OS in
-    the phone.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Samsung phones come with
+      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
+      and they send so much data that their transmission is a
+      substantial expense for users.  Said transmission, not wanted or
+      requested</strong></del></span>
+    <span class="inserted"><ins><em>the snooping done</em></ins></span> by the 
<span class="removed"><del><strong>user, clearly must constitute spying of some
+      kind.&lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;Don't be distracted by the question</em></ins></span> of <span 
class="removed"><del><strong>iOS seem</strong></del></span> <span 
class="inserted"><ins><em>whether the app developers
-    get users</em></ins></span> to <span class="removed"><del><strong>exist 
for</strong></del></span> <span class="inserted"><ins><em>say &ldquo;I 
agree&rdquo;. That is</em></ins></span> no
-      <span class="removed"><del><strong>possible 
purpose</strong></del></span> <span class="inserted"><ins><em>excuse for
-    malware.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A Motorola</strong></del></span> phone
+      <span class="removed"><del><strong>&lt;a 
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
+      listens for voice all</strong></del></span> <span 
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201411260"&gt;
-    &lt;p&gt;Many proprietary apps for mobile devices
-    report which</em></ins></span> other <span 
class="removed"><del><strong>than surveillance&lt;/a&gt;.  Here 
is</strong></del></span> <span class="inserted"><ins><em>apps</em></ins></span> 
the <span class="inserted"><ins><em>user has installed.</em></ins></span>  
&lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>OS</em></ins></span> in <span 
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+      Street Journal (in an article blocked from us</strong></del></span>
+    <span class="inserted"><ins><em>the phone.&lt;/p&gt;
+
+    &lt;p&gt;Don't be distracted</em></ins></span> by <span 
class="removed"><del><strong>a paywall)
+      reports that
+      &lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;</strong></del></span>
 the <span class="removed"><del><strong>FBI can remotely 
activate</strong></del></span> <span class="inserted"><ins><em>question of 
whether</em></ins></span> the <span class="removed"><del><strong>GPS and 
microphone in Android
+      phones and laptops&lt;/a&gt;.
+      (I suspect this means Windows laptops.)  Here</strong></del></span> 
<span class="inserted"><ins><em>app developers
+    get users to say &ldquo;I agree&rdquo;. That</em></ins></span> is
+      <span class="removed"><del><strong>&lt;a 
href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more 
info&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>no excuse for
+    malware.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTelephones"&gt;Spyware in Telephones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTelephones"&gt;#SpywareInTelephones&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
+      remote command</strong></del></span>
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking software</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this</em></ins></span> in <span 
class="removed"><del><strong>popular Android apps</strong></del></span> <span 
class="inserted"><ins><em>a way that at least</em></ins></span> is <span 
class="removed"><del><strong>pervasive</strong></del></span> <span 
class="inserted"><ins><em>visible</em></ins></span> and
-      <span class="removed"><del><strong>sometimes very clever. Some trackers 
can &lt;a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
-      follow a user's movements around a physical store by noticing WiFi
-      networks&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>optional&lt;/a&gt;. Not
-    as bad as what the others do.&lt;/p&gt;</em></ins></span>
+  <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
+    &lt;p&gt;Many proprietary apps for mobile devices
+    report which other apps the user has installed.  &lt;a
+    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible</em></ins></span> and 
<span class="removed"><del><strong>users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>optional&lt;/a&gt;. 
Not
+    as bad as what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Android tracks 
location for Google</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo; are turned off, even
-      when</strong></del></span>
+  &lt;li id="M201401150.1"&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
+      (The US says it will eventually require all new portable phones
+      to have GPS.)&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
+    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201312270"&gt;
-    &lt;p&gt;The nonfree Snapchat app's principal purpose is to 
restrict</em></ins></span> the <span class="removed"><del><strong>phone has no 
SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;Some portable phones &lt;a 
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
-      sold with spyware sending lots</strong></del></span>
-    <span class="inserted"><ins><em>use</em></ins></span> of data <span 
class="inserted"><ins><em>on the user's computer, but it does surveillance too: 
&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
+    &lt;p&gt;The</em></ins></span> nonfree Snapchat app's principal purpose is 
to restrict the
+    use of data on the user's computer, but it does surveillance too: &lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-    it tries</em></ins></span> to <span 
class="removed"><del><strong>China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;According to Edward Snowden,</strong></del></span> <span 
class="inserted"><ins><em>get the user's list of other people's phone
-    numbers&lt;/a&gt;.&lt;/p&gt;
+    it tries to get the user's list of other people's phone
+      <span 
class="removed"><del><strong>numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201312060"&gt;
-    &lt;p&gt;The Brightest Flashlight app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233"&gt;agencies
 can take over smartphones&lt;/a&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;</em></ins></span>
+    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Brightest Flashlight</em></ins></span> app <span 
class="removed"><del><strong>and dis-service spy on users even more than users
+      expected. It</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
-    sends user data, including geolocation, for use</em></ins></span> by <span 
class="inserted"><ins><em>companies&lt;/a&gt;.&lt;/p&gt;
+    sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
-    approve</em></ins></span> sending <span 
class="removed"><del><strong>hidden text messages which enable 
them</strong></del></span> <span class="inserted"><ins><em>personal 
data</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> the <span 
class="removed"><del><strong>phones
-      on and off, listen</strong></del></span> <span 
class="inserted"><ins><em>app developer but did not ask
-    about sending it</em></ins></span> to <span 
class="inserted"><ins><em>other companies.  This shows</em></ins></span> the 
<span class="removed"><del><strong>microphone, retrieve geo-location data from 
the
-      GPS, take photographs, read text messages, read call, location and web
-      browsing history, and read</strong></del></span> <span 
class="inserted"><ins><em>weakness of</em></ins></span>
-    the <span class="removed"><del><strong>contact list. This malware is 
designed</strong></del></span> <span 
class="inserted"><ins><em>reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to
-      <span class="removed"><del><strong>disguise itself from 
investigation.&lt;/p&gt;
-  &lt;/li&gt;
+    approve sending personal data to the app developer but did not ask
+    about sending it to other companies.  This shows the weakness of
+    the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to
+    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a <span class="removed"><del><strong>movie&lt;/a&gt;.
+    &lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Samsung phones come with
-      &lt;a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/"&gt;apps
 that users can't delete&lt;/a&gt;,
-      and they send so much data that their transmission 
is</strong></del></span>
-    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a
-      <span class="removed"><del><strong>substantial 
expense</strong></del></span> <span class="inserted"><ins><em>flashlight app 
send any information to
-    anyone? A free software flashlight app would not.&lt;/p&gt;
+    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>flashlight app send any information to
+    anyone? A free software flashlight app would 
not.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile apps</em></ins></span> for <span 
class="removed"><del><strong>users.  Said transmission, not wanted or
-      requested by the user, clearly must constitute spying of some
-      kind.&lt;/p&gt;&lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered 
driving</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;A Motorola phone</strong></del></span> <span 
class="inserted"><ins><em>children don't respect privacy:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"&gt;
-      listens</strong></del></span>
+  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says most mobile</em></ins></span> apps <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+    
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1749,15 +1793,26 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains &lt;a
-    
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
-    Microsoft changed Skype &lt;a
-    
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-    specifically</em></ins></span> for <span 
class="removed"><del><strong>voice all the 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in Android 
phones (and Windows? laptops): The Wall
-      Street Journal (in an article blocked from us by</strong></del></span>
+  &lt;li&gt;
+    &lt;p&gt;Facebook's app listens all the time,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
+    Microsoft changed Skype</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
+    on what people are listening to or watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations to serve them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+    specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1768,139 +1823,80 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
-    &lt;p&gt;Red Shell is</em></ins></span> a <span 
class="removed"><del><strong>paywall)
-      reports</strong></del></span> <span 
class="inserted"><ins><em>spyware</em></ins></span> that
-      <span class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"&gt;
-      the FBI can remotely activate the GPS and microphone in Android
-      phones and laptops&lt;/a&gt;.
-      (I suspect this means Windows laptops.)  Here</strong></del></span>
-    is <span class="inserted"><ins><em>found in many proprietary games. 
It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm"&gt;more
 info&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Portable phones with GPS will send their GPS 
location</strong></del></span>
+    &lt;p&gt;Red Shell is a spyware that
+    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data</em></ins></span> on
-      <span class="removed"><del><strong>remote command</strong></del></span> 
<span class="inserted"><ins><em>users' computers</em></ins></span> and <span 
class="removed"><del><strong>users cannot stop them:
-      &lt;a 
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
-      
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
-      (The US says</strong></del></span> <span 
class="inserted"><ins><em>sends</em></ins></span> it <span 
class="removed"><del><strong>will eventually require all new portable 
phones</strong></del></span> to <span class="removed"><del><strong>have 
GPS.)&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tracks data on users' computers and sends</em></ins></span> it <span 
class="removed"><del><strong>demands</strong></del></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The nonfree Snapchat 
app's principal purpose is</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with an update</em></ins></span> to <span 
class="removed"><del><strong>restrict
-      the use of data on</strong></del></span> the <span 
class="removed"><del><strong>user's computer, but it does surveillance
-      too:</strong></del></span> <span class="inserted"><ins><em>massive
-    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
-      it tries</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;</em></ins></span>
-    to <span class="removed"><del><strong>get the</strong></del></span> <span 
class="inserted"><ins><em>snoop on all open processes running on 
its</em></ins></span> user's <span class="removed"><del><strong>list of other 
people's phone
-      numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    program along with</em></ins></span> an <span 
class="removed"><del><strong>opt-in proprietary search app that it 
will&lt;/a&gt;
+        pre-install</strong></del></span> <span 
class="inserted"><ins><em>update to the massive
+    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
+    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to snoop on all open processes running</em></ins></span> on <span 
class="removed"><del><strong>some of</strong></del></span> its <span 
class="removed"><del><strong>phones. The app will give Verizon the 
same</strong></del></span> <span class="inserted"><ins><em>user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
+  &lt;li id="M201711070"&gt;
+    &lt;p&gt;The driver for a certain gaming keyboard &lt;a
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends</em></ins></span>
+    information <span class="removed"><del><strong>about the users' searches 
that Google normally gets when
+   they use its search engine.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711070"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>moviepass app and 
dis-service spy</strong></del></span> <span class="inserted"><ins><em>driver 
for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
-    information to China&lt;/a&gt;.&lt;/p&gt;
+   &lt;p&gt;Currently, the app is</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512290"&gt;
-    &lt;p&gt;Many &lt;a
-    
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop</em></ins></span> on <span 
class="inserted"><ins><em>their</em></ins></span> users <span 
class="removed"><del><strong>even more than users
-      expected. It &lt;a 
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before</strong></del></span> and <span 
class="removed"><del><strong>after going</strong></del></span> <span 
class="inserted"><ins><em>report</em></ins></span> to <span 
class="inserted"><ins><em>the
-    internet&lt;/a&gt;&mdash;even what their users weigh.&lt;/p&gt;
-
-    &lt;p&gt;A game console is</em></ins></span> a <span 
class="removed"><del><strong>movie&lt;/a&gt;.
-    &lt;/p&gt;
+    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
+    video game consoles snoop</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>their users</em></ins></span> and <span 
class="inserted"><ins><em>report to</em></ins></span> the
+    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</strong></del></span>
+    <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
-    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;AI-powered driving apps can
-    &lt;a 
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer, and you can't trust a computer with
+    &lt;p&gt;A game console</em></ins></span> is
+    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
computer, and you can't trust a computer with
     a nonfree operating system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers</strong></del></span>
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note</strong></del></span> <span 
class="inserted"><ins><em>their users'
+    collect a wide range of data about their users and their users'
     friends and associates&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks</em></ins></span> 
that <span class="inserted"><ins><em>merge the data
+    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
     companies.&lt;/p&gt;
 
-    &lt;p&gt;They use</em></ins></span> this <span 
class="removed"><del><strong>article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>zero price.&lt;/p&gt;
-  &lt;/li&gt;
-  
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all the time, &lt;a 
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what</strong></del></span> <span 
class="inserted"><ins><em>manipulate</em></ins></span> people <span 
class="removed"><del><strong>are listening</strong></del></span> to <span 
class="removed"><del><strong>or watching&lt;/a&gt;. In addition, it 
may</strong></del></span> <span class="inserted"><ins><em>buy things, and hunt 
for
-    &ldquo;whales&rdquo; who can</em></ins></span> be <span 
class="removed"><del><strong>analyzing people's conversations to serve them 
with targeted
-    advertisements.&lt;/p&gt;
-       &lt;/li&gt;
-
-  &lt;li&gt;
-               &lt;p&gt;Faceapp appears</strong></del></span> <span 
class="inserted"><ins><em>led</em></ins></span> to <span 
class="removed"><del><strong>do lots</strong></del></span> <span 
class="inserted"><ins><em>spend a lot</em></ins></span> of <span 
class="removed"><del><strong>surveillance, judging by 
-    &lt;a 
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access it demands</strong></del></span> <span 
class="inserted"><ins><em>money. They also
-    use a back door</em></ins></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
-               &lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;They use this</em></ins></span> data to <span 
class="removed"><del><strong>a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced an opt-in proprietary search app that it will&lt;/a&gt;
-        pre-install on some of its phones. The app will give 
Verizon</strong></del></span> <span 
class="inserted"><ins><em>manipulate</em></ins></span> the <span 
class="removed"><del><strong>same
-   information about</strong></del></span> <span 
class="inserted"><ins><em>game play for specific players.&lt;/p&gt;
-
-    &lt;p&gt;While</em></ins></span> the <span 
class="removed"><del><strong>users' searches</strong></del></span> <span 
class="inserted"><ins><em>article describes gratis games, 
games</em></ins></span> that <span class="removed"><del><strong>Google normally 
gets when
-   they</strong></del></span> <span class="inserted"><ins><em>cost money
-    can</em></ins></span> use <span class="removed"><del><strong>its search 
engine.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>manipulate people to 
buy things, and hunt for
+    &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
+  on many sorts</strong></del></span> <span class="inserted"><ins><em>be led 
to spend a lot</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> <span class="inserted"><ins><em>money. They also
+    use a back door to manipulate the game play for specific players.&lt;/p&gt;
 
