www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 27 Apr 2019 15:30:07 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/04/27 15:30:05

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-amazon.de-diff.html 
                         malware-amazon.de.po malware-amazon.es.po 
                         malware-amazon.fr.po 
                         malware-amazon.it-diff.html 
                         malware-amazon.it.po 
                         malware-amazon.ja-diff.html 
                         malware-amazon.ja.po malware-amazon.pot 
                         malware-amazon.ru.po nl.po pl.po pot 
                         proprietary-surveillance.de-diff.html 
                         proprietary-surveillance.de.po 
                         proprietary-surveillance.fr.po 
                         proprietary-surveillance.it-diff.html 
                         proprietary-surveillance.it.po 
                         proprietary-surveillance.ja-diff.html 
                         proprietary-surveillance.ja.po 
                         proprietary-surveillance.pot 
                         proprietary-surveillance.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.283&r2=1.284
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.419&r2=1.420
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.296&r2=1.297
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.514&r2=1.515
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.230&r2=1.231
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.79&r2=1.80

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- de.po       26 Apr 2019 12:00:37 -0000      1.79
+++ de.po       27 Apr 2019 19:30:03 -0000      1.80
@@ -539,6 +539,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- es.po       27 Apr 2019 12:00:18 -0000      1.105
+++ es.po       27 Apr 2019 19:30:03 -0000      1.106
@@ -405,6 +405,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- fr.po       26 Apr 2019 17:26:14 -0000      1.138
+++ fr.po       27 Apr 2019 19:30:03 -0000      1.139
@@ -416,6 +416,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- it.po       26 Apr 2019 12:00:38 -0000      1.79
+++ it.po       27 Apr 2019 19:30:03 -0000      1.80
@@ -492,6 +492,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- ja.po       26 Apr 2019 12:00:38 -0000      1.79
+++ ja.po       27 Apr 2019 19:30:03 -0000      1.80
@@ -448,6 +448,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-amazon.de-diff.html 4 Mar 2019 09:00:09 -0000       1.19
+++ malware-amazon.de-diff.html 27 Apr 2019 19:30:03 -0000      1.20
@@ -63,13 +63,13 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
-&lt;/div&gt;</em></ins></span>
+to serve as specific substantiation.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;h2</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;p class="c" style="font-size: 1.2em"&gt;
+&lt;p class="c" style="font-size: 1.2em"&gt;
 &nbsp;&lt;a href="#swindle"&gt;Kindle&nbsp;Swindle&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#echo"&gt;Echo&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#misc"&gt;Other&nbsp;products&lt;/a&gt;&nbsp;
@@ -207,6 +207,25 @@
 <span class="inserted"><ins><em>&lt;h4 
id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201808120"&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
@@ -329,7 +348,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 09:00:09 $
+$Date: 2019/04/27 19:30:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-amazon.de.po        4 Mar 2019 09:00:09 -0000       1.23
+++ malware-amazon.de.po        27 Apr 2019 19:30:03 -0000      1.24
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2017-09-26 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -280,6 +280,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-amazon.es.po        4 Mar 2019 13:30:43 -0000       1.30
+++ malware-amazon.es.po        27 Apr 2019 19:30:03 -0000      1.31
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2019-03-04 13:58+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -212,6 +213,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-amazon.fr.po        31 Mar 2019 11:07:09 -0000      1.35
+++ malware-amazon.fr.po        27 Apr 2019 19:30:03 -0000      1.36
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2019-03-31 13:02+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -208,6 +209,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-amazon.it-diff.html 4 Mar 2019 09:00:10 -0000       1.33
+++ malware-amazon.it-diff.html 27 Apr 2019 19:30:03 -0000      1.34
@@ -63,13 +63,13 @@
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.&lt;/p&gt;
-&lt;/div&gt;</em></ins></span>
+to serve as specific substantiation.&lt;/p&gt;</em></ins></span>
 &lt;/div&gt;
 
 <span class="removed"><del><strong>&lt;h2</strong></del></span>
+<span class="inserted"><ins><em>&lt;/div&gt;
 
-<span class="inserted"><ins><em>&lt;p class="c" style="font-size: 1.2em"&gt;
+&lt;p class="c" style="font-size: 1.2em"&gt;
 &nbsp;&lt;a href="#swindle"&gt;Kindle&nbsp;Swindle&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#echo"&gt;Echo&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#misc"&gt;Other&nbsp;products&lt;/a&gt;&nbsp;
@@ -207,6 +207,25 @@
 <span class="inserted"><ins><em>&lt;h4 
id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201808120"&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
@@ -329,7 +348,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 09:00:10 $
+$Date: 2019/04/27 19:30:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-amazon.it.po        4 Mar 2019 09:00:10 -0000       1.26
+++ malware-amazon.it.po        27 Apr 2019 19:30:03 -0000      1.27
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2017-09-30 22:48+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -258,6 +258,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- malware-amazon.ja-diff.html 4 Mar 2019 09:00:10 -0000       1.30
+++ malware-amazon.ja-diff.html 27 Apr 2019 19:30:03 -0000      1.31
@@ -196,6 +196,25 @@
 &lt;h4 id="echo-surveillance"&gt;Surveillance&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201808120"&gt;
     &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and &lt;a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html"&gt;
@@ -318,7 +337,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/03/04 09:00:10 $
+$Date: 2019/04/27 19:30:03 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-amazon.ja.po        4 Mar 2019 09:00:10 -0000       1.17
+++ malware-amazon.ja.po        27 Apr 2019 19:30:04 -0000      1.18
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2016-10-31 11:24+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -227,6 +227,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-amazon.pot  4 Mar 2019 09:00:10 -0000       1.16
+++ malware-amazon.pot  27 Apr 2019 19:30:04 -0000      1.17
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -154,6 +154,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a "
+"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\";>
 "
+"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
+"assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a "
+"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\";>
 "
+"location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
+"cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
+"where it's done&rdquo;), users have no way to know what happens to the "
+"recordings unless human eavesdroppers <a "
+"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\";>
 "
+"break their non-disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a "
 "href=\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it "
 "into a listening device</a> for them."

Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- malware-amazon.ru.po        4 Mar 2019 09:29:52 -0000       1.39
+++ malware-amazon.ru.po        27 Apr 2019 19:30:04 -0000      1.40
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2018-10-08 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -209,6 +210,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- nl.po       26 Apr 2019 12:00:38 -0000      1.79
+++ nl.po       27 Apr 2019 19:30:04 -0000      1.80
@@ -385,6 +385,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- pl.po       26 Apr 2019 12:00:38 -0000      1.79
+++ pl.po       27 Apr 2019 19:30:04 -0000      1.80
@@ -339,6 +339,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- pot 26 Apr 2019 12:00:38 -0000      1.79
+++ pot 27 Apr 2019 19:30:04 -0000      1.80
@@ -296,6 +296,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary-surveillance.de-diff.html       26 Apr 2019 12:00:38 -0000      
1.68
+++ proprietary-surveillance.de-diff.html       27 Apr 2019 19:30:04 -0000      
1.69
@@ -1155,11 +1155,11 @@
   &lt;/li&gt;
 
   &lt;li id="M201803050"&gt;
-    &lt;p&gt;The moviepass app and dis-service
+    &lt;p&gt;The moviepass app</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
+    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>dis-service
     spy on users even more than users expected. It &lt;a
     
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-    where they travel before</em></ins></span> and <span 
class="removed"><del><strong>TigerVPN&lt;/dt&gt;
-    &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</strong></del></span> <span class="inserted"><ins><em>after 
going</em></ins></span> to <span class="removed"><del><strong>read logs
+    where they travel before and after going</em></ins></span> to <span 
class="removed"><del><strong>read logs
       for other</strong></del></span> <span class="inserted"><ins><em>a 
movie&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Don't be tracked&mdash;pay cash!&lt;/p&gt;
@@ -1208,14 +1208,14 @@
 
     &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
     &lt;dd&gt;Injects JavaScript code into HTML pages,</strong></del></span> 
<span class="inserted"><ins><em>other hand, Google redistributes nonfree 
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
-      roughly 5 tracking libraries. Developers of this app have
-      confirmed that</strong></del></span>
-    <span class="inserted"><ins><em>therefore shares in</em></ins></span> the 
<span class="removed"><del><strong>non-premium version</strong></del></span> 
<span class="inserted"><ins><em>responsibility for the injustice of their being
+      roughly 5 tracking libraries. Developers</strong></del></span>
+    <span class="inserted"><ins><em>therefore shares in the responsibility for 
the injustice</em></ins></span> of <span class="removed"><del><strong>this 
app</strong></del></span> <span class="inserted"><ins><em>their being
     nonfree. It also distributes its own nonfree apps, such as Google Play,
     &lt;a href="/philosophy/free-software-even-more-important.html"&gt;which
     are malicious&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Could Google have done a better job</em></ins></span> of <span 
class="inserted"><ins><em>preventing apps from
+    &lt;p&gt;Could Google</em></ins></span> have
+      <span class="removed"><del><strong>confirmed that the non-premium 
version</strong></del></span> <span class="inserted"><ins><em>done a better 
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
     cheating? There is no systematic way for Google, or Android users,
     to inspect executable proprietary apps to see what they do.&lt;/p&gt;
 
@@ -1253,15 +1253,13 @@
     &lt;p&gt;With free software apps, users could &lt;em&gt;make 
sure&lt;/em&gt; that they
     don't snoop.&lt;/p&gt;
 
-    &lt;p&gt;With proprietary apps, one can only hope that <span 
class="removed"><del><strong>they don't.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-  &lt;p&gt;A study found 234 Android apps</strong></del></span> <span 
class="inserted"><ins><em>they don't.&lt;/p&gt;
+    &lt;p&gt;With proprietary apps, one can only hope that they 
don't.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201705040"&gt;
-    &lt;p&gt;A study found 234 Android apps that track users by &lt;a
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705040"&gt;</em></ins></span>
+    &lt;p&gt;A study found 234 Android apps that <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>track users by &lt;a
     
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening
     to ultrasound from beacons placed in stores or played by TV
     programs&lt;/a&gt;.&lt;/p&gt;
@@ -1281,7 +1279,7 @@
     along with the headphone's unique serial number.&lt;/p&gt;
 
     &lt;p&gt;The suit accuses that this was done without the users' consent.
-    If the fine print of the app said</em></ins></span> that <span 
class="removed"><del><strong>track</strong></del></span> users <span 
class="removed"><del><strong>by</strong></del></span> <span 
class="inserted"><ins><em>gave consent for this,
+    If the fine print of the app said that</em></ins></span> users <span 
class="removed"><del><strong>by</strong></del></span> <span 
class="inserted"><ins><em>gave consent for this,
     would that make it acceptable? No way! It should be flat 
out</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/"&gt;listening</strong></del></span>
     <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>ultrasound from 
beacons placed in stores or played by TV programs&lt;/a&gt;.
        &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>design
@@ -1334,18 +1332,19 @@
 
   &lt;li id="M201701210"&gt;
     &lt;p&gt;The Meitu photo-editing app</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;</strong></del></span>
+    <span 
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"&gt;
+    tracks the users' movements without their permission&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even if you disable Google Maps and location tracking, you must
+    disable Google Play itself</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-    user data to a Chinese company&lt;/a&gt;.&lt;/p&gt;
+    user data</em></ins></span> to <span 
class="removed"><del><strong>completely stop</strong></del></span> <span 
class="inserted"><ins><em>a Chinese company&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201611280"&gt;
-    &lt;p&gt;The Uber app</em></ins></span> tracks <span 
class="removed"><del><strong>the users' movements without their 
permission&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Even if you disable Google Maps</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;The Uber app tracks &lt;a
     
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-    movements before</em></ins></span> and <span 
class="removed"><del><strong>location tracking, you must
-    disable Google Play itself to completely stop</strong></del></span> <span 
class="inserted"><ins><em>after</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
+    movements before and after</em></ins></span> the <span 
class="removed"><del><strong>tracking.  This is
     yet another</strong></del></span> <span 
class="inserted"><ins><em>ride&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This</em></ins></span> example <span 
class="removed"><del><strong>of nonfree software pretending to 
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how 
&ldquo;getting</em></ins></span> the <span class="removed"><del><strong>user,
@@ -1355,66 +1354,103 @@
     massive surveillance.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% of the 
most popular Android apps</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More than 73% 
of</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201611160"&gt;
-    &lt;p&gt;A</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php"&gt;share
 personal,
-  behavioral</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
-    research paper&lt;/a&gt; that investigated the privacy</em></ins></span> 
and <span class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>their users with third parties.&lt;/p&gt;
+    &lt;p&gt;A &lt;a
+    
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf"&gt;
+    research paper&lt;/a&gt; that investigated</em></ins></span> the <span 
class="removed"><del><strong>most popular</strong></del></span> <span 
class="inserted"><ins><em>privacy and security of
+    283</em></ins></span> Android <span 
class="inserted"><ins><em>VPN</em></ins></span> apps
+  <span class="removed"><del><strong>&lt;a 
href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
+  behavioral</strong></del></span> <span class="inserted"><ins><em>concluded 
that &ldquo;in spite of the promises
+    for privacy, security,</em></ins></span> and <span 
class="removed"><del><strong>location 
information&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>anonymity given by the majority of VPN
+    apps&mdash;millions</em></ins></span> of <span 
class="removed"><del><strong>their</strong></del></span> users <span 
class="removed"><del><strong>with third parties.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; unrelated to the 
app's functionality,
+  &lt;li&gt;&lt;p&gt;&ldquo;Cryptic communication,&rdquo; 
unrelated</strong></del></span> <span class="inserted"><ins><em>may be 
unawarely subject</em></ins></span> to <span class="inserted"><ins><em>poor 
security
+    guarantees and abusive practices inflicted by VPN apps.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Following is a non-exhaustive list, taken from</em></ins></span> 
the <span class="removed"><del><strong>app's functionality,
   was &lt;a 
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-  found in the 500 most popular gratis</strong></del></span>
-    <span class="inserted"><ins><em>283</em></ins></span> Android <span 
class="removed"><del><strong>apps&lt;/a&gt;.&lt;/p&gt;
+  found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
+
+  &lt;p&gt;The article should not have described these</strong></del></span> 
<span class="inserted"><ins><em>research paper,
+    of some proprietary VPN</em></ins></span> apps <span 
class="inserted"><ins><em>that track users and infringe their
+    privacy:&lt;/p&gt;
 