-   &lt;p&gt;Currently,</strong></del></span> the <span 
class="removed"><del><strong>app is</strong></del></span> <span 
class="inserted"><ins><em>same tactics.&lt;/p&gt;
+    &lt;p&gt;While the article describes gratis games, games that cost money
+    can use</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app</strong></del></span> <span class="inserted"><ins><em>NSA</em></ins></span> 
takes <span class="removed"><del><strong>effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
-    still spyware.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user data</strong></del></span> <span 
class="inserted"><ins><em>advantage</em></ins></span>
-    to <span class="removed"><del><strong>a Chinese 
company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;A pregnancy test controller application not only
-  can &lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
-  on many sorts of data in the phone, and in server 
accounts,</strong></del></span> <span class="inserted"><ins><em>spy 
through</em></ins></span> it <span class="removed"><del><strong>can
+    &lt;p&gt;Angry Birds &lt;a
+    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts,</strong></del></span> <span 
class="inserted"><ins><em>the NSA takes advantage
+    to spy through</em></ins></span> it <span class="removed"><del><strong>can
   alter them</strong></del></span> too&lt;/a&gt;.
   <span class="removed"><del><strong>&lt;/p&gt;&lt;/li&gt;
 
@@ -1931,52 +1927,37 @@
       are playing nearby&lt;/a&gt;.  Also</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware"&gt;
     spies</em></ins></span> on <span class="removed"><del><strong>what users 
post</strong></del></span> <span class="inserted"><ins><em>every process 
running</em></ins></span> on <span class="removed"><del><strong>various sites 
-      such as Facebook, Google+ and Twitter.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Facebook's new Magic Photo app
-      &lt;a
-href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-scans your mobile phone's photo collections for known 
faces&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>a 
gamer's computer</em></ins></span> and <span 
class="removed"><del><strong>suggests you to share the picture you take 
according</strong></del></span> <span class="inserted"><ins><em>sniffs a
+      such as Facebook, Google+</strong></del></span> <span 
class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span 
class="removed"><del><strong>Twitter.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sniffs a
     good deal of personal data&lt;/a&gt;, including lots of activities which
-    have nothing</em></ins></span> to <span class="removed"><del><strong>who
-      is</strong></del></span> <span class="inserted"><ins><em>do with 
cheating.&lt;/p&gt;
+    have nothing to do with cheating.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Facebook's new Magic 
Photo app</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareInEquipment"&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>the frame.&lt;/p&gt;
-
-      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>Connected 
Equipment&lt;/h3&gt;
+  &lt;h3 id="SpywareInEquipment"&gt;Spyware in Connected Equipment&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInEquipment"&gt;#SpywareInEquipment&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201708280"&gt;
-    &lt;p&gt;The bad security in many Internet of Stings devices allows &lt;a
-    
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to</strong></del></span> <span 
class="inserted"><ins><em>people that use them&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+      and suggests you</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
+    to <span class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according to 
who</strong></del></span> <span class="inserted"><ins><em>people that use 
them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't</em></ins></span> be
-      <span class="removed"><del><strong>sent across</strong></del></span> 
<span class="inserted"><ins><em>a sucker&mdash;reject all</em></ins></span> the 
<span class="removed"><del><strong>wire to Facebook's servers and 
face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none of Facebook users' pictures are private
-      anymore, even if</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>article 
uses</em></ins></span> the <span class="removed"><del><strong>service.&lt;/p&gt;
-  &lt;/li&gt;
+    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
-      is based on proprietary malware (DRM and snooping). In August
-      2015 it</strong></del></span> <span 
class="inserted"><ins><em>term</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>article uses the 
term &lt;a
+    
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1986,84 +1967,105 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>me</em></ins></span> and <span 
class="removed"><del><strong>some
-      are starting to realize</strong></del></span>
-<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; 
Evidently</em></ins></span> that <span class="removed"><del><strong>it is 
nasty.&lt;/p&gt;
-
-      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>was
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201901070"&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in</em></ins></span> 
the <span class="removed"><del><strong>&lt;a
+    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span class="inserted"><ins><em>TV 
sees,&rdquo;&lt;/a&gt; in</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>own words</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
+      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>company's
+    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span> <span class="inserted"><ins><em>third parties. 
This</em></ins></span> is <span class="removed"><del><strong>based on 
proprietary malware (DRM</strong></del></span> <span 
class="inserted"><ins><em>in return for
+    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>snooping). In 
August
+      2015 it &lt;a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>slightly
+    lower retail prices.&lt;/p&gt;
+
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
+      are starting</strong></del></span> <span class="inserted"><ins><em>make 
this spying acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>him,
+    is</em></ins></span> that it is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
+
+      &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span> 
the <span class="removed"><del><strong>&lt;a
 
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-      twisted ways that they present snooping as a way</strong></del></span> 
<span class="inserted"><ins><em>own words of the company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;serve&rdquo; users 
better&lt;/a&gt;&mdash;never mind
-      whether they want that.</strong></del></span> <span 
class="inserted"><ins><em>third parties.</em></ins></span> This is <span 
class="removed"><del><strong>a typical example of
-      the attitude of the proprietary software industry towards
+      twisted ways that they present snooping as a way
+      to &ldquo;serve&rdquo; users better&lt;/a&gt;&mdash;never mind
+      whether they want that. This</strong></del></span> <span 
class="inserted"><ins><em>Vizio software</em></ins></span> is <span 
class="removed"><del><strong>a typical example of</strong></del></span>
+    <span class="inserted"><ins><em>nonfree, we don't know what is actually 
happening behind</em></ins></span> the <span 
class="removed"><del><strong>attitude of</strong></del></span> <span 
class="inserted"><ins><em>scenes,
+    and there is no guarantee that all future updates will 
leave</em></ins></span> the <span class="removed"><del><strong>proprietary 
software industry towards
       those they have subjugated.&lt;/p&gt;
 
       &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span> <span 
class="inserted"><ins><em>in return</em></ins></span> for <span 
class="removed"><del><strong>mobile devices report which other
-    apps the user has
-    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
-    <span class="inserted"><ins><em>&ldquo;better service&rdquo; (meaning more 
intrusive ads?) and slightly
-    lower retail prices.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Many proprietary apps</strong></del></span>
+    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
 
-    &lt;p&gt;What</em></ins></span> is <span 
class="removed"><del><strong>doing</strong></del></span> <span 
class="inserted"><ins><em>supposed to make</em></ins></span> this <span 
class="removed"><del><strong>in a way</strong></del></span> <span 
class="inserted"><ins><em>spying acceptable, according to him,
-    is</em></ins></span> that <span class="removed"><del><strong>at 
least</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> is <span 
class="removed"><del><strong>visible and
-    optional&lt;/a&gt;. Not as bad as what</strong></del></span> <span 
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span> 
the <span class="removed"><del><strong>others do.&lt;/p&gt;
+    &lt;p&gt;If you already own a Vizio smart TV (or any smart 
TV,</em></ins></span> for <span class="removed"><del><strong>mobile devices 
report which other
+    apps</strong></del></span> <span class="inserted"><ins><em>that
+    matter),</em></ins></span> the <span class="removed"><del><strong>user has
+    installed.  &lt;a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter</strong></del></span>
 <span class="inserted"><ins><em>easiest way to make sure it isn't spying on 
you</em></ins></span> is <span class="removed"><del><strong>doing this 
in</strong></del></span>
+    <span class="inserted"><ins><em>to disconnect it from the Internet, and 
use</em></ins></span> a <span class="removed"><del><strong>way that at 
least</strong></del></span> <span class="inserted"><ins><em>terrestrial antenna
+    instead. Unfortunately, this</em></ins></span> is <span 
class="removed"><del><strong>visible</strong></del></span> <span 
class="inserted"><ins><em>not always possible. Another option,
+    if you are technically oriented, is to get your own router (which can
+    be an old computer running completely free software),</em></ins></span> and
+    <span class="removed"><del><strong>optional&lt;/a&gt;. Not as 
bad</strong></del></span> <span class="inserted"><ins><em>set up a
+    firewall to block connections to Vizio's servers. Or,</em></ins></span> as 
<span class="removed"><del><strong>what the others do.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for 
children</strong></del></span> <span class="inserted"><ins><em>Vizio software is
-    nonfree, we</em></ins></span> don't <span 
class="removed"><del><strong>respect privacy:
+  &lt;li&gt;&lt;p&gt;FTC says most mobile apps for children don't respect 
privacy:
       &lt;a 
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
-      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;
+      
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>a last resort,
+    you can replace your TV with another model.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Widely used &lt;a 
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
-      QR-code scanner apps snoop on the user&lt;/a&gt;. 
This</strong></del></span> <span class="inserted"><ins><em>know 
what</em></ins></span> is <span class="removed"><del><strong>in addition to
-      the snooping done by</strong></del></span> <span 
class="inserted"><ins><em>actually happening behind</em></ins></span> the <span 
class="removed"><del><strong>phone company,</strong></del></span> <span 
class="inserted"><ins><em>scenes,</em></ins></span>
-    and <span class="removed"><del><strong>perhaps by the OS in the
-      phone.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Widely 
used</strong></del></span>
 
-      &lt;p&gt;Don't be distracted by</strong></del></span> <span 
class="inserted"><ins><em>there is no guarantee that all future updates will 
leave</em></ins></span> the <span class="removed"><del><strong>question of 
whether</strong></del></span>
-    <span class="inserted"><ins><em>settings unchanged.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/"&gt;proprietary
+      QR-code scanner apps snoop on the user&lt;/a&gt;. This is in 
addition</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to the <span 
class="removed"><del><strong>snooping done by the phone company, and perhaps 
by</strong></del></span> <span class="inserted"><ins><em>article 
for</em></ins></span> the <span class="removed"><del><strong>OS 
in</strong></del></span> <span class="inserted"><ins><em>facts it presents. It
+    is too bad that</em></ins></span> the
+      <span class="removed"><del><strong>phone.&lt;/p&gt;
 
-    &lt;p&gt;If you already own a Vizio smart TV (or any smart TV, for that
-    matter),</em></ins></span> the <span class="removed"><del><strong>app 
developers get
-      users</strong></del></span> <span class="inserted"><ins><em>easiest 
way</em></ins></span> to <span class="removed"><del><strong>say &ldquo;I 
agree&rdquo;. That</strong></del></span> <span class="inserted"><ins><em>make 
sure it isn't spying on you</em></ins></span> is <span 
class="removed"><del><strong>no excuse for malware.&lt;/p&gt;
+      &lt;p&gt;Don't be distracted</strong></del></span> <span 
class="inserted"><ins><em>article finishes</em></ins></span> by <span 
class="inserted"><ins><em>advocating</em></ins></span> the <span 
class="removed"><del><strong>question</strong></del></span>
+    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>whether the app developers get
+      users</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>say &ldquo;I agree&rdquo;. That is no excuse for 
malware.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The Brightest Flashlight app
-      &lt;a 
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+  &lt;li&gt;&lt;p&gt;The Brightest Flashlight</strong></del></span> <span 
class="inserted"><ins><em>Netflix. The Netflix</em></ins></span> app &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
       sends user data, including geolocation, for use by 
companies.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;The FTC criticized this app because</strong></del></span>
-    <span class="inserted"><ins><em>to disconnect</em></ins></span> it <span 
class="removed"><del><strong>asked</strong></del></span> <span 
class="inserted"><ins><em>from</em></ins></span> the <span 
class="removed"><del><strong>user</strong></del></span> <span 
class="inserted"><ins><em>Internet, and use a terrestrial antenna
-    instead. Unfortunately, this is not always possible. Another option,
-    if you are technically oriented, is</em></ins></span> to
-      <span class="removed"><del><strong>approve sending personal 
data</strong></del></span> <span class="inserted"><ins><em>get your own router 
(which can
-    be an old computer running completely free software), and set up a
-    firewall to block connections to Vizio's servers. Or, as a last resort,
-    you can replace your TV with another model.&lt;/p&gt;
+      &lt;p&gt;The FTC criticized this app because it 
asked</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link</em></ins></span> to the <span 
class="removed"><del><strong>app developer but did not
-      ask about sending</strong></del></span> <span 
class="inserted"><ins><em>article for the facts</em></ins></span> it <span 
class="removed"><del><strong>to other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>presents. It
-    is too bad that the article finishes by advocating</em></ins></span> the
-    <span class="inserted"><ins><em>moral</em></ins></span> weakness of <span 
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
-      &ldquo;solution&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>surveillance: why should a flashlight
-      app send any information to anyone?  A free software 
flashlight</strong></del></span> <span class="inserted"><ins><em>Netflix. The 
Netflix</em></ins></span> app <span class="removed"><del><strong>would 
not.&lt;/p&gt;
+  &lt;li id="M201702060"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts and
+    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>user to
+      approve sending personal data to</strong></del></span> <span 
class="inserted"><ins><em>image is coming from</em></ins></span> the <span 
class="removed"><del><strong>app developer but did not
+      ask about sending it to other companies.  This 
shows</strong></del></span> <span class="inserted"><ins><em>user's own 
computer,</em></ins></span>
+    the
+      <span class="removed"><del><strong>weakness</strong></del></span> <span 
class="inserted"><ins><em>TV reports what it is. The 
existence</em></ins></span> of <span class="removed"><del><strong>the 
reject-it-if-you-dislike-snooping
+      &ldquo;solution&rdquo; to surveillance: why should</strong></del></span> 
a <span class="removed"><del><strong>flashlight
+      app send any information</strong></del></span> <span 
class="inserted"><ins><em>way</em></ins></span> to <span 
class="removed"><del><strong>anyone?  A free software flashlight
+      app would not.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2075,121 +2077,110 @@
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A remote-control sex toy was found to make</strong></del></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
-        of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A remote-control sex toy</strong></del></span> <span 
class="inserted"><ins><em>disable the
+    surveillance, even if it were not hidden as it</em></ins></span> was <span 
class="removed"><del><strong>found to make &lt;a 
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
 recordings
+        of</strong></del></span> <span class="inserted"><ins><em>in these TVs,
+    does not legitimize</em></ins></span> the <span 
class="removed"><del><strong>conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;The</strong></del></span>
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201702060"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>toys My Friend Cayla and i-Que 
transmit</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations to Nuance Communications&lt;/a&gt;,
-      a speech recognition company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control the toys with a mobile phone. This would
-      enable crackers to listen in</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed</em></ins></span> on <span 
class="removed"><del><strong>a child's speech,</strong></del></span> <span 
class="inserted"><ins><em>them,</em></ins></span> and <span 
class="removed"><del><strong>even speak
-      into</strong></del></span> <span class="inserted"><ins><em>not just 
broadcasts and
-    cable&lt;/a&gt;. Even if</em></ins></span> the <span 
class="removed"><del><strong>toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;A computerized vibrator
-      &lt;a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through</strong></del></span> <span 
class="inserted"><ins><em>image is coming from</em></ins></span> the <span 
class="removed"><del><strong>proprietary control app&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The app was reporting</strong></del></span> <span 
class="inserted"><ins><em>user's own computer,</em></ins></span>
-    the <span class="removed"><del><strong>temperature</strong></del></span> 
<span class="inserted"><ins><em>TV reports what it is. The 
existence</em></ins></span> of <span class="inserted"><ins><em>a way to 
disable</em></ins></span> the <span class="removed"><del><strong>vibrator 
minute by
-      minute (thus, indirectly, whether</strong></del></span>
-    <span class="inserted"><ins><em>surveillance, even if it were not hidden 
as</em></ins></span> it was <span 
class="removed"><del><strong>surrounded</strong></del></span> <span 
class="inserted"><ins><em>in these TVs,
-    does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511130"&gt;
-    &lt;p&gt;Some web and TV advertisements play inaudible
-    sounds to be picked up</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware running
-    on other devices in range so</em></ins></span> as <span 
class="removed"><del><strong>the vibration frequency.&lt;/p&gt;
-    
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard</strong></del></span> <span class="inserted"><ins><em>to 
determine that they
-    are nearby.  Once your Internet devices are paired</em></ins></span> with 
<span class="removed"><del><strong>which</strong></del></span>
-    <span class="inserted"><ins><em>your TV, advertisers can correlate ads 
with Web activity, and other &lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201511130"&gt;
+    &lt;p&gt;Some web</em></ins></span> and <span 
class="removed"><del><strong>i-Que transmit 
+      &lt;a 
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span> <span class="inserted"><ins><em>TV 
advertisements play inaudible
+    sounds</em></ins></span> to <span class="removed"><del><strong>Nuance 
Communications&lt;/a&gt;,
+      a speech recognition company based</strong></del></span> <span 
class="inserted"><ins><em>be picked up by proprietary malware running
+    on other devices</em></ins></span> in <span 
class="removed"><del><strong>the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>range so as to 
determine that they
+    are nearby.  Once your Internet devices are paired with
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely control the toys</strong></del></span> 
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="inserted"><ins><em>Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
     cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes a step further than other TV</em></ins></span>
-    manufacturers <span class="removed"><del><strong>would make statements 
about</strong></del></span> <span class="inserted"><ins><em>in spying on their 
users:</em></ins></span> their <span class="removed"><del><strong>products, 
rather than free software which users could have
-      checked and changed.&lt;/p&gt;
+    &lt;p&gt;Vizio goes</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
+      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>step further than other TV
+    manufacturers</em></ins></span> in <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>a child's speech, and even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
     
-    &lt;p&gt;The company that made the vibrator</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-       was sued for collecting lots of personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>their users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
     
-    &lt;p&gt;The company's statement</strong></del></span>
+    &lt;p&gt;The app was reporting the temperature of the vibrator minute by
+      minute (thus, indirectly, whether</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
-    link them your IP address&lt;/a&gt; so</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the data may be
-      true,</strong></del></span> <span class="inserted"><ins><em>advertisers 
can track you
+    link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
 
-    &lt;p&gt;It is possible to turn this off,</em></ins></span> but <span 
class="inserted"><ins><em>having</em></ins></span> it <span 
class="removed"><del><strong>doesn't really matter. If it had sold the data to a
-      data broker, the data broker would have been able</strong></del></span> 
<span class="inserted"><ins><em>enabled by default
+    &lt;p&gt;It is possible to turn this off, but having</em></ins></span> it 
<span class="removed"><del><strong>was surrounded</strong></del></span> <span 
class="inserted"><ins><em>enabled</em></ins></span> by <span 
class="removed"><del><strong>a person's
+      body), as well as</strong></del></span> <span 
class="inserted"><ins><em>default
     is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</em></ins></span>
-    to <span class="removed"><del><strong>figure out
-      who</strong></del></span> the <span class="removed"><del><strong>user 
was.&lt;/p&gt;
-    
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
 <span class="inserted"><ins><em>600 millions social media 
profiles</em></ins></span> the company <span class="removed"><del><strong>has 
been ordered</strong></del></span>
-    <span class="inserted"><ins><em>already monitors. Tivo customers are 
unaware they're
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to</em></ins></span> the <span class="removed"><del><strong>vibration 
frequency.&lt;/p&gt;
+    
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>600 
millions social media profiles</em></ins></span> the <span 
class="removed"><del><strong>totally inadequate proposed response: a labeling
+      standard</strong></del></span> <span class="inserted"><ins><em>company
+    already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
+    information</em></ins></span> with <span 
class="removed"><del><strong>which manufacturers would make statements about
+      their products, rather than free software which</strong></del></span> 
<span class="inserted"><ins><em>online social media participation, Tivo can now 
&lt;a
     href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
-    correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-    users</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>new combined surveillance by default.&lt;/p&gt;
+    correlate TV advertisement with online purchases&lt;/a&gt;, exposing 
all</em></ins></span>
+    users <span class="removed"><del><strong>could have
+      checked</strong></del></span> <span class="inserted"><ins><em>to new 
combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
-    href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="removed"><del><strong>changed.&lt;/p&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+    &lt;p&gt;The company that made the vibrator</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued for collecting lots of personal information about 
how</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
+    what</em></ins></span> people <span class="removed"><del><strong>used 
it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was anonymizing the data may be
+      true, but it doesn't really matter. If it had sold the data 
to</strong></del></span> <span class="inserted"><ins><em>are 
watching&lt;/a&gt;, even if it isn't</em></ins></span> a
+      <span class="removed"><del><strong>data broker, the data broker would 
have been able to figure out
+      who the user was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they 
wanted</em></ins></span> to <span class="removed"><del><strong>the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
+    snoops on what programs people watch, and even what they 
wanted</em></ins></span> to <span 
class="removed"><del><strong>pay</strong></del></span>
     <span class="inserted"><ins><em>record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>firmware &ldquo;upgrade&rdquo;</em></ins></span> to 
<span class="removed"><del><strong>access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span> <span class="inserted"><ins><em>make 
its TVs snoop on what
-    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used</em></ins></span> a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>firmware 
&ldquo;upgrade&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>make</em></ins></span> its <span 
class="removed"><del><strong>customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201502090"&gt;
-    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
-    
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
+    transmits users' voice on</em></ins></span> the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess what?
+      &lt;a 
href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way</strong></del></span> <span 
class="inserted"><ins><em>internet</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+      collected by the manufacturer's snooping.&lt;/p&gt;
+
+    &lt;p&gt;That the manufacturer</strong></del></span> <span 
class="inserted"><ins><em>another company, Nuance&lt;/a&gt;.
     Nuance can save it</em></ins></span> and <span 
class="inserted"><ins><em>would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
@@ -2232,25 +2223,28 @@
     &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
-       that connects to an unidentified site in 
China&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-    on their users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The <span class="removed"><del><strong>article says this is a 
back door,</strong></del></span> <span class="inserted"><ins><em>report was as 
of 2014,</em></ins></span> but <span class="inserted"><ins><em>we don't expect 
this has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>could be</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
+    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a
-      <span class="removed"><del><strong>misunderstanding.  However, it is 
certainly surveillance, at
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>back door, but</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
+    say, &ldquo;Without your consent to tracking, the TV will not
+    work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</em></ins></span> that <span 
class="removed"><del><strong>could be a
+      misunderstanding.  However, it is certainly surveillance, at
       least.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>TVs are not allowed</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -2260,10 +2254,7 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>tracking, the TV will not
-    work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>report what the
     user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
 
@@ -2281,17 +2272,13 @@
     no effect&lt;/a&gt;.  (The fact</em></ins></span> that the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
 GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span class="inserted"><ins><em>404 
error</em></ins></span>
     really
-<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>means nothing; the server could save that data 
anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+<span class="removed"><del><strong>clean since &lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2305,10 +2292,10 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>user's local network&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>means nothing;</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
@@ -2323,10 +2310,13 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>had installed a patch to stop this, but any
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed a patch to stop this, but any
     product could spy this way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
@@ -2408,155 +2398,231 @@
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;</em></ins></span>
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is <span 
class="removed"><del><strong>&lt;a
+      href="http://www.bbc.com/news/technology-34922712"&gt;always
+        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
+      you.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,</em></ins></span>
+    even <span class="removed"><del><strong>which page</strong></del></span> 
<span class="inserted"><ins><em>when</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+      by most US libraries,
+      &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
+      send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
+      needed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;E-books can contain JavaScript code,
-    and</strong></del></span>
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
-    this</strong></del></span>
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
+  effectively
+  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
     universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
-    listening device, remote changes to the</em></ins></span> code <span 
class="removed"><del><strong>snoops on 
readers&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>could surely convert it
-    into one.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
+  settings&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in many 
e-readers&mdash;not only</strong></del></span>
+    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert it
+    into one.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
+  &lt;li id="M201711100"&gt;
     &lt;p&gt;A remote-control sex toy was found to make &lt;a
     
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of</em></ins></span> the
-      <span class="removed"><del><strong>Kindle:</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-    minute (thus, indirectly, whether it was surrounded by a person's
+    minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
+    authentication, you couldn't be confident that Nissan has no
+    access.  The</strong></del></span> <span class="inserted"><ins><em>was 
surrounded by a person's
     body), as well as the vibration frequency.&lt;/p&gt;
 
     &lt;p&gt;Note the totally inadequate proposed response: a labeling
     standard with which manufacturers would make statements about their
-    products, rather than free software</em></ins></span> which <span 
class="removed"><del><strong>page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Adobe</strong></del></span> <span 
class="inserted"><ins><em>users could have checked
+    products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that</em></ins></span> made <span 
class="removed"><del><strong>&ldquo;Digital 
Editions,&rdquo;</strong></del></span> the <span 
class="removed"><del><strong>e-reader used
-      by most US libraries,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
-      send</strong></del></span>
+    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
-    was sued for collecting</em></ins></span> lots of <span 
class="inserted"><ins><em>personal information about how people
+    was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the</em></ins></span> 
data to <span class="removed"><del><strong>Adobe&lt;/a&gt;.  Adobe's 
&ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span class="inserted"><ins><em>a data
-    broker, the data broker would have been able</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+    true, but it doesn't really matter. If</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>had sold the data</em></ins></span> to <span 
class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
+  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+      which is made available</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+      others.&lt;/p&gt;
+
+      &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
+      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in the 
car.&lt;/p&gt;&lt;/li&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span class="inserted"><ins><em>figure out who the
-    user was.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> the <span 
class="removed"><del><strong>company to extract data remotely and
+      determine</strong></del></span>
+    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data
+      and hand it over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
-  &lt;li id="nissan-modem"&gt;&lt;p&gt;The Nissan Leaf</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company</em></ins></span> has <span class="inserted"><ins><em>been 
ordered to pay</em></ins></span> a <span class="removed"><del><strong>built-in 
cell phone modem which allows
-  effectively
-  anyone &lt;a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access</strong></del></span> <span class="inserted"><ins><em>total of 
C$4m&lt;/a&gt; to</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
-  settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</strong></del></span>
-    <span class="inserted"><ins><em>customers.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;!-- #SpywareAtHome --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>do because the system has no authentication when
-    accessed through the modem.  However, even if it asked for
-    authentication, you couldn't be confident that Nissan has no
-    access.  The software in</strong></del></span> the <span 
class="removed"><del><strong>car is
-    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what?</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
-    means it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if no one connects</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>access</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>manufacturer and the FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Lots of</strong></del></span>
 
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que transmit 
&lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
-    company <span class="removed"><del><strong>to track</strong></del></span> 
<span class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The</em></ins></span> &ldquo;smart&rdquo; <span 
class="removed"><del><strong>products are
+        designed</strong></del></span> <span class="inserted"><ins><em>toys My 
Friend Cayla and i-Que transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+        listen</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations</em></ins></span> to <span 
class="removed"><del><strong>everyone</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
+    company based</em></ins></span> in the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>listen in on a child's speech, and even speak 
into</em></ins></span> the <span class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;</strong></del></span>
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Today's technological practice does not include any way of
+    making</strong></del></span> <span class="inserted"><ins><em>toys 
with</em></ins></span> a <span class="removed"><del><strong>device that can 
obey your voice commands without
+    potentially spying</strong></del></span> <span 
class="inserted"><ins><em>mobile phone. This would enable
+    crackers to listen in</em></ins></span> on <span 
class="removed"><del><strong>you.  Even if it is air-gapped, it could be
+    saving up records about you for later examination.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Nest thermometers
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span> <span class="inserted"><ins><em>a 
child's speech, and even speak into</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="records-drivers"&gt;&lt;p&gt;Proprietary 
software in cars</strong></del></span> <span 
class="inserted"><ins><em>id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
-      which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to <span class="removed"><del><strong>car 
manufacturers, insurance companies,</strong></del></span> <span 
class="inserted"><ins><em>spy on children</em></ins></span> and
-      <span class="removed"><del><strong>others.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
 
-      &lt;p&gt;The case of toll-collection systems, 
mentioned</strong></del></span> <span 
class="inserted"><ins><em>adults&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the other way.&rdquo; Evidently that was
+before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;Vizio
+    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them, and not just broadcasts
+    and cable&lt;/a&gt;. Even if the image is coming from the user's own
+    computer, the TV reports what it is. The existence of a way to
+    disable the surveillance, even if it were not hidden as it was in
+    these TVs, does not legitimize the surveillance.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  on their users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+      consent before collecting personal data are totally inadequate.
+      And what happens if</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using a DJI drone
-    to snoop on other people, DJI is</em></ins></span> in <span 
class="removed"><del><strong>this article,</strong></del></span> <span 
class="inserted"><ins><em>many cases &lt;a
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>tracking, the TV will
+      not work.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>snoop on other people, DJI is in many cases &lt;a
     