-  &lt;p&gt;The article should not have described these</strong></del></span> 
<span class="inserted"><ins><em>VPN</em></ins></span> apps <span 
class="removed"><del><strong>as
-  &ldquo;free&rdquo;&mdash;they are not free software.  The clear way to say
+    &lt;dl class="compact"&gt;
+      &lt;dt&gt;SurfEasy&lt;/dt&gt;
+      &lt;dd&gt;Includes tracking libraries such</em></ins></span> as
+  <span class="removed"><del><strong>&ldquo;free&rdquo;&mdash;they are not 
free software.  The clear way</strong></del></span> <span 
class="inserted"><ins><em>NativeX and Appflood,
+      meant</em></ins></span> to <span class="removed"><del><strong>say
   &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;The article takes for granted</strong></del></span> <span 
class="inserted"><ins><em>concluded</em></ins></span> that <span 
class="inserted"><ins><em>&ldquo;in spite of</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
-  legitimate, but is that valid?  Software developers have no right to
-  analyze what</strong></del></span> <span class="inserted"><ins><em>promises
-    for privacy, security, and anonymity given by the majority of VPN
-    apps&mdash;millions of</em></ins></span> users <span 
class="removed"><del><strong>are doing or how.  &ldquo;Analytics&rdquo; tools 
that snoop are
+  &lt;p&gt;The article takes</strong></del></span> <span 
class="inserted"><ins><em>track users and show them targeted ads.&lt;/dd&gt;
+
+      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
+      permissions upon installation, meaning it has full access to users'
+      text messages.&lt;/dd&gt;
+
+      &lt;dt&gt;DroidVPN and TigerVPN&lt;/dt&gt;
+      &lt;dd&gt;Requests the &lt;code&gt;READ_LOGS&lt;/code&gt; permission to 
read logs</em></ins></span>
+      for <span class="removed"><del><strong>granted 
that</strong></del></span> <span class="inserted"><ins><em>other apps and also 
core system logs. TigerVPN developers have
+      confirmed this.&lt;/dd&gt;
+
+      &lt;dt&gt;HideMyAss&lt;/dt&gt;
+      &lt;dd&gt;Sends traffic to LinkedIn. Also, it stores detailed logs and
+      may turn them over to the UK government if requested.&lt;/dd&gt;
+
+      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into</em></ins></span> the <span 
class="removed"><del><strong>usual analytics tools are
+  legitimate, but is that valid?  Software developers have no 
right</strong></del></span> <span class="inserted"><ins><em>HTML pages 
returned</em></ins></span> to
+  <span class="removed"><del><strong>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools that snoop are
   just as wrong as any other snooping.&lt;/p&gt;
   &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Gratis Android apps (but not &lt;a 
href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;)
-      connect</strong></del></span> <span class="inserted"><ins><em>may be 
unawarely subject</em></ins></span> to <span class="removed"><del><strong>100
-      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>poor security
-    guarantees</em></ins></span> and <span 
class="removed"><del><strong>advertising&lt;/a&gt; URLs,
-      on the average.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>abusive practices inflicted by VPN 
apps.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;Following</em></ins></span> is <span 
class="removed"><del><strong>present in some Android devices when they are sold.
-      Some Motorola phones modify Android to
-      &lt;a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
-      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Some manufacturers add</strong></del></span> a
-      <span class="removed"><del><strong>&lt;a 
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
-      hidden general surveillance package</strong></del></span> <span 
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
-    of some proprietary VPN apps that track users and infringe their
-    privacy:&lt;/p&gt;
+      connect</strong></del></span> <span class="inserted"><ins><em>the
+      users. The stated purpose of the JS injection is</em></ins></span> to 
<span class="removed"><del><strong>100
+      &lt;a 
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites"&gt;tracking</strong></del></span>
 <span class="inserted"><ins><em>display ads. Uses
+      roughly five tracking libraries. Also, it redirects the user's
+      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
 
-    &lt;dl class="compact"&gt;
-      &lt;dt&gt;SurfEasy&lt;/dt&gt;
-      &lt;dd&gt;Includes tracking libraries</em></ins></span> such as <span 
class="removed"><del><strong>Carrier IQ.&lt;/a&gt;&lt;/p&gt;
+      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
+      &lt;dd&gt;Injects JavaScript code into HTML pages,</em></ins></span> and 
<span class="removed"><del><strong>advertising&lt;/a&gt; URLs,
+      on</strong></del></span> <span class="inserted"><ins><em>also uses 
roughly
+      five tracking libraries. Developers of this app have confirmed 
that</em></ins></span>
+      the <span 
class="removed"><del><strong>average.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>non-premium version of the app does JavaScript 
injection for
+      tracking the user and displaying ads.&lt;/dd&gt;
+    &lt;/dl&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware is present in 
some Android devices when they are sold.
+      Some Motorola phones modify Android to</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
+    &lt;p&gt;Google's new voice messaging app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"&gt;
+      send personal data to Motorola&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+    all conversations&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Some manufacturers add 
a</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201606050"&gt;
+    &lt;p&gt;Facebook's new Magic Photo app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/"&gt;
+      hidden general surveillance package such as Carrier 
IQ.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="/proprietary/proprietary-back-doors.html#samsung"&gt;
-      Samsung's back door&lt;/a&gt; provides access to any file on the 
system.&lt;/p&gt;
+      Samsung's back door&lt;/a&gt; provides access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
+    scans your mobile phone's photo collections for known faces&lt;/a&gt;,
+    and suggests you</em></ins></span> to <span 
class="removed"><del><strong>any file on</strong></del></span> <span 
class="inserted"><ins><em>share</em></ins></span> the <span 
class="removed"><del><strong>system.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 
 &lt;!-- #SpywareOnMobiles --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>NativeX and Appflood,
-      meant</em></ins></span> to <span class="removed"><del><strong>place new 
items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>picture you take according</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareOnMobiles"&gt;Spyware on Mobiles&lt;/h3&gt;
@@ -1424,209 +1460,189 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareIniThings"&gt;Spyware in iThings&lt;/h4&gt;
+  &lt;h4 id="SpywareIniThings"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>who is</em></ins></span>
+    in <span class="removed"><del><strong>iThings&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareIniThings"&gt;#SpywareIniThings&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;The DMCA</strong></del></span> <span 
class="inserted"><ins><em>track users</em></ins></span> and <span 
class="inserted"><ins><em>show them targeted ads.&lt;/dd&gt;
-
-      &lt;dt&gt;sFly Network Booster&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the <span 
class="removed"><del><strong>EU Copyright Directive make</strong></del></span> 
<span class="inserted"><ins><em>&lt;code&gt;READ_SMS&lt;/code&gt; and 
&lt;code&gt;SEND_SMS&lt;/code&gt;
-      permissions upon installation, meaning</em></ins></span> it <span 
class="removed"><del><strong>&lt;a
+  &lt;li&gt;&lt;p&gt;The DMCA and</strong></del></span> the <span 
class="removed"><del><strong>EU Copyright Directive make it &lt;a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
-      illegal</strong></del></span> <span class="inserted"><ins><em>has full 
access</em></ins></span> to <span class="removed"><del><strong>study how iOS 
cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
+      illegal</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+
+    &lt;p&gt;This spyware feature seems</em></ins></span> to <span 
class="removed"><del><strong>study how iOS cr...apps spy on users&lt;/a&gt;, 
because this
+      would</strong></del></span> require <span 
class="removed"><del><strong>circumventing</strong></del></span> <span 
class="inserted"><ins><em>online access to some
+    known-faces database, which means</em></ins></span> the <span 
class="removed"><del><strong>iOS DRM.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;In the latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>users'
-      text messages.&lt;/dd&gt;
+  &lt;li&gt;&lt;p&gt;In</strong></del></span> <span 
class="inserted"><ins><em>pictures are likely to be
+    sent across</em></ins></span> the <span 
class="removed"><del><strong>latest iThings system, &ldquo;turning off&rdquo; 
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's 
servers</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>face-recognition
+    algorithms.&lt;/p&gt;
 
-      &lt;dt&gt;DroidVPN</em></ins></span> and <span 
class="removed"><del><strong>Bluetooth</strong></del></span> <span 
class="inserted"><ins><em>TigerVPN&lt;/dt&gt;
-      &lt;dd&gt;Requests</em></ins></span> the
+    &lt;p&gt;If so, none of Facebook users' pictures are private anymore,
+    even if</em></ins></span> the
       <span class="removed"><del><strong>obvious way &lt;a
  
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off"&gt;
       doesn't really turn them off&lt;/a&gt;.
-      A more advanced way really does turn them off&mdash;only until 5am.
-      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
<span class="inserted"><ins><em>&lt;code&gt;READ_LOGS&lt;/code&gt; 
permission</em></ins></span> to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;
+      A more advanced way really does turn</strong></del></span> <span 
class="inserted"><ins><em>user didn't &ldquo;upload&rdquo;</em></ins></span> 
them <span class="removed"><del><strong>off&mdash;only until 5am.
+      That's Apple for you&mdash;&ldquo;We know you want</strong></del></span> 
to <span class="removed"><del><strong>be spied 
on&rdquo;.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>the 
service.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Apple proposes
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
-      &mdash; which would mean no way</strong></del></span> <span 
class="inserted"><ins><em>read logs
-      for other apps and also core system logs. TigerVPN developers have
-      confirmed this.&lt;/dd&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
proposes</strong></del></span>
 
-      &lt;dt&gt;HideMyAss&lt;/dt&gt;
-      &lt;dd&gt;Sends traffic</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>LinkedIn. Also,</em></ins></span> it <span 
class="removed"><del><strong>without having your fingerprints
-      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>stores detailed logs and
-      may turn them over</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>UK government if requested.&lt;/dd&gt;
-
-      &lt;dt&gt;VPN Services HotspotShield&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into the HTML pages returned to the
-      users. The stated purpose of the JS injection</em></ins></span> is <span 
class="removed"><del><strong>snooping on
+  <span class="inserted"><ins><em>&lt;li id="M201605310"&gt;
+    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
+      &mdash; which would mean no way</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
+    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>or watching&lt;/a&gt;. In addition,</em></ins></span>
+    it <span class="removed"><del><strong>without having your fingerprints
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>may be analyzing people's 
conversations</em></ins></span> to <span class="removed"><del><strong>tell 
whether the phone is snooping on
       them.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots</strong></del></span> <span class="inserted"><ins><em>to display 
ads. Uses
-      roughly five tracking libraries. Also, it redirects the user's
-      traffic through valueclick.com (an advertising website).&lt;/dd&gt;
+  &lt;li&gt;&lt;p&gt;iPhones</strong></del></span> <span 
class="inserted"><ins><em>serve them with targeted
+    advertisements.&lt;/p&gt;
+  &lt;/li&gt;
 