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
     on you&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2571,127 +2637,93 @@
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure the 
user</em></ins></span> is <span class="removed"><del><strong>not
-      really a matter of proprietary surveillance. These systems are an
-      intolerable invasion of privacy,</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for the subscription,</em></ins></span> and <span 
class="removed"><del><strong>should be replaced with anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>hasn't printed more pages than were
+    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>TVs are not allowed</strong></del></span> 
<span class="inserted"><ins><em>constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>report what</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the user <span 
class="removed"><del><strong>watches &mdash; no exceptions!&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Vizio goes a step further</strong></del></span> <span 
class="inserted"><ins><em>is still
+    paying for the subscription, and hasn't printed more 
pages</em></ins></span> than <span class="removed"><del><strong>other TV 
manufacturers</strong></del></span> <span class="inserted"><ins><em>were
     paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware</strong></del></span> 
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases, it spies on users, and involves totally unacceptable
-    restrictions</em></ins></span> in the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Even though the ink subscription program may be 
cheaper</em></ins></span> in <span 
class="removed"><del><strong>spying</strong></del></span> <span 
class="inserted"><ins><em>some
+    specific cases, it spies</em></ins></span> on 
+      <span class="removed"><del><strong>their users: their &lt;a 
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      &ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span> <span 
class="inserted"><ins><em>users,</em></ins></span> and 
+      <span class="removed"><del><strong>link them your IP address&lt;/a&gt; 
so</strong></del></span> <span class="inserted"><ins><em>involves totally 
unacceptable
+    restrictions in the use of ink cartridges</em></ins></span> that <span 
class="removed"><del><strong>advertisers can track you 
+      across devices.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company</strong></del></span> <span 
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>would otherwise be in
     working order.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>extract data remotely and
-      determine</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
-      &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>security of an Amazon device,</em></ins></span>
-    and <span class="removed"><del><strong>c.&lt;/a&gt;). The company 
says</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
-    turn</em></ins></span> it <span class="removed"><del><strong>doesn't
-      store this information, but</strong></del></span> <span 
class="inserted"><ins><em>into a listening device&lt;/a&gt; for them.&lt;/p&gt;
-
-    &lt;p&gt;It was very difficult for them to do this. The job would be much
-    easier for Amazon. And</em></ins></span> if <span 
class="inserted"><ins><em>some government such as China or</em></ins></span> 
the <span class="removed"><del><strong>state orders it</strong></del></span> 
<span class="inserted"><ins><em>US
-    told Amazon</em></ins></span> to <span 
class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span 
class="removed"><del><strong>data
-      and hand it over,</strong></del></span> <span 
class="inserted"><ins><em>product in that country,
-    do you think Amazon would have</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>moral fiber</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
-
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
-    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Crackers found a way</em></ins></span> to <span 
class="inserted"><ins><em>break the security of an Amazon device,
+    and &lt;a 
href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;</em></ins></span>
+    turn <span class="removed"><del><strong>this off, but 
having</strong></del></span> it <span class="removed"><del><strong>enabled by 
default
+      is an injustice already.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201804140"&gt;
-    &lt;p&gt;A medical insurance company &lt;a
-    
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush that snoops</em></ins></span> on 
<span class="removed"><del><strong>top under each subsection --&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Lots</strong></del></span> <span 
class="inserted"><ins><em>its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Tivo's alliance with Viacom adds 2.3 million 
households</strong></del></span> <span class="inserted"><ins><em>into a 
listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-  &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots</em></ins></span> of &ldquo;smart&rdquo; products are 
designed &lt;a
-    
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="inserted"><ins><em>do this. The job would be much
+    easier for Amazon. And if some government such as China 
or</em></ins></span> the <span class="removed"><del><strong>600 millions social 
media profiles the company already
+      monitors. Tivo customers are unaware they're being watched by
+      advertisers. By combining TV viewing information with online
+      social media participation, Tivo can now &lt;a 
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
+      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span> <span class="inserted"><ins><em>US
+    told Amazon</em></ins></span> to
+      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>do this, or 
cease</em></ins></span> to <span class="removed"><del><strong>be
+      picked up by proprietary malware running on other 
devices</strong></del></span> <span class="inserted"><ins><em>sell the 
product</em></ins></span> in
+      <span class="removed"><del><strong>range so as</strong></del></span> 
<span class="inserted"><ins><em>that country,
+    do you think Amazon would have the moral fiber</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
+      Internet devices</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>paired with your TV, advertisers can
+      correlate ads with Web activity, and
+      other</strong></del></span> <span class="inserted"><ins><em>probably 
hackers too, but please</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html"&gt;
 don't use
+    &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804140"&gt;
+    &lt;p&gt;A medical insurance company</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
+      even if it isn't</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
+    offers</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>gratis 
electronic toothbrush that snoops on its user by
+    sending usage data back over the 
Internet&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201706204"&gt;
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are 
designed</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+      snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
+    listen to everyone in the house,</em></ins></span> all the 
time&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Today's technological practice does not include any way of making
+    <span class="inserted"><ins><em>&lt;p&gt;Today's technological practice 
does not include any way of making
     a device that can obey your voice commands without potentially spying
     on you.  Even if it is air-gapped, it could be saving up records
-    about you for later examination.&lt;/p&gt;
+    about you for later examination.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Nest</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407170"&gt;
-    &lt;p id="nest-thermometers"&gt;Nest</em></ins></span> thermometers send 
&lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    &lt;p id="nest-thermometers"&gt;Nest thermometers send</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
 lot of
     data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201310260"&gt;
-    &lt;p&gt;&lt;a</em></ins></span>
+  &lt;li id="M201310260"&gt;
+    &lt;p&gt;&lt;a
     
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-    Rent-to-own computers were programmed to spy on their 
renters&lt;/a&gt;.&lt;/p&gt;
+    Rent-to-own computers were programmed to spy</em></ins></span> on <span 
class="inserted"><ins><em>their renters&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInTVSets"&gt;Spyware in TV Sets&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
-before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable the surveillance, even if it were not hidden as it was in
-    these TVs, does not legitimize the surveillance.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
-  on their users&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
-      consent before collecting personal data are totally inadequate.
-      And what happens if a user declines consent?  Probably the 
TV</strong></del></span>
-
-
-<span class="inserted"><ins><em>&lt;div class="big-subsection"&gt;
+&lt;div class="big-subsection"&gt;
   &lt;h4 id="SpywareOnWearables"&gt;Wearables&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareOnWearables"&gt;#SpywareOnWearables&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
@@ -2702,52 +2734,29 @@
     
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers"&gt;will
     monitor how often people wear it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> will <span 
class="removed"><del><strong>say, &ldquo;Without your consent to 
tracking,</strong></del></span> <span 
class="inserted"><ins><em>teach</em></ins></span> the <span 
class="removed"><del><strong>TV will
-      not work.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Proper laws would say that TVs are not 
allowed</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
-    monitor every aspect of</em></ins></span> what
-      <span class="removed"><del><strong>the user watches &mdash; no 
exceptions!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>they do.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This will teach</em></ins></span> the <span 
class="removed"><del><strong>internet</strong></del></span> <span 
class="inserted"><ins><em>sheeple</em></ins></span> to <span 
class="removed"><del><strong>another
+    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>find it normal that companies
+    monitor every aspect of what they do.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio goes a step 
further than other TV manufacturers in spying on 
-      their users: their</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h5 id="SpywareOnSmartWatches"&gt;&ldquo;Smart&rdquo; Watches&lt;/h5&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201603020"&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-      &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and 
-      link them your IP address&lt;/a&gt; so</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>advertisers can track you 
-      across devices.&lt;/p&gt;
- 
-      &lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>connects</em></ins></span> to <span 
class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article says</em></ins></span> this <span 
class="removed"><del><strong>off,</strong></del></span> <span 
class="inserted"><ins><em>is a back door,</em></ins></span> but <span 
class="removed"><del><strong>having</strong></del></span> <span 
class="inserted"><ins><em>that could be a
-    misunderstanding.  However,</em></ins></span> it <span 
class="removed"><del><strong>enabled by default</strong></del></span> is <span 
class="removed"><del><strong>an injustice 
already.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>certainly surveillance, at 
least.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android app 
&lt;a
+    
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+    that connects to an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article says this is a back door, but that could be a
+    misunderstanding.  However,</em></ins></span> it <span 
class="inserted"><ins><em>is certainly surveillance, at least.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Tivo's alliance with 
Viacom adds 2.3 million households to
-      the 600 millions social media profiles the company already
-      monitors. Tivo customers are unaware they're being watched by
-      advertisers. By combining TV viewing information with online
-      social media participation, Tivo can now</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201407090"&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;correlate
 TV
-      advertisement with online purchases&lt;/a&gt;, exposing all 
users</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</em></ins></span>
-    to
-      <span class="removed"><del><strong>new combined surveillance by 
default.&lt;/p&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>report its 
location</em></ins></span> to <span class="removed"><del><strong>be
-      picked up by proprietary malware running on other devices in
-      range so as</strong></del></span> <span 
class="inserted"><ins><em>someone else and</em></ins></span> to <span 
class="removed"><del><strong>determine that they are nearby.  Once your
-      Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>transmit conversations
+  &lt;li id="M201407090"&gt;
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch is designed &lt;a
+    
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
+    to report its location to someone else and to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2760,77 +2769,61 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201903290"&gt;
-    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and
-      <span class="removed"><del><strong>other</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to a junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize and
-      &lt;a 
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track what 
people are watching&lt;/a&gt;,
-      even if</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201811300"&gt;
-    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
-    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+    &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
<span class="removed"><del><strong>would then have to
+      give it</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
+    when they go</em></ins></span> to <span class="inserted"><ins><em>a 
junkyard</em></ins></span> the <span class="removed"><del><strong>US or some 
other government.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
-      snooping all</strong></del></span>
+
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China, it</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>mandatory for electric
+    cars</em></ins></span> to be <span class="removed"><del><strong>trusted 
unless it is done
+    by free software in your own computer.&lt;/p&gt;
+
+      &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</strong></del></span> <span class="inserted"><ins><em>equipped with a 
terminal</em></ins></span> that &lt;a <span 
class="removed"><del><strong>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive information will be 
transmitted</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
-    transfers technical data, including car location,
-    to a government-run platform&lt;/a&gt;. In practice, &lt;a
-    href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
-    manufacturers collect this data&lt;/a&gt; as part of their own spying, then
-    forward it to</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>government-run 
platform.&lt;/p&gt;</em></ins></span>
+    transfers technical data, including car location,</em></ins></span>
+    to
+      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in</strong></del></span> <span 
class="inserted"><ins><em>a government-run platform&lt;/a&gt;. In 
practice,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, and
+      the switch to turn</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#car-spying"&gt;
+    manufacturers collect</em></ins></span> this <span 
class="removed"><del><strong>off has no effect.  (The fact 
that</strong></del></span> <span class="inserted"><ins><em>data&lt;/a&gt; as 
part of their own spying, then
+    forward it to</em></ins></span> the
+      <span class="removed"><del><strong>transmission reports a 404 error 
really means nothing;</strong></del></span> <span 
class="inserted"><ins><em>government-run platform.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Samsung 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201810230"&gt;
-    &lt;p&gt;GM</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;transmits
 users' voice on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
-    tracked</em></ins></span> the <span class="removed"><del><strong>internet 
to another
-    company, Nuance&lt;/a&gt;.  Nuance can save</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked</em></ins></span> the <span 
class="removed"><del><strong>server</strong></del></span> <span 
class="inserted"><ins><em>choices of radio programs&lt;/a&gt; in its
     &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
 
-    &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
-      give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
-    sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
-
-    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
-    watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
-
-      &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+    &lt;p&gt;GM did not get users' consent, but it</em></ins></span> could 
<span class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>have got</em></ins></span> that <span 
class="removed"><del><strong>data anyway.)&lt;/p&gt;
 
-    &lt;p&gt;But if you really want</em></ins></span> to
-      <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in
-      &lt;a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user watches, 
and</strong></del></span> <span class="inserted"><ins><em>be safe, we must make 
sure</em></ins></span> the <span class="removed"><del><strong>switch to turn 
this off has no effect.  (The fact</strong></del></span> <span 
class="inserted"><ins><em>car's
-    hardware cannot collect any of</em></ins></span> that <span 
class="removed"><del><strong>the
-      transmission reports a 404 error really means nothing; the server
-      could save</strong></del></span> <span class="inserted"><ins><em>data, 
or</em></ins></span> that <span class="removed"><del><strong>data 
anyway.)&lt;/p&gt;
-
-      &lt;p&gt;Even worse, it
-      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
+      &lt;p&gt;Even worse,</strong></del></span> <span 
class="inserted"><ins><em>easily by
+    sneaking</em></ins></span> it
+      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
 
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>software
-    is free so we know</em></ins></span> it <span 
class="removed"><del><strong>had installed a patch to stop this, but any product
+      &lt;p&gt;LG later said it had installed a patch to stop this, but any 
product
       could spy this way.&lt;/p&gt;
 
       &lt;p&gt;Meanwhile, LG TVs
-      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do lots</strong></del></span> <span class="inserted"><ins><em>won't collect 
any</em></ins></span> of <span class="removed"><del><strong>spying 
anyway&lt;/a&gt;.&lt;/p&gt;
+      &lt;a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
 do</strong></del></span> <span class="inserted"><ins><em>contract that users 
sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect</em></ins></span> lots of <span 
class="removed"><del><strong>spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;
-      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they wanted to 
record.&lt;/a&gt;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>that data.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;&lt;a 
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;Verizon
 cable TV snoops on what programs people watch, and even what they 
wanted</strong></del></span> <span class="inserted"><ins><em>other data: 
listening</em></ins></span> to <span 
class="removed"><del><strong>record.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
+&lt;/ul&gt;
 
 &lt;!-- #SpywareInGames --&gt;
 &lt;div class="big-section"&gt;
@@ -2842,9 +2835,16 @@
 &lt;ul&gt;
 
   &lt;li&gt;
-    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span>
+    &lt;p&gt;The driver for a certain gaming keyboard</strong></del></span> 
<span class="inserted"><ins><em>you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201711230"&gt;
+  &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
 information
         to China&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
@@ -2898,11 +2898,11 @@
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps
       &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range of data about their users</strong></del></span>
+      collect a wide range of</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201306140"&gt;
-    &lt;p&gt;Tesla cars allow the company to extract
-    data remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
+    &lt;p&gt;Tesla cars allow the company to extract</em></ins></span>
+    data <span class="removed"><del><strong>about their 
users</strong></del></span> <span 
class="inserted"><ins><em>remotely</em></ins></span> and <span 
class="removed"><del><strong>their users' 
       friends</strong></del></span> <span class="inserted"><ins><em>determine 
the car's location
     at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
@@ -2951,21 +2951,20 @@
   &lt;li&gt;&lt;p&gt;Users are suing Bose for
       &lt;a 
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
        distributing a spyware app for its headphones&lt;/a&gt;.
-      Specifically, the app would record the names of the audio files
-      users listen to along with the headphone's unique serial number.
-    &lt;/p&gt;
-    &lt;p&gt;The suit accuses that this was done without the users' consent.
-      If the fine print of the app said that users gave 
consent</strong></del></span>
+      Specifically, the app would record</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201612230"&gt;
     &lt;p&gt;VR equipment, measuring every slight motion,
-    creates the potential</em></ins></span> for <span 
class="removed"><del><strong>this,
-      would that make</strong></del></span> <span 
class="inserted"><ins><em>the most intimate
-    surveillance ever. All</em></ins></span> it <span 
class="removed"><del><strong>acceptable? No way! It should be flat out
-      &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
-       illegal</strong></del></span> <span 
class="inserted"><ins><em>takes</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>make this potential real &lt;a
-    
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
+    creates</em></ins></span> the <span class="removed"><del><strong>names 
of</strong></del></span> <span class="inserted"><ins><em>potential 
for</em></ins></span> the <span class="removed"><del><strong>audio files
+      users listen</strong></del></span> <span class="inserted"><ins><em>most 
intimate
+    surveillance ever. All it takes</em></ins></span> to <span 
class="removed"><del><strong>along with the headphone's unique serial number.
+    &lt;/p&gt;
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
+      If the fine print of the app said that users gave consent for this,
+      would that</strong></del></span> make <span 
class="removed"><del><strong>it acceptable? No way! It should be flat 
out</strong></del></span> <span class="inserted"><ins><em>this potential 
real</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html"&gt;
+       illegal to design</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/"&gt;is
     software as malicious as many other programs listed in this
     page&lt;/a&gt;.&lt;/p&gt;
 
@@ -2996,6 +2995,17 @@
   &lt;li&gt;&lt;p&gt;When</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901101"&gt;
     &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
@@ -3390,7 +3400,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:29 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- po/proprietary-surveillance.de.po   22 Apr 2019 11:01:29 -0000      1.279
+++ po/proprietary-surveillance.de.po   22 Apr 2019 12:00:08 -0000      1.280
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -4389,6 +4389,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.412
retrieving revision 1.413
diff -u -b -r1.412 -r1.413
--- po/proprietary-surveillance.fr.po   22 Apr 2019 11:41:32 -0000      1.412
+++ po/proprietary-surveillance.fr.po   22 Apr 2019 12:00:08 -0000      1.413
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2019-04-22 13:36+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3788,6 +3789,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- po/proprietary-surveillance.it-diff.html    22 Apr 2019 11:01:30 -0000      
1.131
+++ po/proprietary-surveillance.it-diff.html    22 Apr 2019 12:00:08 -0000      
1.132
@@ -1288,7 +1288,7 @@
   &lt;li id="M201902060"&gt;
     &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all the users' actions&lt;/a&gt; in interacting with the 
app.&lt;/p&gt;
+    recording all the users' actions&lt;/a&gt; in 
interacting</em></ins></span> with <span class="inserted"><ins><em>the 
app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
@@ -1303,7 +1303,8 @@
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
+      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1311,10 +1312,10 @@
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
-    addition, 85% feature intrusive permissions or functions in their
+    25% fail</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
+    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy on users. Other technical flaws were
+    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
@@ -1956,9 +1957,8 @@
   &lt;/li&gt;
 
   &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>a mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households</em></ins></span>
-    to <span class="removed"><del><strong>listen in on a child's 
speech,</strong></del></span> <span class="inserted"><ins><em>the 600 millions 
social media profiles the company
+    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+    to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
     information with online social media participation, Tivo can now &lt;a
@@ -1968,26 +1968,26 @@
   &lt;/li&gt;
 
   &lt;li id="M201507240"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize</em></ins></span> and 
<span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;,</em></ins></span> even <span 
class="removed"><del><strong>speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>if it isn't a TV channel.&lt;/p&gt;</em></ins></span>
+    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV &lt;a
+    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and even <span 
class="removed"><del><strong>speak
+      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
     &lt;p&gt;A computerized vibrator</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops</em></ins></span> on <span class="inserted"><ins><em>what programs 
people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio &lt;a
-    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
     users <span class="removed"><del><strong>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;
   &lt;/li&gt;
@@ -2007,16 +2007,18 @@
       standard with which manufacturers would make statements about
       their products, rather than</strong></del></span> free
     software <span class="removed"><del><strong>which users could have
-      checked and changed.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
+      checked and changed.&lt;/p&gt;
 
-    &lt;p&gt;In its privacy policy, Samsung explicitly confirms that &lt;a
+    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
+
+    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201411090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>company that 
made</strong></del></span> <span class="inserted"><ins><em>Amazon 
&ldquo;Smart&rdquo; TV is &lt;a
+  &lt;li id="M201411090"&gt;
+    &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
     snooping all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2044,137 +2046,136 @@
       who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
     user <span class="removed"><del><strong>was.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no exceptions!&lt;/p&gt;
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total of C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>company has been ordered</strong></del></span> 
<span class="inserted"><ins><em>user watches, and the switch</em></ins></span> 
to <span class="removed"><del><strong>pay</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact that the transmission 
reports</em></ins></span> a <span class="removed"><del><strong>total of 
C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
+      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
+       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
   
-  &lt;li&gt;&lt;p&gt; &ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to</strong></del></span> <span 
class="inserted"><ins><em>404 error
-    really means nothing;</em></ins></span> the
-       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>server could save 
that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>access the data&lt;/a&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
       collected by the manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That the manufacturer and the FBI</strong></del></span> <span 
class="inserted"><ins><em>stop this, but any
-    product</em></ins></span> could <span class="removed"><del><strong>listen 
to these conversations
+    &lt;p&gt;That</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user watches,</em></ins></span> and the <span 
class="removed"><del><strong>FBI could listen to these conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>spy this way.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201212170"&gt;
-    &lt;p id="break-security-smarttv"&gt;&lt;a
-    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span 
class="removed"><del><strong>adults&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Barbie
+      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;
+&lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
 Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
-    send the video they capture to Amazon servers&lt;/a&gt;, which save it
-    long-term.&lt;/p&gt;
+Note</strong></del></span> <span class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact</em></ins></span> that the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span class="inserted"><ins><em>404 
error</em></ins></span>
+    really
+<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>means nothing; the server could save that data 
anyway.)&lt;/p&gt; 
 
-    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
-    at <span class="removed"><del><strong>Work&lt;/h3&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>the videos 
freely.  It appears Amazon has tried to prevent that
-    secondary abuse, but the primary abuse&mdash;that Amazon gets the
-    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
-    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
-    name!&lt;/p&gt;
+      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>other devices on the user's local 
network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>can collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>had installed 
a patch to stop this, but any
+    product could spy</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>way.&lt;/p&gt;
+
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212170"&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
+    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not to look at what's</em></ins></span> in <span 
class="removed"><del><strong>Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201901100"&gt;
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically</strong></del></span> <span class="inserted"><ins><em>the 
videos. That's not
+      Microsoft changed Skype</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
+    send the video they capture to Amazon servers&lt;/a&gt;, which save it
+    long-term.&lt;/p&gt;
+
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
+
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
+    secondary abuse, but the primary abuse&mdash;that Amazon gets the
+    video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
     security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2208,73 +2209,78 @@
 
   &lt;li id="M201511250"&gt;</em></ins></span>
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
-    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it
-    to outsmart you.&lt;/p&gt;
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;, <span class="removed"><del><strong>even when the 
&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
+      you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInElectronicReaders"&gt;Spyware in 
e-Readers&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInElectronicReaders"&gt;Spyware in e-Readers&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInElectronicReaders"&gt;#SpywareInElectronicReaders&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
   &lt;li&gt;&lt;p&gt;E-books can contain Javascript code,
-    and</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
+    and &lt;a 
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds"&gt;sometimes
     this code snoops on readers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not 
only</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If</em></ins></span> the
-      <span class="removed"><del><strong>Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>user reads at what 
time&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>code could surely convert it
-    into one.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
+      Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
+      they report even which page</strong></del></span>
+    <span class="inserted"><ins><em>even when</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Adobe made 
&ldquo;Digital Editions,&rdquo; the e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found</em></ins></span> to <span 
class="removed"><del><strong>check DRM!&lt;/p&gt;
+      needed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
+
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software 
are</strong></del></span> <span 
class="inserted"><ins><em>make</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings of the conversation between two 
users&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
+  &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
+  snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;</strong></del></span>
 
-  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf has a built-in cell phone modem which allows
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
-  anyone</strong></del></span> <span 
class="inserted"><ins><em>id="M201703140"&gt;
-    &lt;p&gt;A computerized vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
-  access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-    was snooping on</em></ins></span> its <span 
class="removed"><del><strong>computers remotely and make changes in various
+  anyone</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;to
+  access its computers remotely and make</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
+    listening device, remote</em></ins></span> changes <span 
class="removed"><del><strong>in various
   settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication when
-    accessed</strong></del></span> <span 
class="inserted"><ins><em>users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;That's easy</strong></del></span> to <span 
class="removed"><del><strong>do because</strong></del></span> the <span 
class="removed"><del><strong>system has no authentication when
+    accessed</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert it
+    into one.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make &lt;a
+    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of the conversation between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201703140"&gt;
+    &lt;p&gt;A computerized vibrator &lt;a
+    
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+    was snooping on its users</em></ins></span> through the <span 
class="removed"><del><strong>modem.  However, even if</strong></del></span> 
<span class="inserted"><ins><em>proprietary control app&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
     minute (thus, indirectly, whether</em></ins></span> it <span 
class="removed"><del><strong>asked for
@@ -2287,17 +2293,17 @@
     products, rather than free</em></ins></span> software <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>which users could have checked
     and changed.&lt;/p&gt;
 
-    &lt;p&gt;The company that made the vibrator &lt;a
-    
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+    &lt;p&gt;The company that made</em></ins></span> the <span 
class="removed"><del><strong>car is
+    proprietary,</strong></del></span> <span 
class="inserted"><ins><em>vibrator</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html"&gt;which
+    means</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing</em></ins></span> 
the <span class="removed"><del><strong>car is
-    proprietary, &lt;a 
href="/philosophy/free-software-even-more-important.html"&gt;which
-    means</strong></del></span> <span class="inserted"><ins><em>data may be
-    true, but</em></ins></span> it <span class="removed"><del><strong>demands 
blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
     broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
     modem enables</strong></del></span>
     <span class="inserted"><ins><em>user was.&lt;/p&gt;
@@ -2325,27 +2331,16 @@
       payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
       cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
+      determine</strong></del></span>
     <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
-      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
-    conversations was unacceptable by itself.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
-    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
-    company <span class="removed"><del><strong>says it doesn't
-      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control the toys with a mobile phone. This would enable
-    crackers</em></ins></span> to <span class="removed"><del><strong>get the 
data</strong></del></span> <span class="inserted"><ins><em>listen in on a 
child's speech,</em></ins></span> and <span class="removed"><del><strong>hand 
it over,</strong></del></span> <span class="inserted"><ins><em>even speak 
into</em></ins></span> the <span class="removed"><del><strong>state can store 
it.&lt;/p&gt;</strong></del></span>
-    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
+      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data
+      and hand it over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>these
+    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
@@ -2363,14 +2358,25 @@
   &lt;li&gt;&lt;p&gt;Nest thermometers
   send</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
+    company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech, and even speak into the
+    toys themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
       Rent-to-own computers were programmed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2429,17 +2435,17 @@
     these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon 
device,
+    and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>an Amazon device,
-    and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
+    &lt;p&gt;The report</strong></del></span> <span 
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+    &lt;p&gt;It</em></ins></span> was <span class="removed"><del><strong>as of 
2014, but we don't expect this has got better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to 
<span class="removed"><del><strong>get users' formal
       consent before collecting personal data are totally 
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The 
job would be much
     easier for Amazon.</em></ins></span> And <span 
class="removed"><del><strong>what happens</strong></del></span> if <span 
class="removed"><del><strong>a user declines consent?  
Probably</strong></del></span> <span class="inserted"><ins><em>some government 
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
       will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>US
@@ -2584,16 +2590,17 @@
     &lt;p&gt;GM did not get users' consent, but</em></ins></span> it <span 
class="removed"><del><strong>and would then</strong></del></span> <span 
class="inserted"><ins><em>could</em></ins></span> have <span 
class="removed"><del><strong>to
       give</strong></del></span> <span class="inserted"><ins><em>got that 
easily by
     sneaking</em></ins></span> it <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>into</em></ins></span> the <span 
class="removed"><del><strong>US or</strong></del></span> <span 
class="inserted"><ins><em>contract that users sign for</em></ins></span> some 
<span class="removed"><del><strong>other government.&lt;/p&gt;
-      &lt;p&gt;Speech recognition is not to be trusted unless 
it</strong></del></span> <span class="inserted"><ins><em>digital service
-    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>done
-    by free software in</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
+      &lt;p&gt;Speech recognition</strong></del></span> <span 
class="inserted"><ins><em>digital service
+    or other. A requirement for consent</em></ins></span> is <span 
class="removed"><del><strong>not</strong></del></span> <span 
class="inserted"><ins><em>effectively no protection.&lt;/p&gt;
 
-    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    &lt;p&gt;The cars can also collect lots of other data: 
listening</em></ins></span> to <span class="removed"><del><strong>be trusted 
unless it is done
+    by free software in</strong></del></span> <span 
class="inserted"><ins><em>you,
     watching you, following</em></ins></span> your <span 
class="removed"><del><strong>own computer.&lt;/p&gt;
 
       &lt;p&gt;In its privacy policy, Samsung explicitly confirms
-      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice</strong></del></span>
 <span class="inserted"><ins><em>movements, tracking passengers' cell
-    phones. &lt;em&gt;All&lt;/em&gt; such</em></ins></span> data <span 
class="removed"><del><strong>containing sensitive information 
will</strong></del></span> <span class="inserted"><ins><em>collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
+      that &lt;a 
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+      data containing sensitive information will</strong></del></span> <span 
class="inserted"><ins><em>movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection 
should</em></ins></span> be <span 
class="removed"><del><strong>transmitted</strong></del></span> <span 
class="inserted"><ins><em>forbidden.&lt;/p&gt;
 
     &lt;p&gt;But if you really want</em></ins></span> to
       <span class="removed"><del><strong>third parties&lt;/a&gt;.&lt;/p&gt;
@@ -2645,28 +2652,28 @@
   &lt;/li&gt;
 