-      &lt;dt&gt;WiFi Protector VPN&lt;/dt&gt;
-      &lt;dd&gt;Injects JavaScript code into HTML pages, and also uses roughly
-      five tracking libraries. Developers</em></ins></span> of <span 
class="removed"><del><strong>personal data to Apple's servers&lt;/a&gt;.  Big 
Brother can
-        get them from there.&lt;/p&gt;
+  &lt;li id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>personal</strong></del></span> data <span 
class="removed"><del><strong>to Apple's servers&lt;/a&gt;.  Big 
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and 
in server accounts,
+    it</em></ins></span> can
+        <span class="removed"><del><strong>get</strong></del></span> <span 
class="inserted"><ins><em>alter</em></ins></span> them <span 
class="removed"><del><strong>from there.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;The iMessage</strong></del></span> <span 
class="inserted"><ins><em>this</em></ins></span> app <span 
class="removed"><del><strong>on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number</strong></del></span> <span 
class="inserted"><ins><em>have confirmed</em></ins></span> that
-      the <span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>non-premium 
version of</em></ins></span> the <span class="removed"><del><strong>server 
records these numbers</strong></del></span> <span class="inserted"><ins><em>app 
does JavaScript injection</em></ins></span> for <span 
class="removed"><del><strong>at least 30
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The iMessage app on 
iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
+        a server every phone number</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
+    &lt;p&gt;Apps</em></ins></span> that <span 
class="removed"><del><strong>the user types into it&lt;/a&gt;; the server 
records these numbers for at least 30
         days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID &lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary
 to install even gratis apps)&lt;/a&gt;
-      without giving a valid email address and receiving the code Apple
-      sends to it.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Users cannot make an Apple ID</strong></del></span> <span 
class="inserted"><ins><em>include</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;(necessary</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
+    Symphony surveillance software snoop on what radio and TV programs
+    are playing nearby&lt;/a&gt;.  Also on what users post on various sites
+    such as Facebook, Google+ and Twitter.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Around 47% of</strong></del></span>
-      <span class="inserted"><ins><em>tracking</em></ins></span> the <span 
class="removed"><del><strong>most popular iOS apps
-      &lt;a class="not-a-duplicate" 
-        href="http://jots.pub/a/2015103001/index.php"&gt;share personal,
-       behavioral</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> and <span 
class="removed"><del><strong>location information&lt;/a&gt; of their users with 
third parties.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>displaying ads.&lt;/dd&gt;
-    &lt;/dl&gt;</em></ins></span>
+  &lt;li id="M201511190"&gt;
+    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
+    unrelated</em></ins></span> to <span class="removed"><del><strong>install 
even</strong></del></span> <span class="inserted"><ins><em>the app's 
functionality, was &lt;a
+    
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
+    found in the 500 most popular</em></ins></span> gratis <span 
class="removed"><del><strong>apps)&lt;/a&gt;
+      without giving a valid email address and receiving</strong></del></span> 
<span class="inserted"><ins><em>Android apps&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article should not have described these apps as
+    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
+    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;The article takes for granted that</em></ins></span> the <span 
class="removed"><del><strong>code Apple
+      sends</strong></del></span> <span class="inserted"><ins><em>usual 
analytics tools are
+    legitimate, but is that valid? Software developers have no 
right</em></ins></span> to <span 
class="removed"><del><strong>it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>analyze what users are doing or how.  
&ldquo;Analytics&rdquo; tools
+    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers</strong></del></span>
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Around</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201609210"&gt;
-    &lt;p&gt;Google's new voice messaging app &lt;a
-    
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs</em></ins></span>
-    all <span class="removed"><del><strong>the photos and
+  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
+    &lt;p&gt;More than 73% and</em></ins></span> 47% of <span 
class="removed"><del><strong>the most popular</strong></del></span> <span 
class="inserted"><ins><em>mobile applications, from Android 
and</em></ins></span> iOS <span 
class="removed"><del><strong>apps</strong></del></span>
+    <span class="inserted"><ins><em>respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate" 
+        
href="http://jots.pub/a/2015103001/index.php"&gt;share</strong></del></span> 
<span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share</em></ins></span>
+    personal, behavioral and location information&lt;/a&gt; of their users with
+    third parties.&lt;/p&gt;
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;iThings automatically 
upload to Apple's servers all the photos and
       videos they make.&lt;/p&gt;
 
     &lt;blockquote&gt;&lt;p&gt;
-      iCloud</strong></del></span> <span 
class="inserted"><ins><em>conversations&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201606050"&gt;
-    &lt;p&gt;Facebook's new Magic</em></ins></span> Photo <span 
class="removed"><del><strong>Library stores every</strong></del></span> <span 
class="inserted"><ins><em>app &lt;a
-    
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/"&gt;
-    scans your mobile phone's</em></ins></span> photo <span 
class="inserted"><ins><em>collections for known 
faces&lt;/a&gt;,</em></ins></span>
-    and <span class="removed"><del><strong>video</strong></del></span> <span 
class="inserted"><ins><em>suggests</em></ins></span> you <span 
class="removed"><del><strong>take,
-      and keeps them up</strong></del></span> to <span 
class="removed"><del><strong>date on all your devices.
-      Any edits</strong></del></span> <span class="inserted"><ins><em>share 
the picture</em></ins></span> you <span class="removed"><del><strong>make are 
automatically updated everywhere. [...]
+      iCloud Photo Library stores every photo and video you take,
+      and keeps them up to date on all your devices.
+      Any edits you make are automatically updated everywhere. [...]
     &lt;/p&gt;&lt;/blockquote&gt;
 
     &lt;p&gt;(From &lt;a 
href="https://www.apple.com/icloud/photos/"&gt;Apple's iCloud
-      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud 
feature</strong></del></span> <span class="inserted"><ins><em>take according to 
who</em></ins></span> is
-      <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT202033"&gt;activated 
by</strong></del></span>
-    <span class="inserted"><ins><em>in</em></ins></span> the
-      <span class="removed"><del><strong>startup of iOS&lt;/a&gt;. The term 
&ldquo;cloud&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>frame.&lt;/p&gt;
+      information&lt;/a&gt; as accessed on 24 Sep 2015.) The iCloud feature is
+      &lt;a href="https://support.apple.com/en-us/HT202033"&gt;activated by the
+      startup of iOS&lt;/a&gt;. The term &ldquo;cloud&rdquo; means
+      &ldquo;please don't ask where.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;This spyware feature seems to require online access to some
-    known-faces database, which</em></ins></span> means
-      <span class="removed"><del><strong>&ldquo;please don't ask 
where.&rdquo;&lt;/p&gt;
+    &lt;p&gt;There</strong></del></span>
 
-    &lt;p&gt;There is a way</strong></del></span> <span 
class="inserted"><ins><em>the pictures are likely</em></ins></span> to <span 
class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
+    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</em></ins></span> is <span class="removed"><del><strong>a way to &lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default 
so</strong></del></span>
+    <span class="inserted"><ins><em>based on proprietary malware (DRM and 
snooping). In August 2015</em></ins></span> it <span 
class="removed"><del><strong>still counts as a
       surveillance functionality.&lt;/p&gt;
 
-    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>be
-    sent across the wire to Facebook's servers and face-recognition
-    algorithms.&lt;/p&gt;
-
-    &lt;p&gt;If so, none</em></ins></span> of <span 
class="removed"><del><strong>this</strong></del></span> <span 
class="inserted"><ins><em>Facebook users' pictures are private anymore,
-    even if the user didn't &ldquo;upload&rdquo; them</em></ins></span> to 
<span class="inserted"><ins><em>the service.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201605310"&gt;
-    &lt;p&gt;Facebook's app listens all the time,</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They 
needed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
-    snoop on what people are listening</em></ins></span> to <span 
class="removed"><del><strong>break Apple's
-      security</strong></del></span> <span class="inserted"><ins><em>or 
watching&lt;/a&gt;. In addition,
-    it may be analyzing people's conversations</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any 
of</strong></del></span> <span 
class="inserted"><ins><em>serve</em></ins></span> them <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>with targeted
-    advertisements.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+    &lt;p&gt;Unknown people apparently took advantage of this 
to</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
+      security</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
+    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>get at them, but NSA can access any of them through
+      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts of data</em></ins></span> in <span 
class="removed"><del><strong>iThings:
+  &lt;li&gt;&lt;p&gt;Spyware in iThings:
       the &lt;a class="not-a-duplicate"
             
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-       iBeacon&lt;/a&gt; lets stores determine exactly 
where</strong></del></span> the <span class="removed"><del><strong>iThing 
is,</strong></del></span> <span 
class="inserted"><ins><em>phone,</em></ins></span> and <span 
class="removed"><del><strong>get other info 
too.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>in server 
accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+       iBeacon&lt;/a&gt; lets stores determine exactly where the iThing 
is,</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;,</em></ins></span> and <span 
class="removed"><del><strong>get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;There is also a 
feature for web</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201601130"&gt;
-    &lt;p&gt;Apps that include &lt;a
-    
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/"&gt;
-    Symphony surveillance software snoop on what radio and TV programs
-    are playing nearby&lt;/a&gt;.  Also on what users post on 
various</em></ins></span> sites
-    <span class="inserted"><ins><em>such as Facebook, Google+ and 
Twitter.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;There is also a feature for web sites to track users, 
which is
+      &lt;a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
+      enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</strong></del></span> <span class="inserted"><ins><em>some are starting
+    to realize that</em></ins></span> it is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201511190"&gt;
-    &lt;p&gt;&ldquo;Cryptic communication,&rdquo;
-    unrelated</em></ins></span> to <span class="removed"><del><strong>track 
users, which is</strong></del></span> <span class="inserted"><ins><em>the app's 
functionality, was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-      enabled by default&lt;/a&gt;.  (That</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119"&gt;
-    found in the 500 most popular gratis Android apps&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>talks about iOS 6,</strong></del></span> <span 
class="inserted"><ins><em>should not have described these apps as
-    &ldquo;free&rdquo;&mdash;they are not free software.  The clear way
-    to say &ldquo;zero price&rdquo; is &ldquo;gratis.&rdquo;&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The iThing also</strong></del></span> <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
 
-    &lt;p&gt;The article takes for granted that the usual analytics tools are
-    legitimate,</em></ins></span> but <span 
class="removed"><del><strong>it</strong></del></span> is <span 
class="removed"><del><strong>still true in iOS 7.)&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iThing also
-      &lt;a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span> that <span class="removed"><del><strong>can be
-      turned off.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>valid? Software developers have no right to
-    analyze what users are doing or how.  &ldquo;Analytics&rdquo; tools
-    that snoop are just as wrong as any other 
snooping.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;This article shows the</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
+      tells Apple its geolocation&lt;/a&gt; by default, 
though</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
+    twisted ways</em></ins></span> that <span class="removed"><del><strong>can 
be
+      turned off.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple 
can,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,
+      &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+      remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>they present snooping as a way to &ldquo;serve&rdquo;
+    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
+    typical example of</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>attitude of the proprietary software industry
+    towards those they have subjugated.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201510300"&gt;
-    &lt;p&gt;More than 73% and 47% of mobile applications, from 
Android</em></ins></span> and <span class="removed"><del><strong>regularly 
does,</strong></del></span> <span class="inserted"><ins><em>iOS
-    respectively</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-      remotely extract some data from iPhones for the 
state&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/"&gt;share
-    personal, behavioral and location information&lt;/a&gt; of their users with
-    third parties.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-      Either Apple helps the NSA snoop</strong></del></span>
+      Either Apple helps</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201508210"&gt;
-    &lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, Spotify is
-    based</em></ins></span> on <span class="removed"><del><strong>all the data 
in an iThing,
-      or</strong></del></span> <span class="inserted"><ins><em>proprietary 
malware (DRM and snooping). In August 2015</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201506264"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
+    study in 2015&lt;/a&gt; found that 90% of</em></ins></span> the <span 
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span 
class="inserted"><ins><em>top-ranked gratis proprietary
+    Android apps contained recognizable tracking libraries. 
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
+      or</strong></del></span> <span class="inserted"><ins><em>paid
+    proprietary apps,</em></ins></span> it <span 
class="removed"><del><strong>is totally incompetent.&lt;/a&gt;&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-      Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-    demanded users submit</em></ins></span> to <span 
class="removed"><del><strong>exist for no
-      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>increased 
snooping&lt;/a&gt;, and some are starting
-    to realize that it</em></ins></span> is <span 
class="inserted"><ins><em>nasty.&lt;/p&gt;
+      Several &ldquo;features&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>was only 60%.&lt;/p&gt;
 
-    &lt;p&gt;This article shows</em></ins></span> the &lt;a <span 
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-      Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article confusingly describes gratis apps as
+    &ldquo;free&rdquo;, but most</em></ins></span> of <span 
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span 
class="inserted"><ins><em>them are not in fact &lt;a
+    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also uses 
the
+    ugly word &ldquo;monetize&rdquo;. A good replacement</em></ins></span> for 
<span class="removed"><del><strong>no
+      possible purpose other than surveillance&lt;/a&gt;.  
Here</strong></del></span> <span class="inserted"><ins><em>that 
word</em></ins></span>
+    is <span class="removed"><del><strong>the
+      &lt;a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+      Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;exploit&rdquo;; nearly always that will fit 
perfectly.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
@@ -1635,21 +1651,10 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Tracking</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/"&gt;
-    twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
-    users better&lt;/a&gt;&mdash;never mind whether they want that. This is a
-    typical example of the attitude of the proprietary</em></ins></span> 
software <span class="inserted"><ins><em>industry
-    towards those they have subjugated.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Tracking software in popular</strong></del></span>
 
-    &lt;p&gt;Out, out, damned Spotify!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201506264"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf"&gt;A
-    study</em></ins></span> in <span 
class="removed"><del><strong>popular</strong></del></span> <span 
class="inserted"><ins><em>2015&lt;/a&gt; found that 90% of the top-ranked 
gratis proprietary</em></ins></span>
-    Android apps <span class="removed"><del><strong>is pervasive and
+  <span class="inserted"><ins><em>&lt;li id="M201505060"&gt;
+    &lt;p&gt;Gratis</em></ins></span> Android apps <span 
class="removed"><del><strong>is pervasive and
       sometimes very clever. Some trackers can &lt;a
 
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/"&gt;
       follow a user's movements around a physical store by noticing WiFi
@@ -1658,21 +1663,10 @@
 