   &lt;li id="M201602240"&gt;
-    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app</strong></del></span> <span 
class="inserted"><ins><em>built-in
+    &lt;p id="nissan-modem"&gt;The Nissan Leaf has</em></ins></span> a <span 
class="removed"><del><strong>spyware app for</strong></del></span> <span 
class="inserted"><ins><em>built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely and make changes in various
+    access</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
+Specifically,</strong></del></span> <span class="inserted"><ins><em>computers 
remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy to do because the system has no authentication
-    when accessed through the modem.  However, even if it 
asked</em></ins></span>
-    for <span class="inserted"><ins><em>authentication, you couldn't be 
confident that Nissan
-    has no access.  The software in the car is proprietary, &lt;a
+    &lt;p&gt;That's easy to do because</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>system has no authentication
+    when accessed through</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>modem.  However, even if it asked
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software in</em></ins></span> the <span 
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
     href="/philosophy/free-software-even-more-important.html"&gt;which means
-    it demands blind faith from</em></ins></span> its <span 
class="removed"><del><strong>headphones&lt;/a&gt;.
-Specifically,</strong></del></span> <span 
class="inserted"><ins><em>users&lt;/a&gt;.&lt;/p&gt;
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>app would record</strong></del></span> <span 
class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>names of</strong></del></span> <span 
class="inserted"><ins><em>cell phone modem
-    enables</em></ins></span> the <span class="removed"><del><strong>audio 
files
-users listen</strong></del></span> <span class="inserted"><ins><em>phone 
company</em></ins></span> to <span class="removed"><del><strong>along with the 
headphone's unique serial number.
+    &lt;p&gt;Even if no one connects</em></ins></span> to <span 
class="removed"><del><strong>along with</strong></del></span> the <span 
class="removed"><del><strong>headphone's unique serial number.
 &lt;/p&gt;
 
-&lt;p&gt;The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>fine print of</strong></del></span> <span 
class="inserted"><ins><em>car's movements all</em></ins></span> the <span 
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span 
class="inserted"><ins><em>time;</em></ins></span>
+&lt;p&gt;The suit accuses that this was done without</strong></del></span> 
<span class="inserted"><ins><em>car remotely,</em></ins></span> the <span 
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+    enables</em></ins></span> the <span class="removed"><del><strong>fine 
print of</strong></del></span> <span class="inserted"><ins><em>phone company to 
track</em></ins></span> the <span class="removed"><del><strong>app said that 
users gave consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>car's 
movements all the time;</em></ins></span>
     it <span class="removed"><del><strong>acceptable? No way! It should be 
flat out
 &lt;a href="/philosophy/surveillance-vs-democracy.html"&gt;
 illegal</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span 
class="removed"><del><strong>design</strong></del></span> <span 
class="inserted"><ins><em>physically remove</em></ins></span> the <span 
class="removed"><del><strong>app to snoop at all&lt;/a&gt;.
@@ -2714,8 +2721,8 @@
       also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
     is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter 
of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>game play</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
+    anonymous payment systems, but the invasion isn't done by malware. The
+    other cases mentioned are done by proprietary malware in</em></ins></span> 
the <span class="removed"><del><strong>game play</strong></del></span> <span 
class="inserted"><ins><em>car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2763,6 +2770,17 @@
   &lt;li&gt;&lt;p&gt;When</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901101"&gt;
     &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
@@ -3121,7 +3139,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.292
retrieving revision 1.293
diff -u -b -r1.292 -r1.293
--- po/proprietary-surveillance.it.po   22 Apr 2019 11:01:30 -0000      1.292
+++ po/proprietary-surveillance.it.po   22 Apr 2019 12:00:08 -0000      1.293
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -4159,6 +4159,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- po/proprietary-surveillance.ja-diff.html    22 Apr 2019 11:01:30 -0000      
1.141
+++ po/proprietary-surveillance.ja-diff.html    22 Apr 2019 12:00:08 -0000      
1.142
@@ -1286,30 +1286,55 @@
 
     &lt;p&gt;I expect</em></ins></span> it <span 
class="inserted"><ins><em>implements DRM, too&mdash;that 
there</em></ins></span> is <span class="removed"><del><strong>surrounded 
by</strong></del></span> <span class="inserted"><ins><em>no way to 
save</em></ins></span>
     a <span class="removed"><del><strong>person's
-      body), and</strong></del></span> <span 
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span> 
the <span class="removed"><del><strong>vibration frequency.&lt;/p&gt;
+      body), and the vibration frequency.&lt;/p&gt;
 
-      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
+      &lt;p&gt;Note</strong></del></span> <span 
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span> 
the <span class="removed"><del><strong>totally inadequate proposed response: a 
labeling
+      standard with which manufacturers would make 
statements</strong></del></span> <span 
class="inserted"><ins><em>article.&lt;/p&gt;
 
-    &lt;p&gt;If you learn to care much less about sports, you will benefit in
-    many ways. This is one more.&lt;/p&gt;
+    &lt;p&gt;If you learn to care much less</em></ins></span> about
+      <span class="removed"><del><strong>their products, rather than free 
software which users can check
+      and change.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>sports, you will benefit in
+    many ways. This is one more.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201804160"&gt;
+    &lt;p&gt;More than</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
+    of the 5,855 Android apps studied by researchers were 
found</em></ins></span> to <span class="removed"><del><strong>spy on 
children</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span>
+    and <span class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;!-- #SpywareAtLowLevel --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>collect information about its users&lt;/a&gt;.  40% 
of the apps were
+    found</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span class="inserted"><ins><em>insecurely 
snitch</em></ins></span> on <span class="removed"><del><strong>top under each 
subsection --&gt;
+
+&lt;div class="big-section"&gt;
+  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>its users.  Furthermore, they could
+    detect only some methods of snooping,</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
 
-  &lt;li id="M201804160"&gt;
-    &lt;p&gt;More than &lt;a
-    
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy"&gt;50%
-    of</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response: a labeling
-      standard with which manufacturers would make 
statements</strong></del></span> <span class="inserted"><ins><em>5,855 Android 
apps studied by researchers were found to snoop
-    and collect information</em></ins></span> about <span 
class="inserted"><ins><em>its users&lt;/a&gt;.  40% of the apps were
-    found to insecurely snitch on its users.  Furthermore, they could
-    detect only some methods of snooping, in these proprietary apps whose
+&lt;ul&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these proprietary apps whose
     source code they cannot look at.  The other apps might be snooping
     in other ways.&lt;/p&gt;
 
-    &lt;p&gt;This is evidence that proprietary apps generally work 
against</em></ins></span>
-    their <span class="removed"><del><strong>products, rather than free 
software which users can check</strong></del></span> <span 
class="inserted"><ins><em>users.  To protect their privacy</em></ins></span> 
and <span class="removed"><del><strong>change.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>freedom, Android users
+    &lt;p&gt;This is evidence that proprietary apps generally work against
+    their users.  To protect their privacy and freedom, Android users
     need to get rid of the proprietary software&mdash;both proprietary
-    Android by &lt;a href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,
-    and the proprietary apps by getting apps from the free software
+    Android by</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware</strong></del></span> <span 
class="inserted"><ins><em>href="https://replicant.us"&gt;switching to 
Replicant&lt;/a&gt;,</em></ins></span>
+    and <span class="removed"><del><strong>spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>the 
proprietary apps by getting apps from the free software
     only &lt;a href="https://f-droid.org/"&gt;F-Droid store&lt;/a&gt; that 
&lt;a
     href="https://f-droid.org/wiki/page/Antifeatures"&gt; prominently warns
     the user if an app contains anti-features&lt;/a&gt;.&lt;/p&gt;
@@ -1328,7 +1353,7 @@
 
   &lt;li id="M201803050"&gt;
     &lt;p&gt;The moviepass app and dis-service
-    spy on users even more than users expected. It &lt;a
+    spy</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.</strong></del></span> <span class="inserted"><ins><em>users even more 
than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
     where they travel before and after going to a movie&lt;/a&gt;.&lt;/p&gt;
 
@@ -1347,7 +1372,7 @@
     &lt;p&gt;The Sarahah app &lt;a
     
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
     uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-    book to developer's server.  Note that this article misuses the words
+    book to developer's server.</em></ins></span>  Note that <span 
class="inserted"><ins><em>this article misuses the words
     &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
     referring to zero price.&lt;/p&gt;
   &lt;/li&gt;
@@ -1930,11 +1955,10 @@
     work.&rdquo;&lt;/p&gt;
 
     &lt;p&gt;Proper laws would say that TVs are not allowed to report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
+    user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Barbie</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+  &lt;li id="M201405200"&gt;
     &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
     
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
     reports what the user watches, and the switch to turn this off has
@@ -1943,12 +1967,20 @@
 
     &lt;p&gt;Even worse, it &lt;a
     
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
+    snoops on other devices on</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
+    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>patch to 
stop this, but any
     product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going</strong></del></span>
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+puts in its own malware&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;!-- #SpywareAtWork --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
     do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -1956,107 +1988,75 @@
   &lt;li id="M201212170"&gt;
     &lt;p id="break-security-smarttv"&gt;&lt;a
     
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>children</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;</em></ins></span>
-    and <span 
class="removed"><del><strong>adults.&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use its camera to watch the people who are 
watching TV.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-<span class="removed"><del><strong>&lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtLowLevel"&gt;#SpywareAtLowLevel&lt;/a&gt;)&lt;/span&gt;
+  &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;</strong></del></span>
+&lt;div style="clear: left;"&gt;&lt;/div&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Investigation
+        Shows &lt;a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions&lt;/a&gt;.&lt;/p&gt;
+
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInBIOS"&gt;Spyware in 
BIOS&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInSkype"&gt;Spyware in 
Skype&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInCameras"&gt;Cameras&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201901100"&gt;
-    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span>
+    &lt;p&gt;Amazon Ring &ldquo;security&rdquo; devices</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
+      Microsoft changed Skype</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"&gt;
     send the video they capture to Amazon servers&lt;/a&gt;, which save it
     long-term.&lt;/p&gt;
 
-    &lt;p&gt;In many cases, the video shows everyone</em></ins></span> that 
<span class="inserted"><ins><em>comes near, or merely
-    passes by,</em></ins></span> the <span 
class="removed"><del><strong>specific sabotage method 
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front 
door.&lt;/p&gt;
-
-    &lt;p&gt;The article focuses on how Ring</em></ins></span> used <span 
class="removed"><del><strong>did not affect
-GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
-clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
-puts in its own malware&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+    &lt;p&gt;In many cases, the video shows everyone that comes near, or merely
+    passes by, the user's front door.&lt;/p&gt;
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtWork"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>let individual employees look</em></ins></span>
-    at <span class="removed"><del><strong>Work&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtWork"&gt;#SpywareAtWork&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Investigation
-        Shows</strong></del></span> <span class="inserted"><ins><em>the videos 
freely.  It appears Amazon has tried to prevent that
+    &lt;p&gt;The article focuses on how Ring used to let individual employees 
look
+    at the videos freely.  It appears Amazon has tried to prevent that
     secondary abuse, but the primary abuse&mdash;that Amazon gets the
     video&mdash;Amazon expects society to surrender to.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201810300"&gt;
-    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml"&gt;GCHQ
-        Using US Companies, NSA To Route Around Domestic Surveillance
-        Restrictions&lt;/a&gt;.&lt;/p&gt;
-
-      &lt;p&gt;Specifically, it can collect</strong></del></span>
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo;</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
+      specifically</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
-    give</em></ins></span> the <span class="removed"><del><strong>emails of 
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an 
unencrypted copy</em></ins></span> of <span 
class="removed"><del><strong>Parliament
-  this way, because</strong></del></span> <span 
class="inserted"><ins><em>everything</em></ins></span> they <span 
class="removed"><del><strong>pass</strong></del></span>
-    <span class="inserted"><ins><em>see&lt;/a&gt;. &ldquo;Home insecurity 
camera&rdquo; would be a better
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
     name!&lt;/p&gt;
 
-    &lt;p&gt;When Consumer Reports tested them,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
-      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Spyware in Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:
-      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
-      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype
-      &lt;a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
-      specifically for spying&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security</em></ins></span> for <span 
class="removed"><del><strong>spying&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnTheRoad --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>suggested that these
-    manufacturers promise not</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make</strong></del></span> <span 
class="inserted"><ins><em>your home. Security means making</em></ins></span> 
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnTheRoad"&gt;Spyware on The Road&lt;/h3&gt;
@@ -2065,14 +2065,13 @@
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInCameras"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>look at what's</em></ins></span> in <span 
class="removed"><del><strong>Cameras&lt;/h4&gt;
+  &lt;h4 id="SpywareInCameras"&gt;Spyware in Cameras&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInCameras"&gt;#SpywareInCameras&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>the videos. 
That's not
-    security for your home. Security means making sure they don't get to
-    see through your camera.&lt;/p&gt;
+  &lt;li&gt;</strong></del></span>
+    <span class="inserted"><ins><em>see through your camera.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201603220"&gt;
@@ -2171,106 +2170,102 @@
 
     &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to the car 
remotely,</strong></del></span> <span class="inserted"><ins><em>was 
anonymizing</em></ins></span> the <span class="removed"><del><strong>cell phone
-    modem enables</strong></del></span> <span class="inserted"><ins><em>data 
may be
-    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>phone company</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements 
all</strong></del></span> <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>time; it 
is possible</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able</em></ins></span> to <span 
class="removed"><del><strong>physically remove</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone modem
-    though.&lt;/p&gt;
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
+    modem enables</strong></del></span>
+    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+
+    &lt;p&gt;Following this lawsuit, &lt;a
+    
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
+    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
+    though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
+    customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Proprietary software in cars</strong></del></span>
-    <span class="inserted"><ins><em>user was.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Proprietary software 
in cars</strong></del></span>
 
-    &lt;p&gt;Following this lawsuit,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
+  <span class="inserted"><ins><em>&lt;li id="M201702280"&gt;
+    &lt;p&gt;&ldquo;CloudPets&rdquo; toys with microphones</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;records
 information about drivers' movements&lt;/a&gt;,
       which is made available</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-    the company has been ordered</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
+    leak childrens' conversations</em></ins></span> to <span 
class="removed"><del><strong>car manufacturers, insurance companies, and
       others.&lt;/p&gt;
 
       &lt;p&gt;The case of toll-collection systems, mentioned in this article, 
is not
-      really</strong></del></span> <span 
class="inserted"><ins><em>pay</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
-      intolerable invasion</strong></del></span> <span 
class="inserted"><ins><em>total</em></ins></span> of <span 
class="removed"><del><strong>privacy, and should be 
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m&lt;/a&gt; 
to its
-    customers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201702280"&gt;
-    &lt;p&gt;&ldquo;CloudPets&rdquo; toys</em></ins></span> with <span 
class="removed"><del><strong>anonymous
-      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>microphones &lt;a
-    
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;
-    leak childrens' conversations to</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
-      cases mentioned are done by proprietary malware in</strong></del></span> 
<span class="inserted"><ins><em>manufacturer&lt;/a&gt;. Guess what? &lt;a
+      really</strong></del></span> <span class="inserted"><ins><em>the 
manufacturer&lt;/a&gt;. Guess what? &lt;a
     