   &lt;li&gt;&lt;p&gt;Android tracks location for Google &lt;a
 
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"&gt;
-      even when &ldquo;location services&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>contained recognizable tracking libraries. For the 
paid
-    proprietary apps, it was only 60%.&lt;/p&gt;
-
-    &lt;p&gt;The article confusingly describes gratis apps as
-    &ldquo;free&rdquo;, but most of them</em></ins></span> are <span 
class="removed"><del><strong>turned off, even
-      when</strong></del></span> <span class="inserted"><ins><em>not in fact 
&lt;a
-    href="/philosophy/free-sw.html"&gt;free software&lt;/a&gt;.  It also 
uses</em></ins></span> the <span class="removed"><del><strong>phone has no SIM 
card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
+      even when &ldquo;location services&rdquo; are turned off, even
+      when the phone has no SIM card&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span>
-    <span class="inserted"><ins><em>ugly word &ldquo;monetize&rdquo;. A good 
replacement for that word
-    is &ldquo;exploit&rdquo;; nearly always that will fit perfectly.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201505060"&gt;
-    &lt;p&gt;Gratis Android apps (but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
+  &lt;li&gt;&lt;p&gt;Some portable phones</strong></del></span> <span 
class="inserted"><ins><em>(but not</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html"&gt;are
       sold with spyware sending lots of data to 
China&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;According</strong></del></span>
@@ -1720,104 +1714,85 @@
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Portable phones with 
GPS will send their GPS location on
-      remote command</strong></del></span>
+      remote command and users cannot stop them:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201411260"&gt;
     &lt;p&gt;Many proprietary apps for mobile devices
-    report which other apps the user has installed.  &lt;a
-    href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
-    is doing this in a way that at least is visible</em></ins></span> and 
<span class="removed"><del><strong>users cannot stop 
them:</strong></del></span> <span class="inserted"><ins><em>optional&lt;/a&gt;. 
Not
-    as bad as what the others do.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201401150.1"&gt;
-    &lt;p&gt;The Simeji keyboard is a smartphone version of 
Baidu's</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
+    report which other apps the user has installed.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers"&gt;
       
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers&lt;/a&gt;.
       (The US says it will eventually require all new portable phones
       to have GPS.)&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying
 &lt;abbr
-    title="Input Method 
Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="http://techcrunch.com/2014/11/26/twitter-app-graph/"&gt;Twitter
+    is doing this in a way that at least is visible and optional&lt;/a&gt;. Not
+    as bad as what the others do.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201312270"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201401150.1"&gt;
+    &lt;p&gt;The Simeji keyboard is a smartphone version of Baidu's &lt;a
+    href="/proprietary/proprietary-surveillance.html#baidu-ime"&gt;spying 
&lt;abbr
+    title="Input Method Editor"&gt;IME&lt;/abbr&gt;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201312270"&gt;
     &lt;p&gt;The</em></ins></span> nonfree Snapchat app's principal purpose is 
to restrict the
     use of data on the user's computer, but it does surveillance too: &lt;a
     
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers"&gt;
     it tries to get the user's list of other people's phone
       <span 
class="removed"><del><strong>numbers.&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>numbers&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    <span class="inserted"><ins><em>numbers&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInMobileApps"&gt;Spyware in Mobile Applications&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201312060"&gt;</em></ins></span>
-    &lt;p&gt;The <span 
class="removed"><del><strong>moviepass</strong></del></span> <span 
class="inserted"><ins><em>Brightest Flashlight</em></ins></span> app <span 
class="removed"><del><strong>and dis-service spy on users even more than users
-      expected. It</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
-        where they travel before and after going</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
+  &lt;li id="M201312060"&gt;
+    &lt;p&gt;The Brightest Flashlight app &lt;a
+    
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers"&gt;
     sends user data, including geolocation, for use by 
companies&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The FTC criticized this app because it asked the user to
     approve sending personal data to the app developer but did not ask
     about sending it to other companies.  This shows the weakness of
-    the reject-it-if-you-dislike-snooping 
&ldquo;solution&rdquo;</em></ins></span> to
-    <span class="inserted"><ins><em>surveillance: why should</em></ins></span> 
a <span class="removed"><del><strong>movie&lt;/a&gt;.
-    &lt;/p&gt;
-
-    &lt;p&gt;Don't be tracked &mdash; pay 
cash!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>flashlight app send any information to
-    anyone? A free software flashlight app would 
not.&lt;/p&gt;</em></ins></span>
+    the reject-it-if-you-dislike-snooping &ldquo;solution&rdquo; to
+    surveillance: why should a flashlight app send any information to
+    anyone? A free software flashlight app would not.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;AI-powered 
driving</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201212100"&gt;
-    &lt;p&gt;FTC says most mobile</em></ins></span> apps <span 
class="removed"><del><strong>can</strong></del></span> <span 
class="inserted"><ins><em>for children don't respect privacy:</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
-    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
+  &lt;li id="M201212100"&gt;
+    &lt;p&gt;FTC says most mobile apps for children don't respect privacy: 
&lt;a
+    
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/"&gt;
     
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInSkype"&gt;Skype&lt;/h4&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;
+  &lt;h4 <span 
class="removed"><del><strong>id="SpywareInMobileApps"&gt;Spyware in Mobile 
Applications&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInSkype"&gt;Skype&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInMobileApps"&gt;#SpywareInMobileApps&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInSkype"&gt;#SpywareInSkype&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-&lt;ul class="blurbs"&gt;
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;
+    &lt;p&gt;The moviepass app and dis-service spy on users even more than 
users
+      expected. It</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
   &lt;li id="M201307110"&gt;
-    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
-      uploads all phone numbers and email addresses&lt;/a&gt; in user's address
-      book to developer's server.  Note that this article misuses the words
-      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
-      referring to zero price.&lt;/p&gt;
+    &lt;p&gt;Skype contains</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/"&gt;records
+        where they travel before and after going to a movie&lt;/a&gt;.
+    &lt;/p&gt;
+
+    &lt;p&gt;Don't be tracked &mdash; pay cash!&lt;/p&gt;
   &lt;/li&gt;
   
-  &lt;li&gt;
-    &lt;p&gt;Facebook's app listens all the time,</strong></del></span>
+  &lt;li&gt;&lt;p&gt;AI-powered driving apps can</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;spyware&lt;/a&gt;.
-    Microsoft changed Skype</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to
 snoop
-    on what people are listening to or watching&lt;/a&gt;. In addition, it may
-    be analyzing people's conversations to serve them with targeted
-    advertisements.&lt;/p&gt;</strong></del></span>
+    Microsoft changed Skype</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"&gt;
+    track your every move&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
     specifically for spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Sarahah 
app</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
@@ -1829,61 +1804,74 @@
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201806240"&gt;
     &lt;p&gt;Red Shell is a spyware that
-    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
-               how much access</strong></del></span>
+    is found in many proprietary games. It</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/"&gt;
+      uploads all phone numbers</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/"&gt;
-    tracks data on users' computers and sends</em></ins></span> it <span 
class="removed"><del><strong>demands</strong></del></span> to <span 
class="removed"><del><strong>personal data in the device&lt;/a&gt;.
-               &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>third parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    tracks data on users' computers</em></ins></span> and <span 
class="removed"><del><strong>email addresses&lt;/a&gt; in user's address
+      book to developer's server.  Note that this article misuses the words
+      &ldquo;&lt;a href="/philosophy/free-sw.html"&gt;free 
software&lt;/a&gt;&rdquo;
+      referring</strong></del></span> <span class="inserted"><ins><em>sends 
it</em></ins></span> to <span class="removed"><del><strong>zero 
price.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>third 
parties&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;
-   &lt;p&gt;Verizon &lt;a 
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
-        announced</strong></del></span>
+    &lt;p&gt;Facebook's app listens all</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804144"&gt;
     &lt;p&gt;ArenaNet surreptitiously installed a spyware
-    program along with</em></ins></span> an <span 
class="removed"><del><strong>opt-in proprietary search app that it 
will&lt;/a&gt;
-        pre-install</strong></del></span> <span 
class="inserted"><ins><em>update to the massive
-    multiplayer game Guild Wars 2.  The spyware allowed ArenaNet &lt;a
-    
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
-    to snoop on all open processes running</em></ins></span> on <span 
class="removed"><del><strong>some of</strong></del></span> its <span 
class="removed"><del><strong>phones. The app will give Verizon the 
same</strong></del></span> <span class="inserted"><ins><em>user's 
computer&lt;/a&gt;.&lt;/p&gt;
+    program along with an update to</em></ins></span> the <span 
class="removed"><del><strong>time,</strong></del></span> <span 
class="inserted"><ins><em>massive
+    multiplayer game Guild Wars 2.  The spyware allowed 
ArenaNet</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"&gt;to</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave"&gt;
+    to</em></ins></span> snoop on <span class="removed"><del><strong>what 
people are listening to or watching&lt;/a&gt;. In addition, it may
+    be analyzing people's conversations</strong></del></span> <span 
class="inserted"><ins><em>all open processes running on its user's 
computer&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711070"&gt;
     &lt;p&gt;The driver for a certain gaming keyboard &lt;a
-    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends</em></ins></span>
-    information <span class="removed"><del><strong>about the users' searches 
that Google normally gets when
-   they use its search engine.&lt;/p&gt;
-
-   &lt;p&gt;Currently, the app is</strong></del></span> <span 
class="inserted"><ins><em>to China&lt;/a&gt;.&lt;/p&gt;
+    
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html"&gt;sends
+    information</em></ins></span> to <span class="removed"><del><strong>serve 
them with targeted
+    advertisements.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>China&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201512290"&gt;
-    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
-    being pre-installed</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+               &lt;p&gt;Faceapp appears to do lots of surveillance, judging 
by</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512290"&gt;
+    &lt;p&gt;Many</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"&gt;
+               how much access it demands</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/"&gt;
-    video game consoles snoop</em></ins></span> on <span 
class="removed"><del><strong>only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>their users</em></ins></span> and <span 
class="inserted"><ins><em>report to</em></ins></span> the
-    <span class="removed"><del><strong>user must explicitly opt-in before the 
app takes effect. However, the
-    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of 
spyware</strong></del></span>
+    video game consoles snoop on their users and report</em></ins></span> to 
<span class="removed"><del><strong>personal data in</strong></del></span> the 
<span class="removed"><del><strong>device&lt;/a&gt;.
+               &lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>internet&lt;/a&gt;&mdash;even what their 
users weigh.&lt;/p&gt;
 
-    &lt;p&gt;A game console</em></ins></span> is
-    <span class="removed"><del><strong>still 
spyware.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
computer, and you can't trust a computer with
+    &lt;p&gt;A game console is a computer, and you can't trust a computer with
     a nonfree operating system.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The Meitu photo-editing
-  app</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+   &lt;p&gt;Verizon</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201509160"&gt;
-    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
-  user</strong></del></span>
+    &lt;p&gt;Modern gratis game cr&hellip;apps</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones"&gt;
+        announced an opt-in proprietary search app that it will&lt;/a&gt;
+        pre-install on some</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
-    collect a wide range of data about their users and their users'
-    friends and associates&lt;/a&gt;.&lt;/p&gt;
+    collect a wide range</em></ins></span> of <span 
class="removed"><del><strong>its phones. The app will give Verizon the same
+   information</strong></del></span> <span 
class="inserted"><ins><em>data</em></ins></span> about <span 
class="removed"><del><strong>the</strong></del></span> <span 
class="inserted"><ins><em>their users and their</em></ins></span> users' <span 
class="removed"><del><strong>searches that Google normally gets 
when</strong></del></span>
+    <span class="inserted"><ins><em>friends and associates&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Even nastier,</em></ins></span> they <span 
class="removed"><del><strong>use its search engine.&lt;/p&gt;
+
+   &lt;p&gt;Currently,</strong></del></span> <span 
class="inserted"><ins><em>do it through ad networks that 
merge</em></ins></span> the <span class="removed"><del><strong>app is &lt;a 
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware"&gt;
+    being pre-installed on only one phone&lt;/a&gt;,</strong></del></span> 
<span class="inserted"><ins><em>data
+    collected by various cr&hellip;apps</em></ins></span> and <span 
class="removed"><del><strong>the
+    user must explicitly opt-in before the app takes effect. However, the
+    app remains spyware&mdash;an &ldquo;optional&rdquo; piece of spyware is
+    still spyware.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;Even nastier, they do it through ad networks that merge the data
-    collected by various cr&hellip;apps and sites made by different
+  &lt;li&gt;&lt;p&gt;The Meitu photo-editing
+  app &lt;a 
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/"&gt;sends
+  user</strong></del></span> <span class="inserted"><ins><em>sites made by 
different
     companies.&lt;/p&gt;
 
     &lt;p&gt;They use this</em></ins></span> data to <span 
class="removed"><del><strong>a Chinese company&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
@@ -1891,36 +1879,36 @@
   &lt;li&gt;&lt;p&gt;A pregnancy test controller application not 
only</strong></del></span> <span class="inserted"><ins><em>manipulate people to 
buy things, and hunt for
     &ldquo;whales&rdquo; who</em></ins></span> can <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy
   on many sorts</strong></del></span> <span class="inserted"><ins><em>be led 
to spend a lot</em></ins></span> of <span class="removed"><del><strong>data 
in</strong></del></span> <span class="inserted"><ins><em>money. They also
-    use a back door to manipulate the game play for specific players.&lt;/p&gt;
+    use a back door to manipulate</em></ins></span> the <span 
class="removed"><del><strong>phone, and in server accounts, 
it</strong></del></span> <span class="inserted"><ins><em>game play for specific 
players.&lt;/p&gt;
+
+    &lt;p&gt;While the article describes gratis games, games that cost 
money</em></ins></span>
+    can
+  <span class="removed"><del><strong>alter them too&lt;/a&gt;.
+  &lt;/p&gt;&lt;/li&gt;
 
-    &lt;p&gt;While the article describes gratis games, games that cost money
-    can use</em></ins></span> the <span 
class="removed"><del><strong>phone,</strong></del></span> <span 
class="inserted"><ins><em>same tactics.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span> <span 
class="inserted"><ins><em>use the same tactics.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401280"&gt;
-    &lt;p&gt;Angry Birds &lt;a
-    
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
-    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>in server accounts,</strong></del></span> <span 
class="inserted"><ins><em>the NSA takes advantage
-    to spy through</em></ins></span> it <span class="removed"><del><strong>can
-  alter them</strong></del></span> too&lt;/a&gt;.
-  <span class="removed"><del><strong>&lt;/p&gt;&lt;/li&gt;
+    &lt;p&gt;Angry Birds</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
+        movements before</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"&gt;
+    spies for companies,</em></ins></span> and <span 
class="removed"><del><strong>after the ride&lt;/a&gt;.&lt;/p&gt;
 