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;
-    Crackers found a way to access</em></ins></span> the <span 
class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
+    Crackers found</em></ins></span> a <span 
class="removed"><del><strong>matter of proprietary surveillance. These systems 
are an
+      intolerable invasion of privacy, and should be replaced with anonymous
+      payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
+      cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected by</em></ins></span> the 
<span class="removed"><del><strong>company to extract data remotely and
-      determine</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
     <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data</strong></del></span> <span 
class="inserted"><ins><em>these
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
     conversations was unacceptable by itself.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>hand it over,</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
     
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in</em></ins></span> the <span 
class="removed"><del><strong>state</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
-    can <span class="removed"><del><strong>store it.&lt;/p&gt;
+    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
+    company <span class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
-
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
-      Rent-to-own computers were programmed</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;
-  &lt;/li&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-  &lt;li id="M201502180"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
+&lt;/ul&gt;</em></ins></span>
 
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips 
made</strong></del></span>
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+      Rent-to-own computers were programmed</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>joke: The</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
-    to snoop on</em></ins></span> other <span class="removed"><del><strong>day 
a woman came up</strong></del></span> <span class="inserted"><ins><em>people, 
DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -2301,42 +2296,42 @@
     turn it into a listening device&lt;/a&gt; for them.&lt;/p&gt;
 
     &lt;p&gt;It</em></ins></span> was <span class="inserted"><ins><em>very 
difficult for them to do this. The job would be much
-    easier for Amazon. And if some government such</em></ins></span> as <span 
class="removed"><del><strong>of 2014,</strong></del></span> <span 
class="inserted"><ins><em>China or the US
-    told Amazon to do this, or cease to sell the product in that country,
-    do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
+    easier for Amazon. And if some government such</em></ins></span> as <span 
class="removed"><del><strong>of 2014, but we don't expect this has got 
better.&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too,</em></ins></span> but 
<span class="removed"><del><strong>we</strong></del></span> <span 
class="inserted"><ins><em>please &lt;a
-    href="https://stallman.org/articles/on-hacking.html"&gt;</em></ins></span> 
don't <span class="removed"><del><strong>expect this has got better.&lt;/p&gt;
-
-    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>use
+    &lt;p&gt;This shows</strong></del></span> <span 
class="inserted"><ins><em>China or the US
+    told Amazon to do this, or cease to sell the product in</em></ins></span> 
that <span class="removed"><del><strong>laws requiring 
products</strong></del></span> <span class="inserted"><ins><em>country,
+    do you think Amazon would have the moral fiber</em></ins></span> to <span 
class="removed"><del><strong>get users' formal
+      consent before collecting personal data</strong></del></span> <span 
class="inserted"><ins><em>say no?&lt;/p&gt;
+
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>totally inadequate.
+      And what happens if</strong></del></span> <span 
class="inserted"><ins><em>probably hackers too, but please &lt;a
+    href="https://stallman.org/articles/on-hacking.html"&gt; don't use
     &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804140"&gt;
     &lt;p&gt;A medical insurance company &lt;a
     
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next"&gt;
-    offers a gratis electronic toothbrush</em></ins></span> that <span 
class="removed"><del><strong>laws requiring</strong></del></span> <span 
class="inserted"><ins><em>snoops on its user by
-    sending usage data back over the Internet&lt;/a&gt;.&lt;/p&gt;
+    offers</em></ins></span> a <span class="inserted"><ins><em>gratis 
electronic toothbrush that snoops on its</em></ins></span> user <span 
class="removed"><del><strong>declines consent?  Probably</strong></del></span> 
<span class="inserted"><ins><em>by
+    sending usage data back over</em></ins></span> the <span 
class="removed"><del><strong>TV
+      will say, &ldquo;Without</strong></del></span> <span 
class="inserted"><ins><em>Internet&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706204"&gt;
-    &lt;p&gt;Lots of &ldquo;smart&rdquo;</em></ins></span> products <span 
class="inserted"><ins><em>are designed &lt;a
+    &lt;p&gt;Lots of &ldquo;smart&rdquo; products are designed &lt;a
     
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022"&gt;to
-    listen</em></ins></span> to <span class="removed"><del><strong>get users' 
formal
-      consent before collecting personal</strong></del></span> <span 
class="inserted"><ins><em>everyone in the house, all the 
time&lt;/a&gt;.&lt;/p&gt;
+    listen to everyone in the house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of making
-    a device that can obey your voice commands without potentially spying
+    a device that can obey</em></ins></span> your <span 
class="removed"><del><strong>consent</strong></del></span> <span 
class="inserted"><ins><em>voice commands without potentially spying
     on you.  Even if it is air-gapped, it could be saving up records
     about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
-    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot 
of</em></ins></span>
-    data <span class="removed"><del><strong>are totally inadequate.
-      And what happens if a user declines consent?  
Probably</strong></del></span> <span 
class="inserted"><ins><em>about</em></ins></span> the <span 
class="removed"><del><strong>TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>user&lt;/a&gt;.&lt;/p&gt;
+    href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
+    data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201310260"&gt;
@@ -2403,8 +2398,8 @@
       picked up by proprietary malware running on other devices in
       range so as</strong></del></span> <span class="inserted"><ins><em>report 
its location</em></ins></span> to <span class="removed"><del><strong>determine 
that they are nearby.  Once your
       Internet devices are paired with your TV, advertisers can
-      correlate ads with Web activity, and
-      other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>someone else and to transmit conversations
+      correlate ads with Web activity,</strong></del></span> <span 
class="inserted"><ins><em>someone else</em></ins></span> and
+      <span class="removed"><del><strong>other &lt;a 
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;cross-device
 tracking&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to transmit conversations
     too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Vizio 
&ldquo;smart&rdquo; TVs recognize</strong></del></span>
@@ -2419,16 +2414,17 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201903290"&gt;
     &lt;p&gt;Tesla cars collect lots of personal data,</em></ins></span> and 
&lt;a <span 
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
 what people are watching&lt;/a&gt;,
-      even if it isn't</strong></del></span>
+      even if</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html"&gt;
-    when they go to</em></ins></span> a <span class="removed"><del><strong>TV 
channel.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>junkyard the driver's personal data goes with
-    them&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    when they go to a junkyard the driver's personal data goes with
+    them&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Amazon 
&ldquo;Smart&rdquo; TV</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201811300"&gt;
-    &lt;p&gt;In China, it is mandatory for electric
-    cars to be equipped with a terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
+  &lt;li id="M201811300"&gt;
+    &lt;p&gt;In China,</em></ins></span> it <span 
class="removed"><del><strong>isn't</strong></del></span> <span 
class="inserted"><ins><em>is mandatory for electric
+    cars to be equipped with</em></ins></span> a <span 
class="removed"><del><strong>TV channel.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;&lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV</strong></del></span> 
<span class="inserted"><ins><em>terminal that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;is
       watching and listening all</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca"&gt;
     transfers technical data, including car location,
@@ -2465,42 +2461,41 @@
   &lt;li id="M201711230"&gt;
     &lt;p&gt;AI-powered driving apps can &lt;a
     
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    track</em></ins></span> your <span class="removed"><del><strong>own 
computer.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>every 
move&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware 
in</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201607160"&gt;
-    &lt;p id="car-spying"&gt;Computerized cars with nonfree software 
are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what the user 
watches,</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
-    snooping devices&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201607160"&gt;
+    &lt;p id="car-spying"&gt;Computerized cars with nonfree software are &lt;a
+    
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html"&gt;
+    snooping devices&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
 
-  &lt;li id="M201602240"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201602240"&gt;
     &lt;p id="nissan-modem"&gt;The Nissan Leaf has a built-in
     cell phone modem which allows effectively anyone to &lt;a
     href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"&gt;
-    access its computers remotely</em></ins></span> and
-      <span class="removed"><del><strong>the switch</strong></del></span> 
<span class="inserted"><ins><em>make changes in various
+    access its computers remotely and make changes in various
     settings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;That's easy</em></ins></span> to <span 
class="removed"><del><strong>turn this off</strong></del></span> <span 
class="inserted"><ins><em>do because the system has no authentication
+    &lt;p&gt;That's easy to do because the system has no authentication
     when accessed through the modem.  However, even if it asked
-    for authentication, you couldn't be confident that Nissan</em></ins></span>
-    has no <span class="removed"><del><strong>effect.  (The fact 
that</strong></del></span> <span class="inserted"><ins><em>access.  The 
software in</em></ins></span> the
-      <span class="removed"><del><strong>transmission reports a 404 error 
really</strong></del></span> <span class="inserted"><ins><em>car is 
proprietary, &lt;a
-    
href="/philosophy/free-software-even-more-important.html"&gt;which</em></ins></span>
 means <span class="removed"><del><strong>nothing; the server
+    for authentication, you couldn't be confident that Nissan
+    has no access.  The software</em></ins></span> in <span 
class="inserted"><ins><em>the car is proprietary,</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+      LG &ldquo;smart&rdquo; TVs&lt;/a&gt; reports what</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html"&gt;which
 means
+    it demands blind faith from its users&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>user watches, and</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
+    enables</em></ins></span> the <span 
class="removed"><del><strong>switch</strong></del></span> <span 
class="inserted"><ins><em>phone company</em></ins></span> to <span 
class="removed"><del><strong>turn this off has no effect.  (The fact that the
+      transmission reports a 404 error really means 
nothing;</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> the <span 
class="removed"><del><strong>server
       could save that data anyway.)&lt;/p&gt;
 
-      &lt;p&gt;Even worse,</strong></del></span>
-    it
-      <span class="removed"><del><strong>&lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+      &lt;p&gt;Even worse, it
+      &lt;a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+      snoops on other devices on</strong></del></span> <span 
class="inserted"><ins><em>car's movements all</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects to</em></ins></span> the <span 
class="removed"><del><strong>user's local network.&lt;/a&gt;&lt;/p&gt;
-
-      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>car remotely, the cell phone modem
-    enables the phone company to track the car's movements all the 
time;</em></ins></span>
+      &lt;p&gt;LG later said</strong></del></span> <span 
class="inserted"><ins><em>time;</em></ins></span>
     it <span class="removed"><del><strong>had installed a 
patch</strong></del></span> <span class="inserted"><ins><em>is 
possible</em></ins></span> to <span class="removed"><del><strong>stop this, but 
any product
       could spy this way.&lt;/p&gt;
 
@@ -2517,7 +2512,9 @@
 
 &lt;!-- #SpywareAtPlay --&gt;
 &lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtPlay"&gt;Spyware at Play&lt;/h3&gt;
+  &lt;h3 id="SpywareAtPlay"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>extract
+    data remotely and determine the car's location</em></ins></span>
+    at <span class="removed"><del><strong>Play&lt;/h3&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtPlay"&gt;#SpywareAtPlay&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 &lt;div style="clear: left;"&gt;&lt;/div&gt;
@@ -2525,44 +2522,40 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Many 
       &lt;a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-      video game consoles snoop on their users</strong></del></span> <span 
class="inserted"><ins><em>extract
-    data remotely</em></ins></span> and <span 
class="removed"><del><strong>report to</strong></del></span> <span 
class="inserted"><ins><em>determine</em></ins></span> the 
+      video game consoles snoop on their users</strong></del></span> <span 
class="inserted"><ins><em>any time. (See Section 2, paragraphs 
b</em></ins></span> and <span 
class="removed"><del><strong>report</strong></del></span> <span 
class="inserted"><ins><em>c of the &lt;a
+    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
+    privacy statement&lt;/a&gt;.) The company says it doesn't store this
+    information, but if the state orders it</em></ins></span> to <span 
class="inserted"><ins><em>get</em></ins></span> the 
       <span class="removed"><del><strong>internet&lt;/a&gt;&mdash; even what 
their users weigh.&lt;/p&gt;
 
-      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>car's location
-    at any time. (See Section 2, paragraphs b</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
-      a nonfree operating system.&lt;/p&gt;
+      &lt;p&gt;A game console is a computer,</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> and <span 
class="removed"><del><strong>you can't trust a computer with 
+      a nonfree operating system.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>hand it
+    over, the state can store it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Modern gratis game cr&hellip;apps
-      &lt;a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-      collect a wide range</strong></del></span> <span 
class="inserted"><ins><em>c</em></ins></span> of <span 
class="removed"><del><strong>data about their users and their users' 
-      friends and associates&lt;/a&gt;.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Modern gratis game 
cr&hellip;apps</strong></del></span>
 
-      &lt;p&gt;Even nastier, they do</strong></del></span> <span 
class="inserted"><ins><em>the &lt;a
-    
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-    privacy statement&lt;/a&gt;.) The company says</em></ins></span> it <span 
class="removed"><del><strong>through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
-    information, but if the state orders it to get</em></ins></span> the data
-      <span class="removed"><del><strong>collected by various 
cr&hellip;apps</strong></del></span> and <span 
class="removed"><del><strong>sites</strong></del></span> <span 
class="inserted"><ins><em>hand it
-    over, the state can store it.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201303250"&gt;
+    &lt;p id="records-drivers"&gt;Proprietary software in 
cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
+      collect a wide range of data</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
+    records information</em></ins></span> about <span 
class="removed"><del><strong>their users and their users' 
+      friends</strong></del></span> <span class="inserted"><ins><em>drivers' 
movements&lt;/a&gt;, which is made
+    available to car manufacturers, insurance companies,</em></ins></span> and 
<span class="removed"><del><strong>associates&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li id="M201303250"&gt;
-    &lt;p id="records-drivers"&gt;Proprietary software in cars &lt;a
-    
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/"&gt;
-    records information about drivers' movements&lt;/a&gt;, which 
is</em></ins></span> made <span class="removed"><del><strong>by different 
-      companies.&lt;/p&gt;
+      &lt;p&gt;Even nastier, they do it through ad networks that 
merge</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
 
-      &lt;p&gt;They use this data to manipulate people</strong></del></span>
-    <span class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>buy things,</strong></del></span> <span 
class="inserted"><ins><em>car manufacturers, insurance 
companies,</em></ins></span> and <span class="removed"><del><strong>hunt 
-      for &ldquo;whales&rdquo; who can be led to spend a 
lot</strong></del></span> <span class="inserted"><ins><em>others.&lt;/p&gt;
-
-    &lt;p&gt;The case</em></ins></span> of <span 
class="removed"><del><strong>money. They 
-      also use</strong></del></span> <span 
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
-    is not really</em></ins></span> a <span class="removed"><del><strong>back 
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter 
of proprietary surveillance. These systems
+    &lt;p&gt;The case of toll-collection systems, mentioned in this article,
+    is not really a matter of proprietary surveillance. These systems
     are an intolerable invasion of privacy, and should be replaced with
-    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>game play</strong></del></span> <span 
class="inserted"><ins><em>invasion isn't done by malware. The
-    other cases mentioned are done by proprietary malware in the car.&lt;/p&gt;
+    anonymous payment systems, but</em></ins></span> the <span 
class="removed"><del><strong>data
+      collected</strong></del></span> <span class="inserted"><ins><em>invasion 
isn't done</em></ins></span> by <span class="removed"><del><strong>various 
cr&hellip;apps and sites made</strong></del></span> <span 
class="inserted"><ins><em>malware. The
+    other cases mentioned are done</em></ins></span> by <span 
class="removed"><del><strong>different 
+      companies.&lt;/p&gt;
+
+      &lt;p&gt;They use this data to manipulate people to buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+      also use a back door to manipulate</strong></del></span> <span 
class="inserted"><ins><em>proprietary malware in</em></ins></span> the <span 
class="removed"><del><strong>game play</strong></del></span> <span 
class="inserted"><ins><em>car.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2610,6 +2603,17 @@
   &lt;li&gt;&lt;p&gt;Online</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201901101"&gt;
     &lt;p&gt;Until 2015, any tweet that listed a geographical tag &lt;a
     