-  &lt;li&gt;&lt;p&gt;The Uber app tracks</strong></del></span>  <span 
class="inserted"><ins><em>Here's information on</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/"&gt;clients'
-        movements before and after the ride&lt;/a&gt;.&lt;/p&gt;
-
-        &lt;p&gt;This example illustrates how &ldquo;getting the user's 
consent&rdquo;
+        &lt;p&gt;This example illustrates how 
&ldquo;getting</strong></del></span> the <span 
class="removed"><del><strong>user's consent&rdquo;
         for surveillance is inadequate as a protection against massive
         surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Google's new voice messaging</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Google's new voice messaging app</strong></del></span> 
<span class="inserted"><ins><em>NSA takes advantage
+    to spy through it too&lt;/a&gt;.  Here's information on</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
+      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"&gt;
     more spyware apps&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a
     
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data"&gt;
-    More about NSA</em></ins></span> app <span 
class="removed"><del><strong>&lt;a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google"&gt;logs
-      all conversations&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More about NSA app spying&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apps</strong></del></span>
@@ -1955,13 +1943,16 @@
 scans your mobile phone's photo collections for known faces&lt;/a&gt;,
       and suggests you</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to <span class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according to 
who</strong></del></span> <span class="inserted"><ins><em>people that use 
them&lt;/a&gt;.&lt;/p&gt;
+    to <span class="removed"><del><strong>share</strong></del></span> <span 
class="inserted"><ins><em>snoop on</em></ins></span> the <span 
class="removed"><del><strong>picture you take according to who
+      is in</strong></del></span> <span class="inserted"><ins><em>people that 
use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be a sucker&mdash;reject all</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span 
class="removed"><del><strong>in</strong></del></span> <span 
class="inserted"><ins><em>unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>frame.&lt;/p&gt;
+      &lt;p&gt;This spyware feature seems to require online access to some
+      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>stings.&lt;/p&gt;
 
-      &lt;p&gt;This spyware feature seems to require online 
access</strong></del></span> <span class="inserted"><ins><em>article uses the 
term &lt;a
+    &lt;p&gt;It is unfortunate that</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
+      sent across</strong></del></span> <span 
class="inserted"><ins><em>article uses</em></ins></span> the <span 
class="removed"><del><strong>wire</strong></del></span> <span 
class="inserted"><ins><em>term &lt;a
     
href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -1972,9 +1963,12 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>some
-      known-faces database, which means</strong></del></span> <span 
class="inserted"><ins><em>me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+&lt;p&gt;Emo Phillips made a joke: The other day a woman came 
up</em></ins></span> to <span class="removed"><del><strong>Facebook's 
servers</strong></del></span> <span 
class="inserted"><ins><em>me</em></ins></span> and <span 
class="removed"><del><strong>face-recognition
+      algorithms.&lt;/p&gt;
+
+      &lt;p&gt;If so, none of Facebook users' pictures are private
+      anymore, even if</strong></del></span>
+<span class="inserted"><ins><em>said, &ldquo;Didn't I see you on 
television?&rdquo; I said, &ldquo;I
 don't know. You can't see out the other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
@@ -1982,24 +1976,20 @@
   &lt;li id="M201901070"&gt;
     &lt;p&gt;Vizio TVs &lt;a
     
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever</em></ins></span> the <span 
class="removed"><del><strong>pictures are likely to be
-      sent across</strong></del></span> <span class="inserted"><ins><em>TV 
sees,&rdquo;&lt;/a&gt; in</em></ins></span> the <span 
class="removed"><del><strong>wire to Facebook's servers and face-recognition
-      algorithms.&lt;/p&gt;
-
-      &lt;p&gt;If so, none</strong></del></span> <span 
class="inserted"><ins><em>own words</em></ins></span> of <span 
class="removed"><del><strong>Facebook users' pictures are private
-      anymore, even if</strong></del></span> the <span 
class="removed"><del><strong>user didn't &ldquo;upload&rdquo; 
them</strong></del></span> <span class="inserted"><ins><em>company's
-    CTO, and this data is sold</em></ins></span> to <span 
class="removed"><del><strong>the service.&lt;/p&gt;
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in</em></ins></span> 
the <span class="removed"><del><strong>user didn't &ldquo;upload&rdquo; them 
to</strong></del></span> <span class="inserted"><ins><em>own words 
of</em></ins></span> the <span class="removed"><del><strong>service.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify</strong></del></span> <span class="inserted"><ins><em>third parties. 
This</em></ins></span> is <span class="removed"><del><strong>based on 
proprietary malware (DRM</strong></del></span> <span 
class="inserted"><ins><em>in return for
-    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>snooping). In 
August
+  &lt;li&gt;&lt;p&gt;Like most &ldquo;music screaming&rdquo; disservices, 
Spotify
+      is based on proprietary malware (DRM</strong></del></span> <span 
class="inserted"><ins><em>company's
+    CTO,</em></ins></span> and <span class="removed"><del><strong>snooping). 
In August
       2015 it &lt;a
 
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy"&gt;
-      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>slightly
+      demanded users submit</strong></del></span> <span 
class="inserted"><ins><em>this data is sold</em></ins></span> to <span 
class="removed"><del><strong>increased 
snooping&lt;/a&gt;,</strong></del></span> <span class="inserted"><ins><em>third 
parties. This is in return for
+    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>some
+      are starting</strong></del></span> <span 
class="inserted"><ins><em>slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>increased snooping&lt;/a&gt;, and some
-      are starting</strong></del></span> <span class="inserted"><ins><em>make 
this spying acceptable, according</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>him,
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>realize</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, according to him,
     is</em></ins></span> that it is <span 
class="removed"><del><strong>nasty.&lt;/p&gt;
 
       &lt;p&gt;This article shows</strong></del></span> <span 
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span> 
the <span class="removed"><del><strong>&lt;a
@@ -2100,25 +2090,25 @@
 
     &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</strong></del></span> <span class="inserted"><ins><em>range so as to 
determine that they
     are nearby.  Once your Internet devices are paired with
-    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely control the toys</strong></del></span> 
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="inserted"><ins><em>Web activity, and other &lt;a
-    
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201511060"&gt;
-    &lt;p&gt;Vizio goes</em></ins></span> a <span 
class="removed"><del><strong>mobile phone. This would
-      enable crackers to listen</strong></del></span> <span 
class="inserted"><ins><em>step further than other TV
-    manufacturers</em></ins></span> in <span 
class="inserted"><ins><em>spying</em></ins></span> on <span 
class="removed"><del><strong>a child's speech, and even speak
+    your TV, advertisers</em></ins></span> can <span 
class="removed"><del><strong>remotely control the toys</strong></del></span> 
<span class="inserted"><ins><em>correlate ads</em></ins></span> with <span 
class="removed"><del><strong>a mobile phone. This would
+      enable crackers to listen in on a child's speech,</strong></del></span> 
<span class="inserted"><ins><em>Web activity,</em></ins></span> and <span 
class="removed"><del><strong>even speak
       into the toys themselves.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>their users: their</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> <span 
class="inserted"><ins><em>other</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201511060"&gt;
+    &lt;p&gt;Vizio goes a step further than other TV
+    manufacturers in spying</em></ins></span> on <span 
class="removed"><del><strong>its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
     
     &lt;p&gt;The app was reporting the temperature of the vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
+      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>their users: their &lt;a
+    
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
     &ldquo;smart&rdquo; TVs analyze your viewing habits in detail and
     link them your IP address&lt;/a&gt; so that advertisers can track you
     across devices.&lt;/p&gt;
@@ -2153,7 +2143,7 @@
     what</em></ins></span> people <span class="removed"><del><strong>used 
it&lt;/a&gt;.&lt;/p&gt;
     
     &lt;p&gt;The company's statement that it was anonymizing the data may be
-      true, but it doesn't really matter. If it had sold the data 
to</strong></del></span> <span class="inserted"><ins><em>are 
watching&lt;/a&gt;, even if it isn't</em></ins></span> a
+      true, but it doesn't really matter. If</strong></del></span> <span 
class="inserted"><ins><em>are watching&lt;/a&gt;, even if</em></ins></span> it 
<span class="removed"><del><strong>had sold the data to</strong></del></span> 
<span class="inserted"><ins><em>isn't</em></ins></span> a
       <span class="removed"><del><strong>data broker, the data broker would 
have been able to figure out
       who the user was.&lt;/p&gt;
     
@@ -2218,38 +2208,49 @@
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>TV</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;
-       to report its location to someone else and to transmit
-       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    &lt;p&gt;An LG &ldquo;smart&rdquo; watch</strong></del></span> <span 
class="inserted"><ins><em>TV</em></ins></span> is <span 
class="removed"><del><strong>designed</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all the time&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  &lt;li id="M201409290"&gt;
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>connects</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article says this is</strong></del></span> <span 
class="inserted"><ins><em>get users' formal
+    &lt;p&gt;This shows that laws requiring products to get users' formal
     consent before collecting personal data are totally inadequate.
-    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>back door, but</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
+    And what happens if a user declines consent? Probably the TV will
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say</em></ins></span> that <span 
class="removed"><del><strong>could be a
-      misunderstanding.  However, it is certainly surveillance, at
+    &lt;p&gt;Proper laws would say that TVs are not allowed</em></ins></span> 
to report <span class="removed"><del><strong>its location to someone else and 
to transmit
+       conversations too&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what the
+    user watches&mdash;no exceptions!&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A very cheap &ldquo;smart watch&rdquo; comes with an Android 
app</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"&gt;
+       that connects</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches, and the switch</em></ins></span> to <span 
class="removed"><del><strong>an unidentified site in China&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The article says</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> this <span 
class="removed"><del><strong>is a back door, but</strong></del></span> <span 
class="inserted"><ins><em>off has
+    no effect&lt;/a&gt;.  (The fact</em></ins></span> that <span 
class="removed"><del><strong>could be</strong></del></span> <span 
class="inserted"><ins><em>the transmission reports</em></ins></span> a
+      <span class="removed"><del><strong>misunderstanding.  
However,</strong></del></span> <span class="inserted"><ins><em>404 error
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>is certainly surveillance, at
       least.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>TVs are not allowed</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -2259,31 +2260,26 @@
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareInBIOS"&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>report what the
-    user watches&mdash;no exceptions!&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>BIOS&lt;/h4&gt;
+  &lt;h4 id="SpywareInBIOS"&gt;Spyware in BIOS&lt;/h4&gt;
   &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInBIOS"&gt;#SpywareInBIOS&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
 &lt;ul&gt;
-&lt;li&gt;&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>LG 
&ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches,</em></ins></span> and <span 
class="removed"><del><strong>spyware via BIOS&lt;/a&gt; on Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>the switch to turn 
this off has
-    no effect&lt;/a&gt;.  (The fact</em></ins></span> that the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span class="inserted"><ins><em>404 
error</em></ins></span>
-    really
-<span class="removed"><del><strong>clean since &lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft
+&lt;li&gt;&lt;p&gt;</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops on other devices</em></ins></span> on <span 
class="removed"><del><strong>Windows installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since &lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>patch</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2297,10 +2293,8 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>means nothing;</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
-  this way, because they pass</strong></del></span> <span 
class="inserted"><ins><em>server could save that data anyway.)&lt;/p&gt; 
-
-    &lt;p&gt;Even worse,</em></ins></span> it <span 
class="removed"><del><strong>through Microsoft.&lt;/p&gt;&lt;/li&gt;
+      &lt;p&gt;Specifically, it can collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>stop this, but 
any
+    product could spy</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
       &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
@@ -2315,14 +2309,10 @@
 &lt;/div&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Spyware in Skype:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in Skype:
+      &lt;a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/"&gt;
       
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/&lt;/a&gt;.
-      Microsoft changed Skype</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops on other devices on the user's local network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said it had installed a patch to stop this, but any
-    product could spy this way.&lt;/p&gt;
+      Microsoft changed Skype</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;
 
     &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"&gt;
       specifically for spying&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
@@ -2403,10 +2393,11 @@
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201511250"&gt;</em></ins></span>
-    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is <span 
class="removed"><del><strong>&lt;a
-      href="http://www.bbc.com/news/technology-34922712"&gt;always
-        watching&lt;/a&gt;, even when the &ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
+    &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; <span class="removed"><del><strong>device 
means the manufacturer is using it to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2424,18 +2415,14 @@
 
   &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
       Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report</strong></del></span> <span class="inserted"><ins><em>&lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,</em></ins></span>
-    even <span class="removed"><del><strong>which page</strong></del></span> 
<span class="inserted"><ins><em>when</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+      needed</strong></del></span> <span class="inserted"><ins><em>device 
means the manufacturer is using it</em></ins></span>
     to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2497,10 +2484,10 @@
     was sued for collecting lots of personal information about how people
     used it&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The company's statement that it was anonymizing the data may be
-    true, but it doesn't really matter. If</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>had sold the data</em></ins></span> to <span 
class="inserted"><ins><em>a data
+    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
+    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
     broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
     modem enables</strong></del></span>
     <span class="inserted"><ins><em>user was.&lt;/p&gt;
@@ -2560,14 +2547,14 @@
         listen</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
     conversations</em></ins></span> to <span 
class="removed"><del><strong>everyone</strong></del></span> <span 
class="inserted"><ins><em>Nuance Communications&lt;/a&gt;, a speech recognition
-    company based</em></ins></span> in the <span 
class="removed"><del><strong>house, all</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>time&lt;/a&gt;.&lt;/p&gt;
+    company based</em></ins></span> in the <span 
class="removed"><del><strong>house, all the time&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Today's technological practice does not include any way of
-    making</strong></del></span> <span class="inserted"><ins><em>toys 
with</em></ins></span> a <span class="removed"><del><strong>device that can 
obey your voice commands without
-    potentially spying</strong></del></span> <span 
class="inserted"><ins><em>mobile phone. This would enable
+    making a device that</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; 
crackers</em></ins></span>
+    can <span class="removed"><del><strong>obey your voice commands without
+    potentially spying</strong></del></span> <span 
class="inserted"><ins><em>remotely control the toys with a mobile phone. This 
would enable
     crackers to listen in</em></ins></span> on <span 
class="removed"><del><strong>you.  Even if it is air-gapped, it could be
     saving up records about you for later examination.&lt;/p&gt;
   &lt;/li&gt;
@@ -2594,51 +2581,70 @@
   &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up to me and
-said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the other way.&rdquo; Evidently that was
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
+don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;Vizio
     &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that is viewed on them, and not just broadcasts
+    report everything that</strong></del></span> <span 
class="inserted"><ins><em>people, DJI</em></ins></span> is <span 
class="removed"><del><strong>viewed</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>them, and not just broadcasts
     and cable&lt;/a&gt;. Even if the image is coming from the user's own
-    computer, the TV reports what it is. The existence of a way to
-    disable the surveillance, even if it were not hidden as it was in
+    computer,</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to</em></ins></span> the <span 
class="removed"><del><strong>TV reports what it is.</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;.</em></ins></span> 
The <span class="removed"><del><strong>existence</strong></del></span> <span 
class="inserted"><ins><em>Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction</em></ins></span> of <span 
class="removed"><del><strong>a way to
+    disable</strong></del></span> the <span 
class="removed"><del><strong>surveillance,</strong></del></span> <span 
class="inserted"><ins><em>Alexa service staff</em></ins></span> even <span 
class="removed"><del><strong>if it were not hidden as it was in
     these TVs, does not legitimize the surveillance.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>has access 
to</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report was as of 2014, but we don't expect this has got 
better.&lt;/p&gt;
-
-    &lt;p&gt;This shows that laws requiring products to get users' formal
+    &lt;p&gt;The report was as</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way</em></ins></span> of <span 
class="removed"><del><strong>2014, but we don't expect this has got 
better.&lt;/p&gt;
+
+    &lt;p&gt;This shows that laws requiring products</strong></del></span> 
<span class="inserted"><ins><em>saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no 
way</em></ins></span>
+    to <span class="removed"><del><strong>get users' formal
       consent before collecting personal data are totally inadequate.
-      And what happens if</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>user declines consent?  Probably the TV
-      will say, &ldquo;Without your consent</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>tracking, the TV will
+      And</strong></del></span> <span 
class="inserted"><ins><em>know</em></ins></span> what happens <span 
class="removed"><del><strong>if a user declines consent?  Probably the TV
+      will say, &ldquo;Without your consent</strong></del></span> to <span 
class="removed"><del><strong>tracking,</strong></del></span> the <span 
class="removed"><del><strong>TV will
       not work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>snoop on other people, DJI is in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Proper laws would say</strong></del></span> <span 
class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
-
 
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -3405,7 +3411,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:38 $
+$Date: 2019/04/27 19:30:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.283
retrieving revision 1.284
diff -u -b -r1.283 -r1.284
--- proprietary-surveillance.de.po      26 Apr 2019 12:00:38 -0000      1.283
+++ proprietary-surveillance.de.po      27 Apr 2019 19:30:04 -0000      1.284
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2018-05-18 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -3969,6 +3969,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.419
retrieving revision 1.420
diff -u -b -r1.419 -r1.420
--- proprietary-surveillance.fr.po      26 Apr 2019 17:26:14 -0000      1.419
+++ proprietary-surveillance.fr.po      27 Apr 2019 19:30:04 -0000      1.420
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2019-04-26 19:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -3370,6 +3371,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-surveillance.it-diff.html       26 Apr 2019 12:00:38 -0000      
1.135
+++ proprietary-surveillance.it-diff.html       27 Apr 2019 19:30:04 -0000      
1.136
@@ -1272,42 +1272,72 @@
     78,000 have been analyzed, of which 24,000 (31%)</em></ins></span> 
transmit <span class="inserted"><ins><em>the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
 conversations</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290"&gt;
     Advertising ID&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>Nuance Communications&lt;/a&gt;,
-      a speech recognition company based</strong></del></span> <span 
class="inserted"><ins><em>other companies, and &lt;a
-    href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
-    18,000 (23% of the total) link this ID to hardware identifiers&lt;/a&gt;,
-    so that users cannot escape tracking by resetting it.&lt;/p&gt;
+      a speech recognition company based in the U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+      can remotely control the toys with a mobile phone. This would
+      enable crackers to listen in on a child's speech,</strong></del></span> 
<span class="inserted"><ins><em>other companies,</em></ins></span> and <span 
class="removed"><del><strong>even speak
+      into the toys themselves.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;A computerized vibrator</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
+       was snooping on its users through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The app was reporting the temperature</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/"&gt;
+    18,000 (23%</em></ins></span> of the <span 
class="removed"><del><strong>vibrator minute</strong></del></span> <span 
class="inserted"><ins><em>total) link this ID to hardware identifiers&lt;/a&gt;,
+    so that users cannot escape tracking</em></ins></span> by
+      <span class="removed"><del><strong>minute (thus, indirectly, 
whether</strong></del></span> <span class="inserted"><ins><em>resetting 
it.&lt;/p&gt;
 
     &lt;p&gt;Collecting hardware identifiers is in apparent violation of
-    Google's policies. But it seems that Google wasn't aware of it,
-    and, once informed, was</em></ins></span> in <span 
class="inserted"><ins><em>no hurry to take action. This proves
-    that</em></ins></span> the <span 
class="removed"><del><strong>U.S.&lt;/p&gt;
+    Google's policies. But</em></ins></span> it <span 
class="inserted"><ins><em>seems that Google wasn't aware of it,
+    and, once informed,</em></ins></span> was <span 
class="removed"><del><strong>surrounded by a person's
+      body), as well as the vibration frequency.&lt;/p&gt;
 
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-      can remotely control</strong></del></span> <span 
class="inserted"><ins><em>policies of a development platform are ineffective at
-    preventing nonfree software developers from including malware in
+    &lt;p&gt;Note</strong></del></span> <span class="inserted"><ins><em>in no 
hurry to take action. This proves
+    that</em></ins></span> the <span class="removed"><del><strong>totally 
inadequate proposed response:</strong></del></span> <span 
class="inserted"><ins><em>policies of</em></ins></span> a <span 
class="removed"><del><strong>labeling
+      standard with which manufacturers would make statements about
+      their products, rather than free</strong></del></span> <span 
class="inserted"><ins><em>development platform are ineffective at
+    preventing nonfree</em></ins></span> software <span 
class="removed"><del><strong>which users could</strong></del></span> <span 
class="inserted"><ins><em>developers from including malware in
     their programs.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902060"&gt;
-    &lt;p&gt;Many nonfree apps have a surveillance feature for &lt;a
+    &lt;p&gt;Many nonfree apps</em></ins></span> have
+      <span class="removed"><del><strong>checked and changed.&lt;/p&gt;
+    
+    &lt;p&gt;The company that made the vibrator
+      &lt;a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;
+       was sued</strong></del></span> <span class="inserted"><ins><em>a 
surveillance feature</em></ins></span> for <span 
class="removed"><del><strong>collecting lots of personal information about how
+       people used it&lt;/a&gt;.&lt;/p&gt;
+    
+    &lt;p&gt;The company's statement that it was 
anonymizing</strong></del></span> <span class="inserted"><ins><em>&lt;a
     
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/"&gt;
-    recording all</em></ins></span> the <span 
class="removed"><del><strong>toys</strong></del></span> <span 
class="inserted"><ins><em>users' actions&lt;/a&gt; in 
interacting</em></ins></span> with <span class="inserted"><ins><em>the 
app.&lt;/p&gt;
+    recording all</em></ins></span> the <span 
class="removed"><del><strong>data may be
+      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>users' actions&lt;/a&gt; in interacting 
with</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>app.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201902041.1"&gt;
-    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
+    &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that 
used</em></ins></span> to <span class="removed"><del><strong>a
+      data broker, the data broker would have been able</strong></del></span>
+    <span class="inserted"><ins><em>be on Google Play had one or more 
malicious functionalities, such as &lt;a
     
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos&lt;/a&gt; instead of &ldquo;beautifying&rdquo; them,
     pushing unwanted and often malicious ads on users, and redirecting
-    them to phishing sites that stole their credentials. Furthermore,
-    the user interface of most of them was designed to make uninstallation
+    them</em></ins></span> to <span class="removed"><del><strong>figure out
+      who</strong></del></span> <span class="inserted"><ins><em>phishing sites 
that stole their credentials. Furthermore,</em></ins></span>
+    the user <span class="removed"><del><strong>was.&lt;/p&gt;
+    
+    &lt;p&gt;Following this lawsuit,
+      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
+       the company has been ordered to pay a total</strong></del></span> <span 
class="inserted"><ins><em>interface</em></ins></span> of <span 
class="removed"><del><strong>C$4m&lt;/a&gt;
+      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>most of them was designed to make uninstallation
     difficult.&lt;/p&gt;
 
     &lt;p&gt;Users should of course uninstall these dangerous apps if they
     haven't yet, but they should also stay away from nonfree apps in
-    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry</em></ins></span> a 
<span class="removed"><del><strong>mobile phone. This would
-      enable crackers</strong></del></span> <span 
class="inserted"><ins><em>potential risk because
+    general. &lt;em&gt;All&lt;/em&gt; nonfree apps carry a potential risk 
because
     there is no easy way of knowing what they really do.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -1315,10 +1345,10 @@
     &lt;p&gt;An investigation of the 150 most popular
     gratis VPN apps in Google Play found that &lt;a
     href="https://www.top10vpn.com/free-vpn-android-app-risk-index/"&gt;
-    25% fail</em></ins></span> to <span 
class="removed"><del><strong>listen</strong></del></span> <span 
class="inserted"><ins><em>protect their users’ privacy&lt;/a&gt; due to DNS 
leaks. In
-    addition, 85% feature intrusive permissions or functions</em></ins></span> 
in <span class="inserted"><ins><em>their
+    25% fail to protect their users’ privacy&lt;/a&gt; due to DNS leaks. In
+    addition, 85% feature intrusive permissions or functions in their
     source code&mdash;often used for invasive advertising&mdash;that could
-    potentially also be used to spy</em></ins></span> on <span 
class="inserted"><ins><em>users. Other technical flaws were
+    potentially also be used to spy on users. Other technical flaws were
     found as well.&lt;/p&gt;
 
     &lt;p&gt;Moreover, a previous investigation had found that &lt;a
@@ -1956,16 +1986,18 @@
     across devices.&lt;/p&gt;
 
     &lt;p&gt;It is possible to turn this off, but having it enabled by default
-    is an injustice already.&lt;/p&gt;
+    is an injustice already.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511020"&gt;
-    &lt;p&gt;Tivo's alliance with Viacom adds 2.3 million households
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511020"&gt;
+    &lt;p&gt;Tivo's alliance</em></ins></span> with <span 
class="removed"><del><strong>microphones</strong></del></span> <span 
class="inserted"><ins><em>Viacom adds 2.3 million households
     to the 600 millions social media profiles the company
     already monitors. Tivo customers are unaware they're
     being watched by advertisers. By combining TV viewing
-    information with online social media participation, Tivo can now &lt;a
-    href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
+    information with online social media participation, Tivo can 
now</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
     correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
     users to new combined surveillance by default.&lt;/p&gt;
   &lt;/li&gt;
@@ -1973,49 +2005,36 @@
   &lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't</em></ins></span> a 
<span class="removed"><del><strong>child's speech,</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;
+    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201505290"&gt;
     &lt;p&gt;Verizon cable TV &lt;a
     
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch,</em></ins></span> and even <span 
class="removed"><del><strong>speak
-      into the toys themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    snoops on what programs people watch, and even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A computerized vibrator</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201504300"&gt;
-    &lt;p&gt;Vizio</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack"&gt;
-       was snooping on</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-    used a firmware &ldquo;upgrade&rdquo; to make</em></ins></span> its <span 
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
-    users <span class="removed"><del><strong>through the proprietary control 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watch&lt;/a&gt;.  The TVs did not do that when first 
sold.&lt;/p&gt;
+  &lt;li id="M201504300"&gt;
+    &lt;p&gt;Vizio &lt;a
+    
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
+    used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
+    users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502090"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>app was 
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung 
&ldquo;Smart&rdquo; TV &lt;a
+  &lt;li id="M201502090"&gt;
+    &lt;p&gt;The Samsung &ldquo;Smart&rdquo; TV &lt;a
     