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/"&gt;
@@ -2960,7 +2964,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- po/proprietary-surveillance.ja.po   22 Apr 2019 11:01:30 -0000      1.265
+++ po/proprietary-surveillance.ja.po   22 Apr 2019 12:00:08 -0000      1.266
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3537,6 +3537,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- po/proprietary-surveillance.pot     22 Apr 2019 11:01:30 -0000      1.213
+++ po/proprietary-surveillance.pot     22 Apr 2019 12:00:08 -0000      1.214
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2583,6 +2583,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a "
+"href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk\";>no
 "
+"longer possible to disable an unscrupulous tracking anti-feature</a> that <a "
+"href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\";>reports
 "
+"users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, "
+"Microsoft Edge and also in the upcoming Microsoft Edge that going to be "
+"based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Until 2015, any tweet that listed a geographical tag <a "
 
"href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\";>
 "
 "sent the precise GPS location to Twitter's server</a>. It still contains "

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.509
retrieving revision 1.510
diff -u -b -r1.509 -r1.510
--- po/proprietary-surveillance.ru.po   22 Apr 2019 11:29:52 -0000      1.509
+++ po/proprietary-surveillance.ru.po   22 Apr 2019 12:00:08 -0000      1.510
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3741,6 +3742,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-";
 "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-";
 "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "

Index: po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- po/proprietary.de-diff.html 22 Apr 2019 11:01:30 -0000      1.84
+++ po/proprietary.de-diff.html 22 Apr 2019 12:00:08 -0000      1.85
@@ -46,13 +46,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
@@ -247,14 +258,6 @@
     &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- po/proprietary.de.po        22 Apr 2019 11:01:30 -0000      1.126
+++ po/proprietary.de.po        22 Apr 2019 12:00:08 -0000      1.127
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -540,15 +551,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- po/proprietary.es.po        22 Apr 2019 11:01:30 -0000      1.151
+++ po/proprietary.es.po        22 Apr 2019 12:00:08 -0000      1.152
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -395,20 +406,6 @@
 "Un software privativo presente en el teléfono debe de ser el responsable de "
 "enviar los datos de localización a Google."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-"En un teléfono Android se ha observado que rastreaba la localización 
incluso "
-"en modo avión. Mientras estaba en modo avión no enviaba los datos de "
-"localización. En lugar de eso, <a href=\"https://www.thesun.co.uk/";
-"tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"
-"\">guardaba los datos y los enviaba después</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -488,6 +485,19 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "An Android phone was observed to track location even while in airplane "
+#~ "mode. It didn't send the location data while in airplane mode.  Instead, "
+#~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-";
+#~ "even-with-airplane-mode-turned-on/\"> it saved up the data, and sent them "
+#~ "all later</a>."
+#~ msgstr ""
+#~ "En un teléfono Android se ha observado que rastreaba la localización "
+#~ "incluso en modo avión. Mientras estaba en modo avión no enviaba los 
datos "
+#~ "de localización. En lugar de eso, <a href=\"https://www.thesun.co.uk/";
+#~ "tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"
+#~ "\">guardaba los datos y los enviaba después</a>."
+
+#~ msgid ""
 #~ "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM "
 #~ "is valid by connecting to the store every time their &ldquo;owner&rdquo; "
 #~ "wants to read them. Microsoft is going to close this store, <a href="

Index: po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/proprietary.fr.po        22 Apr 2019 11:41:32 -0000      1.186
+++ po/proprietary.fr.po        22 Apr 2019 12:00:08 -0000      1.187
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2019-04-22 13:36+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -423,20 +435,6 @@
 "Ce doit être un logiciel non libre présent dans le téléphone qui envoie 
ces "
 "données à Google."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-"On a constaté que le GPS d'un certain téléphone Android fonctionnait même 
en "
-"mode avion. Les données de géolocalisation n'étaient pas envoyées sur le "
-"moment, mais <a href=\"https://www.thesun.co.uk/tech/7811918/google-is-";
-"tracking-you-even-with-airplane-mode-turned-on/\">sauvegardées et envoyées "
-"plus tard</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,6 +510,19 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "An Android phone was observed to track location even while in airplane "
+#~ "mode. It didn't send the location data while in airplane mode.  Instead, "
+#~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-";
+#~ "even-with-airplane-mode-turned-on/\"> it saved up the data, and sent them "
+#~ "all later</a>."
+#~ msgstr ""
+#~ "On a constaté que le GPS d'un certain téléphone Android fonctionnait 
même "
+#~ "en mode avion. Les données de géolocalisation n'étaient pas envoyées 
sur "
+#~ "le moment, mais <a href=\"https://www.thesun.co.uk/tech/7811918/google-is-";
+#~ "tracking-you-even-with-airplane-mode-turned-on/\">sauvegardées et "
+#~ "envoyées plus tard</a>."
+
+#~ msgid ""
 #~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 #~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 #~ "hacking/507470932/\"> two vulnerabilities that affect several models of "

Index: po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/proprietary.it-diff.html 22 Apr 2019 11:01:30 -0000      1.96
+++ po/proprietary.it-diff.html 22 Apr 2019 12:00:08 -0000      1.97
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
@@ -246,14 +257,6 @@
     &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -314,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/proprietary.it.po        22 Apr 2019 11:01:30 -0000      1.135
+++ po/proprietary.it.po        22 Apr 2019 12:00:08 -0000      1.136
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -517,15 +528,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- po/proprietary.ja-diff.html 22 Apr 2019 11:01:30 -0000      1.97
+++ po/proprietary.ja-diff.html 22 Apr 2019 12:00:08 -0000      1.98
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -157,10 +157,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -181,6 +181,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
@@ -243,14 +254,6 @@
     &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -311,7 +314,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- po/proprietary.ja.po        22 Apr 2019 11:01:30 -0000      1.118
+++ po/proprietary.ja.po        22 Apr 2019 12:00:08 -0000      1.119
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -450,15 +461,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- po/proprietary.nl-diff.html 22 Apr 2019 11:01:30 -0000      1.96
+++ po/proprietary.nl-diff.html 22 Apr 2019 12:00:08 -0000      1.97
@@ -159,10 +159,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -184,6 +184,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
@@ -246,14 +257,6 @@
     &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -314,7 +317,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- po/proprietary.nl.po        22 Apr 2019 11:01:30 -0000      1.107
+++ po/proprietary.nl.po        22 Apr 2019 12:00:08 -0000      1.108
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -510,15 +521,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- po/proprietary.pl-diff.html 22 Apr 2019 11:01:30 -0000      1.114
+++ po/proprietary.pl-diff.html 22 Apr 2019 12:00:08 -0000      1.115
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -126,17 +126,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -182,6 +182,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
@@ -244,14 +255,6 @@
     &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -312,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:08 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/proprietary.pl.po        22 Apr 2019 11:01:30 -0000      1.102
+++ po/proprietary.pl.po        22 Apr 2019 12:00:08 -0000      1.103
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -592,15 +603,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- po/proprietary.pot  22 Apr 2019 11:01:30 -0000      1.99
+++ po/proprietary.pot  22 Apr 2019 12:00:08 -0000      1.100
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a "
+"href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk\";>no
 "
+"longer possible to disable an unscrupulous tracking anti-feature</a> that <a "
+"href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\";>reports
 "
+"users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, "
+"Microsoft Edge and also in the upcoming Microsoft Edge that going to be "
+"based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a "
 
"href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance\";>
 "
 "available to employers and insurance companies</a>. Even though the data is "
@@ -327,14 +338,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane "
-"mode. It didn't send the location data while in airplane mode.  Instead, <a "
-"href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/\";>
 "
-"it saved up the data, and sent them all later</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- po/proprietary.pt-br.po     22 Apr 2019 11:01:30 -0000      1.145
+++ po/proprietary.pt-br.po     22 Apr 2019 12:00:08 -0000      1.146
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2019-04-16 00:31-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -298,6 +298,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -380,15 +391,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- po/proprietary.ru.po        22 Apr 2019 11:29:52 -0000      1.225
+++ po/proprietary.ru.po        22 Apr 2019 12:00:08 -0000      1.226
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-22 11:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -425,19 +437,6 @@
 msgstr ""
 "За отсылку данных в Google в телефоне должны 
отвечать несвободные программы."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-"Было обнаружено, что телефон на базе Android 
отслеживает местоположение даже "
-"в режиме полета. В этом режиме данные от не 
отсылал. Вместо этого <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> от сохранял данные и 
отсылал их впоследствии</a>."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -517,6 +516,19 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "An Android phone was observed to track location even while in airplane "
+#~ "mode. It didn't send the location data while in airplane mode.  Instead, "
+#~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-";
+#~ "even-with-airplane-mode-turned-on/\"> it saved up the data, and sent them "
+#~ "all later</a>."
+#~ msgstr ""
+#~ "Было обнаружено, что телефон на базе Android 
отслеживает местоположение "
+#~ "даже в режиме полета. В этом режиме 
данные от не отсылал. Вместо этого <a "
+#~ "href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-";
+#~ "with-airplane-mode-turned-on/\"> от сохранял данные и 
отсылал их "
+#~ "впоследствии</a>."
+
+#~ msgid ""
 #~ "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM "
 #~ "is valid by connecting to the store every time their &ldquo;owner&rdquo; "
 #~ "wants to read them. Microsoft is going to close this store, <a href="

Index: po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary.zh-tw-diff.html      22 Apr 2019 11:01:30 -0000      1.74
+++ po/proprietary.zh-tw-diff.html      22 Apr 2019 12:00:09 -0000      1.75
@@ -46,13 +46,13 @@
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>--&gt;
+#TOC ol li { margin: .5em 5%; }
+--&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -185,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904210"&gt;
+    &lt;p&gt;As of April 2019, It is &lt;a
+    
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
+    longer possible to disable an
+    unscrupulous tracking anti-feature&lt;/a&gt; that &lt;a
+    
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing"&gt;reports
+    users when they follow ping links&lt;/a&gt; in Apple Safari, Google Chrome,
+    Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
+    going to be based on Chromium.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904131"&gt;
     &lt;p&gt;Data collected by menstrual and pregnancy monitoring apps is 
often &lt;a
     
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance"&gt;
@@ -247,14 +258,6 @@
     &lt;p&gt;Nonfree software in the phone has to be responsible for sending
     the location data to Google.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201811230"&gt;
-    &lt;p&gt;An Android phone was observed to track location even while
-    in airplane mode. It didn't send the location data while in
-    airplane mode.  Instead, &lt;a
-    
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/"&gt;
-    it saved up the data, and sent them all later&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -315,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/22 11:01:30 $
+$Date: 2019/04/22 12:00:09 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- po/proprietary.zh-tw.po     22 Apr 2019 11:01:30 -0000      1.85
+++ po/proprietary.zh-tw.po     22 Apr 2019 12:00:09 -0000      1.86
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-22 10:56+0000\n"
+"POT-Creation-Date: 2019-04-22 11:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,17 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Data collected by menstrual and pregnancy monitoring apps is often <a href="
 "\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
 "health-apps-menstrual-surveillance\"> available to employers and insurance "
@@ -426,15 +437,6 @@
 "data to Google."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"An Android phone was observed to track location even while in airplane mode. "
-"It didn't send the location data while in airplane mode.  Instead, <a href="
-"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-";
-"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
-"a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- po/pt-br.po 22 Apr 2019 11:01:30 -0000      1.97
+++ po/pt-br.po 22 Apr 2019 12:00:09 -0000      1.98
@@ -6731,6 +6731,17 @@
 msgid "Latest additions"
 msgstr "Últimas adições"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""

Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- po/ru.po    22 Apr 2019 11:07:19 -0000      1.165
+++ po/ru.po    22 Apr 2019 12:00:09 -0000      1.166
@@ -6155,11 +6155,12 @@
 "companies</a>. Even though the data is &ldquo;anonymized and aggregated,"
 "&rdquo; it can easily be traced back to the woman who uses the app."
 msgstr ""
-"Данные, собираемые приложениями 
наблюдения за менструацией и 
беременностью, часто <a href="
-"\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-";
-"health-apps-menstrual-surveillance\"> доступны 
работодателям и страховым "
-"компаниям</a>. Хотя данные 
&ldquo;анонимизируются и суммируются&rdquo;, "
-"их легко отследить до женщины, которая 
пользуется приложением."
+"Данные, собираемые приложениями 
наблюдения за менструацией и 
беременностью, "
+"часто <a 
href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-";
+"side-to-womens-health-apps-menstrual-surveillance\"> доступны 
работодателям "
+"и страховым компаниям</a>. Хотя данные 
&ldquo;анонимизируются и "
+"суммируются&rdquo;, их легко отследить до 
женщины, которая пользуется "
+"приложением."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -6190,6 +6191,7 @@
 "нет прямого доступа к данным. Это приводит 
к массовой слежке, над которой у "
 "пользователя нет абсолютно никакого 
контроля."
 
+#. type: Content of: <ul><li><p>
 msgid ""
 "A study of 24 &ldquo;health&rdquo; apps found that 19 of them <a href="
 "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-";
@@ -8994,6 +8996,17 @@
 msgid "Latest additions"
 msgstr "Последние добавления"
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 #. type: Content of: <div><p>
 msgid ""
 "Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "

Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- po/zh-tw.po 22 Apr 2019 11:01:30 -0000      1.75
+++ po/zh-tw.po 22 Apr 2019 12:00:09 -0000      1.76
@@ -6322,6 +6322,17 @@
 msgid "Latest additions"
 msgstr ""
 
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, It is <a href=\"https://www.bleepingcomputer.com/news/";
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-";
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
 #. type: Content of: <div><p>
 #, fuzzy
 #| msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]