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm"&gt;
-    transmits users' voice on</em></ins></span> the <span 
class="removed"><del><strong>temperature of</strong></del></span> <span 
class="inserted"><ins><em>internet to another company, Nuance&lt;/a&gt;.
-    Nuance can save it and would then have to give it to</em></ins></span> the 
<span class="removed"><del><strong>vibrator minute by
-      minute (thus, indirectly, whether</strong></del></span> <span 
class="inserted"><ins><em>US or some
+    transmits users' voice on the internet to another company, 
Nuance&lt;/a&gt;.
+    Nuance can save it and would then have to give it</em></ins></span> to the
+       <span class="removed"><del><strong>manufacturer&lt;/a&gt;. Guess 
what?</strong></del></span> <span class="inserted"><ins><em>US or some
     other government.&lt;/p&gt;
 
-    &lt;p&gt;Speech recognition is not to be trusted unless</em></ins></span> 
it <span class="removed"><del><strong>was surrounded</strong></del></span> 
<span class="inserted"><ins><em>is done</em></ins></span> by <span 
class="removed"><del><strong>a person's
-      body), as well as the vibration frequency.&lt;/p&gt;
+    &lt;p&gt;Speech recognition is not to be trusted unless it is done by free
+    software in your own computer.&lt;/p&gt;
     
-    &lt;p&gt;Note the totally inadequate proposed response: a labeling
-      standard with which manufacturers would make statements about
-      their products, rather than</strong></del></span> free
-    software <span class="removed"><del><strong>which users could have
-      checked and changed.&lt;/p&gt;
-    
-    &lt;p&gt;The company</strong></del></span> <span 
class="inserted"><ins><em>in your own computer.&lt;/p&gt;
-
-    &lt;p&gt;In its privacy policy, Samsung explicitly 
confirms</em></ins></span> that <span 
class="removed"><del><strong>made</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
+    &lt;p&gt;In its privacy policy, Samsung explicitly confirms 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs"&gt;voice
     data containing sensitive information will be transmitted to third
     parties&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -2023,59 +2042,49 @@
   &lt;li id="M201411090"&gt;
     &lt;p&gt;The Amazon &ldquo;Smart&rdquo; TV is &lt;a
     
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance"&gt;
-    snooping all</em></ins></span> the <span 
class="removed"><del><strong>vibrator</strong></del></span> <span 
class="inserted"><ins><em>time&lt;/a&gt;.&lt;/p&gt;
+    snooping all the time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201409290"&gt;
-    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
+    &lt;p&gt;More or less all &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
     on their users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The report</em></ins></span> was <span 
class="removed"><del><strong>sued for collecting lots</strong></del></span> 
<span class="inserted"><ins><em>as</em></ins></span> of <span 
class="removed"><del><strong>personal information about how
-       people used it&lt;/a&gt;.&lt;/p&gt;
-    
-    &lt;p&gt;The company's statement</strong></del></span> <span 
class="inserted"><ins><em>2014, but we don't expect this has got
+    &lt;p&gt;The report was as of 2014, but we don't expect this has got
     better.&lt;/p&gt;
 
-    &lt;p&gt;This shows</em></ins></span> that <span 
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span 
class="inserted"><ins><em>laws requiring products to get users' formal
-    consent before collecting personal</em></ins></span> data <span 
class="removed"><del><strong>may be
-      true, but it doesn't really matter. If it had sold</strong></del></span> 
<span class="inserted"><ins><em>are totally inadequate.
-    And what happens if a user declines consent? Probably</em></ins></span> 
the <span class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>TV will
-    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>a
-      data broker,</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data broker</strong></del></span> <span 
class="inserted"><ins><em>TV will not
+    &lt;p&gt;This shows that laws requiring products to get users' formal
+    consent before collecting personal data are totally inadequate.
+    And what happens if</em></ins></span> a <span 
class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>user declines consent? Probably the TV will
+    say, &ldquo;Without your consent</em></ins></span> to <span 
class="removed"><del><strong>access</strong></del></span> <span 
class="inserted"><ins><em>tracking,</em></ins></span> the <span 
class="removed"><del><strong>data&lt;/a&gt;
+      collected by</strong></del></span> <span class="inserted"><ins><em>TV 
will not
     work.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Proper laws</em></ins></span> would <span 
class="removed"><del><strong>have been able</strong></del></span> <span 
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to 
<span class="removed"><del><strong>figure out
-      who</strong></del></span> <span class="inserted"><ins><em>report 
what</em></ins></span> the
-    user <span class="removed"><del><strong>was.&lt;/p&gt;
+    &lt;p&gt;Proper laws would say that TVs are not allowed to report 
what</em></ins></span> the <span class="removed"><del><strong>manufacturer's 
snooping.&lt;/p&gt;
     
-    &lt;p&gt;Following this lawsuit,
-      &lt;a 
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;
-       the company has been ordered to pay a total of C$4m&lt;/a&gt;
-      to its customers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>watches&mdash;no 
exceptions!&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;That</strong></del></span>
+    <span class="inserted"><ins><em>user watches&mdash;no exceptions!&lt;/p&gt;
   &lt;/li&gt;
   
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt; 
&ldquo;CloudPets&rdquo; toys with microphones
-      &lt;a 
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults"&gt;leak
 childrens' conversations to the
-       manufacturer&lt;/a&gt;. Guess what?</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201405200"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings"&gt;Crackers
 found a way to access the data&lt;/a&gt;
-      collected by the manufacturer's snooping.&lt;/p&gt;
-
-    &lt;p&gt;That</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user watches,</em></ins></span> and the <span 
class="removed"><del><strong>FBI could listen to these conversations
+  &lt;li id="M201405200"&gt;
+    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what</em></ins></span> the <span 
class="removed"><del><strong>manufacturer</strong></del></span> <span 
class="inserted"><ins><em>user watches,</em></ins></span> and the <span 
class="removed"><del><strong>FBI could listen</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>these conversations
       was unacceptable by itself.&lt;/p&gt;&lt;/li&gt;
   
-  &lt;li&gt;&lt;p&gt;Barbie
-      &lt;a 
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Barbie</strong></del></span> <span 
class="inserted"><ins><em>turn this off has
+    no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
+    really means nothing; the server could save that data anyway.)&lt;/p&gt; 
+
+    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
 going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtLowLevel --&gt;
-&lt;!-- WEBMASTERS: make sure</strong></del></span> <span 
class="inserted"><ins><em>switch</em></ins></span> to <span 
class="removed"><del><strong>place new items on top under each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
+    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtLowLevel"&gt;Spyware at Low Level&lt;/h3&gt;
@@ -2092,22 +2101,29 @@
 &lt;ul&gt;
 &lt;li&gt;&lt;p&gt;
 &lt;a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"&gt;
-Lenovo stealthily installed crapware and spyware via BIOS&lt;/a&gt; on Windows 
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>turn this off has
-    no effect&lt;/a&gt;.  (The fact</em></ins></span> that the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span 
class="inserted"><ins><em>transmission reports</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is 
not</strong></del></span> <span class="inserted"><ins><em>404 
error</em></ins></span>
-    really
-<span class="removed"><del><strong>clean since</strong></del></span> <span 
class="inserted"><ins><em>means nothing; the server could save that data 
anyway.)&lt;/p&gt; 
+Lenovo stealthily installed crapware and spyware via 
BIOS&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>other 
devices</em></ins></span> on <span class="removed"><del><strong>Windows 
installs.
+Note that</strong></del></span> the <span 
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span class="inserted"><ins><em>user's 
local network&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;LG later said it had installed</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;clean&rdquo; Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>patch to 
stop this, but any
+    product could spy this way.&lt;/p&gt;
 
-    &lt;p&gt;Even worse, it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
+    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 puts in its own malware&lt;/a&gt;.
 &lt;/p&gt;&lt;/li&gt;
 &lt;/ul&gt;
 
 &lt;!-- #SpywareAtWork --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/"&gt;
-    snoops</em></ins></span> on <span class="removed"><del><strong>top under 
each subsection --&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201212170"&gt;
+    &lt;p id="break-security-smarttv"&gt;&lt;a
+    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+    Crackers found a way</em></ins></span> to <span 
class="removed"><del><strong>place new items</strong></del></span> <span 
class="inserted"><ins><em>break security</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection --&gt;
 
 &lt;div class="big-section"&gt;
   &lt;h3 id="SpywareAtWork"&gt;Spyware at Work&lt;/h3&gt;
@@ -2121,24 +2137,13 @@
         Using US Companies, NSA To Route Around Domestic Surveillance
         Restrictions&lt;/a&gt;.&lt;/p&gt;
 
-      &lt;p&gt;Specifically,</strong></del></span> <span 
class="inserted"><ins><em>other devices on the user's local 
network&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;LG later said</em></ins></span> it <span 
class="removed"><del><strong>can collect the emails of members of 
Parliament</strong></del></span> <span class="inserted"><ins><em>had installed 
a patch to stop this, but any
-    product could spy</em></ins></span> this <span 
class="removed"><del><strong>way, because they pass it through 
Microsoft.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:</strong></del></span> 
<span class="inserted"><ins><em>way.&lt;/p&gt;
-
-    &lt;p&gt;Meanwhile, LG TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    do lots of spying anyway&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201212170"&gt;
-    &lt;p id="break-security-smarttv"&gt;&lt;a
-    
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-    Crackers found a way to break security on a &ldquo;smart&rdquo; 
TV&lt;/a&gt;
-    and use its camera to watch the people who are watching 
TV.&lt;/p&gt;</em></ins></span>
+      &lt;p&gt;Specifically, it can collect</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;smart&rdquo; TV&lt;/a&gt;
+    and use its camera to watch</em></ins></span> the <span 
class="removed"><del><strong>emails of members of Parliament
+  this way, because they pass it through Microsoft.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;Spyware in Cisco TNP IP phones:
+      &lt;a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+      
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html&lt;/a&gt;&lt;/p&gt;</strong></del></span>
 <span class="inserted"><ins><em>people who are watching 
TV.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -2212,8 +2217,10 @@
 
   &lt;li id="M201511250"&gt;</em></ins></span>
     &lt;p&gt;The Nest Cam &ldquo;smart&rdquo; camera is &lt;a
-    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;, <span class="removed"><del><strong>even when the 
&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
-    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
to outsmart
+    href="http://www.bbc.com/news/technology-34922712"&gt;always 
watching&lt;/a&gt;,
+    even when the &ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;A &ldquo;smart&rdquo; device means the manufacturer is using it 
<span class="removed"><del><strong>to outsmart
       you.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -2231,34 +2238,37 @@
 
   &lt;li&gt;&lt;p&gt;Spyware in many e-readers&mdash;not only the
       Kindle: &lt;a 
href="https://www.eff.org/pages/reader-privacy-chart-2012"&gt;
-      they report even which page</strong></del></span>
-    <span class="inserted"><ins><em>even when</em></ins></span> the <span 
class="removed"><del><strong>user reads at what time&lt;/a&gt;.&lt;/p&gt;
+      they report even which page the user reads at what 
time&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital 
Editions,&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;owner&rdquo; switches it 
&ldquo;off.&rdquo;&lt;/p&gt;
-
-    &lt;p&gt;A &ldquo;smart&rdquo; device means</em></ins></span> the <span 
class="removed"><del><strong>e-reader used
+  &lt;li&gt;&lt;p&gt;Adobe made &ldquo;Digital Editions,&rdquo; the e-reader 
used
       by most US libraries,
       &lt;a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"&gt;
       send lots of data to Adobe&lt;/a&gt;.  Adobe's &ldquo;excuse&rdquo;: it's
-      needed</strong></del></span> <span 
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
-    to <span class="removed"><del><strong>check 
DRM!&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>outsmart 
you.&lt;/p&gt;</em></ins></span>
+      needed to check DRM!&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
-
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInVehicles"&gt;Spyware 
in Vehicles&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInToys"&gt;Toys&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 id="SpywareInVehicles"&gt;Spyware in Vehicles&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInVehicles"&gt;#SpywareInVehicles&lt;/a&gt;)&lt;/span&gt;
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
+&lt;ul&gt;
 &lt;li&gt;&lt;p&gt;Computerized cars with nonfree software are
   &lt;a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data"&gt;
-  snooping devices&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;</strong></del></span>
+  snooping devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>to outsmart 
you.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;</em></ins></span>
+
+&lt;div class="big-subsection"&gt;
+  &lt;h4 id="SpywareInToys"&gt;Toys&lt;/h4&gt;
+  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareInToys"&gt;#SpywareInToys&lt;/a&gt;)&lt;/span&gt;
+&lt;/div&gt;
+
+&lt;ul class="blurbs"&gt;</em></ins></span>
   &lt;li <span class="removed"><del><strong>id="nissan-modem"&gt;&lt;p&gt;The 
Nissan Leaf</strong></del></span> <span 
class="inserted"><ins><em>id="M201711244"&gt;
     &lt;p&gt;The Furby Connect</em></ins></span> has a <span 
class="removed"><del><strong>built-in cell phone modem which allows
   effectively
@@ -2305,16 +2315,15 @@
 
     &lt;p&gt;The company's statement that</em></ins></span> it <span 
class="removed"><del><strong>demands blind faith from its 
users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Even if no one connects</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing the data may be
-    true, but it doesn't really matter. If it had sold the 
data</em></ins></span> to <span class="inserted"><ins><em>a data
-    broker,</em></ins></span> the <span class="removed"><del><strong>car 
remotely,</strong></del></span> <span class="inserted"><ins><em>data broker 
would have been able to figure out who</em></ins></span> the <span 
class="removed"><del><strong>cell phone
-    modem enables</strong></del></span>
+    &lt;p&gt;Even if no one connects to</strong></del></span> <span 
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span 
class="removed"><del><strong>car remotely,</strong></del></span> <span 
class="inserted"><ins><em>data may be
+    true, but it doesn't really matter. If it had sold</em></ins></span> the 
<span class="removed"><del><strong>cell phone
+    modem enables</strong></del></span> <span class="inserted"><ins><em>data 
to a data
+    broker,</em></ins></span> the <span class="removed"><del><strong>phone 
company</strong></del></span> <span class="inserted"><ins><em>data broker would 
have been able</em></ins></span> to <span 
class="removed"><del><strong>track</strong></del></span> <span 
class="inserted"><ins><em>figure out who</em></ins></span> the <span 
class="removed"><del><strong>car's movements all</strong></del></span>
     <span class="inserted"><ins><em>user was.&lt;/p&gt;
 
     &lt;p&gt;Following this lawsuit, &lt;a
     
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"&gt;</em></ins></span>
-    the <span class="removed"><del><strong>phone</strong></del></span> company 
<span class="inserted"><ins><em>has been ordered</em></ins></span> to <span 
class="removed"><del><strong>track the car's movements all
-    the time; it is possible</strong></del></span> <span 
class="inserted"><ins><em>pay a total of C$4m&lt;/a&gt;</em></ins></span> to 
<span class="removed"><del><strong>physically remove the cell phone modem
+    the <span class="removed"><del><strong>time; it is 
possible</strong></del></span> <span class="inserted"><ins><em>company has been 
ordered to pay a total of C$4m&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>physically remove the cell phone modem
     though.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>its
     customers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -2334,111 +2343,125 @@
       payment systems, but</strong></del></span> <span 
class="inserted"><ins><em>way to access</em></ins></span> the <span 
class="removed"><del><strong>invasion isn't done by malware. The other
       cases mentioned are done</strong></del></span> <span 
class="inserted"><ins><em>data&lt;/a&gt; collected</em></ins></span> by <span 
class="removed"><del><strong>proprietary malware in</strong></del></span> the 
<span class="removed"><del><strong>car.&lt;/p&gt;&lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Tesla cars allow the company to extract data remotely and
-      determine</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Tesla cars allow</strong></del></span>
     <span class="inserted"><ins><em>manufacturer's snooping.&lt;/p&gt;
 
-    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>car's location at any time. (See
+    &lt;p&gt;That</em></ins></span> the <span 
class="removed"><del><strong>company to extract data 
remotely</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and
+      <span class="removed"><del><strong>determine</strong></del></span> the 
<span class="removed"><del><strong>car's location at any time. (See
       &lt;a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf"&gt;
-      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>manufacturer</em></ins></span> and <span 
class="removed"><del><strong>c.&lt;/a&gt;). The company says it doesn't
-      store this information, but if</strong></del></span> the <span 
class="removed"><del><strong>state orders it</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span 
class="removed"><del><strong>get the data
-      and hand it over, the state can store 
it.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>these
-    conversations was unacceptable by itself.&lt;/p&gt;</em></ins></span>
+      Section 2, paragraphs b</strong></del></span> <span 
class="inserted"><ins><em>FBI could listen to these
+    conversations was unacceptable by itself.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201612060"&gt;
+    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla</em></ins></span> 
and <span class="removed"><del><strong>c.&lt;/a&gt;). The</strong></del></span> 
<span class="inserted"><ins><em>i-Que transmit &lt;a
+    
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
+    conversations to Nuance Communications&lt;/a&gt;, a speech 
recognition</em></ins></span>
+    company <span class="removed"><del><strong>says it doesn't
+      store this information, but if</strong></del></span> <span 
class="inserted"><ins><em>based in</em></ins></span> the <span 
class="removed"><del><strong>state orders it to get</strong></del></span> <span 
class="inserted"><ins><em>U.S.&lt;/p&gt;
+
+    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
+    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>toys with a mobile phone. This would enable
+    crackers to listen in on a child's speech,</em></ins></span> and <span 
class="removed"><del><strong>hand it over,</strong></del></span> <span 
class="inserted"><ins><em>even speak into</em></ins></span> the <span 
class="removed"><del><strong>state can store it.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>toys 
themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 
 
 &lt;!-- #SpywareAtHome --&gt;
-&lt;!-- WEBMASTERS: make sure to place new items on top under each subsection 
--&gt;
+&lt;!-- WEBMASTERS: make sure</strong></del></span>
 
-&lt;div class="big-section"&gt;
-  &lt;h3 id="SpywareAtHome"&gt;Spyware at Home&lt;/h3&gt;
-  &lt;span class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
+    &lt;p&gt;Barbie &lt;a
+    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
+    going</em></ins></span> to <span class="removed"><del><strong>place new 
items</strong></del></span> <span 
class="inserted"><ins><em>spy</em></ins></span> on <span 
class="removed"><del><strong>top under each subsection 
--&gt;</strong></del></span> <span class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
+
+&lt;div <span class="removed"><del><strong>class="big-section"&gt;
+  &lt;h3 id="SpywareAtHome"&gt;Spyware at 
Home&lt;/h3&gt;</strong></del></span> <span 
class="inserted"><ins><em>class="big-subsection"&gt;
+  &lt;h4 id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
+  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
-&lt;div style="clear: left;"&gt;&lt;/div&gt;
+<span class="removed"><del><strong>&lt;div style="clear: left;"&gt;&lt;/div&gt;
 
 &lt;ul&gt;
   &lt;li&gt;&lt;p&gt;Nest thermometers
-  send</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201612060"&gt;
-    &lt;p&gt;The &ldquo;smart&rdquo; toys My Friend Cayla and i-Que 
transmit</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
-  lot of data about</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws"&gt;children's
-    conversations to Nuance Communications&lt;/a&gt;, a speech recognition
-    company based in the U.S.&lt;/p&gt;
-
-    &lt;p&gt;Those toys also contain major security vulnerabilities; crackers
-    can remotely control</em></ins></span> the <span 
class="removed"><del><strong>user&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
-    crackers to listen in on a child's speech, and even speak into the
-    toys themselves.&lt;/p&gt;</em></ins></span>
+  send &lt;a href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a
+  lot of data about the user&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm"&gt;
       Rent-to-own computers were programmed</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
-    &lt;p&gt;Barbie &lt;a
-    
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
-    going</em></ins></span> to spy on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>children and 
adults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using a DJI drone</em></ins></span>
+    to <span class="removed"><del><strong>spy</strong></del></span> <span 
class="inserted"><ins><em>snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
+    on <span class="removed"><del><strong>their 
renters&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
 &lt;div class="big-subsection"&gt;
-  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareInDrones"&gt;Drones&lt;/h4&gt;</em></ins></span>
-  &lt;span class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareInDrones"&gt;#SpywareInDrones&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
+  &lt;h4 <span class="removed"><del><strong>id="SpywareInTVSets"&gt;Spyware in 
TV Sets&lt;/h4&gt;
+  &lt;span</strong></del></span> <span 
class="inserted"><ins><em>id="SpywareAtHome"&gt;Other 
Appliances&lt;/h4&gt;&lt;span</em></ins></span> 
class="anchor-reference-id"&gt;(&lt;a <span 
class="removed"><del><strong>href="#SpywareInTVSets"&gt;#SpywareInTVSets&lt;/a&gt;)&lt;/span&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;</em></ins></span>
 &lt;/div&gt;
 
-<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day</strong></del></span>
+<span class="removed"><del><strong>&lt;p&gt;Emo Phillips made a joke: The 
other day a woman came up</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;ul class="blurbs"&gt;
-  &lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>woman came up</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>me and
-said, &ldquo;Didn't I see you</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>television?&rdquo; I said, &ldquo;I
-don't know. You can't see out the</strong></del></span> other <span 
class="removed"><del><strong>way.&rdquo; Evidently that was
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands</em></ins></span> to <span 
class="removed"><del><strong>me and
+said, &ldquo;Didn't I see you on television?&rdquo; I said, &ldquo;I
+don't know. You can't see out</strong></del></span> the <span 
class="removed"><del><strong>other way.&rdquo; Evidently that was
 before Amazon &ldquo;smart&rdquo; TVs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
     &lt;p&gt;Vizio
-    &ldquo;smart&rdquo; &lt;a 
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
-    report everything that</strong></del></span> <span 
class="inserted"><ins><em>people, DJI</em></ins></span> is <span 
class="removed"><del><strong>viewed</strong></del></span> <span 
class="inserted"><ins><em>in many cases &lt;a
-    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping</em></ins></span>
-    on <span class="removed"><del><strong>them, and not just broadcasts
-    and cable&lt;/a&gt;. Even if</strong></del></span> <span 
class="inserted"><ins><em>you&lt;/a&gt;.&lt;/p&gt;
+    &ldquo;smart&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>Alexa service are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;TVs
+    report everything that is viewed on them,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The 
Google</em></ins></span> and <span class="removed"><del><strong>not just 
broadcasts</strong></del></span> <span class="inserted"><ins><em>Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location</em></ins></span> and <span 
class="removed"><del><strong>cable&lt;/a&gt;. Even if</strong></del></span> 
<span class="inserted"><ins><em>other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since</em></ins></span> the <span 
class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>client program</em></ins></span> is <span 
class="removed"><del><strong>coming from the user's own
+    computer,</strong></del></span> <span class="inserted"><ins><em>nonfree, 
and data processing is done
+    &ldquo;&lt;a 
href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in</em></ins></span>
+    the <span class="removed"><del><strong>TV reports what it is. The 
existence</strong></del></span> <span 
class="inserted"><ins><em>cloud&lt;/a&gt;&rdquo; (a soothing 
way</em></ins></span> of <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no</em></ins></span> 
way
+    to
+    <span class="removed"><del><strong>disable</strong></del></span> <span 
class="inserted"><ins><em>know what happens to</em></ins></span> the <span 
class="removed"><del><strong>surveillance, even if it</strong></del></span> 
<span class="inserted"><ins><em>recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-&lt;/ul&gt;
 
-
-&lt;div class="big-subsection"&gt;
-  &lt;h4 id="SpywareAtHome"&gt;Other Appliances&lt;/h4&gt;&lt;span 
class="anchor-reference-id"&gt;(&lt;a 
href="#SpywareAtHome"&gt;#SpywareAtHome&lt;/a&gt;)&lt;/span&gt;
-&lt;/div&gt;
-
-&lt;ul class="blurbs"&gt;
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
     &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>image</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>coming from</strong></del></span> <span 
class="inserted"><ins><em>still
-    paying for</em></ins></span> the <span class="removed"><del><strong>user's 
own
-    computer,</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
-    paid for.&lt;/p&gt;
+    communicates with HP servers&lt;/a&gt; to make sure the user is still
+    paying for the subscription, and hasn't printed more pages 
than</em></ins></span> were <span class="removed"><del><strong>not hidden 
as</strong></del></span>
+    <span class="inserted"><ins><em>paid for.&lt;/p&gt;
 
-    &lt;p&gt;Even though</em></ins></span> the <span 
class="removed"><del><strong>TV reports what</strong></del></span> <span 
class="inserted"><ins><em>ink subscription program may be cheaper in some
-    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>is. The existence</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
-    restrictions in the use</em></ins></span> of <span 
class="inserted"><ins><em>ink cartridges that would otherwise be in
-    working order.&lt;/p&gt;
+    &lt;p&gt;Even though the ink subscription program may be cheaper in some
+    specific cases,</em></ins></span> it <span 
class="removed"><del><strong>was</strong></del></span> <span 
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+    restrictions</em></ins></span> in
+    <span class="removed"><del><strong>these TVs, does not 
legitimize</strong></del></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+    working order.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found</em></ins></span> a way to
-    <span class="removed"><del><strong>disable the surveillance, even if it 
were not hidden as it was in
-    these TVs, does not legitimize</strong></del></span> <span 
class="inserted"><ins><em>break</em></ins></span> the <span 
class="removed"><del><strong>surveillance.&lt;/p&gt;
-  &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;More or less all 
&ldquo;smart&rdquo; TVs</strong></del></span>
 
-  &lt;li&gt;&lt;p&gt;More or less all &ldquo;smart&rdquo; 
TVs</strong></del></span> <span class="inserted"><ins><em>security of an Amazon 
device,
+  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers found a way to break the security of an Amazon device,
     and</em></ins></span> &lt;a
 <span 
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/"&gt;spy
   on their users&lt;/a&gt;.&lt;/p&gt;
@@ -3142,7 +3165,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:38 $
+$Date: 2019/04/27 19:30:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.296
retrieving revision 1.297
diff -u -b -r1.296 -r1.297
--- proprietary-surveillance.it.po      26 Apr 2019 12:00:39 -0000      1.296
+++ proprietary-surveillance.it.po      27 Apr 2019 19:30:04 -0000      1.297
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:19+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -3756,6 +3756,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary-surveillance.ja-diff.html       26 Apr 2019 12:00:39 -0000      
1.145
+++ proprietary-surveillance.ja-diff.html       27 Apr 2019 19:30:04 -0000      
1.146
@@ -2406,6 +2406,25 @@
 &lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902080"&gt;
     &lt;p&gt;The HP &lt;a
     href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
@@ -3013,7 +3032,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:39 $
+$Date: 2019/04/27 19:30:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- proprietary-surveillance.ja.po      26 Apr 2019 12:00:39 -0000      1.269
+++ proprietary-surveillance.ja.po      27 Apr 2019 19:30:04 -0000      1.270
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:16+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -3167,6 +3167,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-surveillance.pot        26 Apr 2019 12:00:48 -0000      1.217
+++ proprietary-surveillance.pot        27 Apr 2019 19:30:04 -0000      1.218
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -2299,6 +2299,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a "
+"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\";>
 "
+"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
+"assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a "
+"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\";>
 "
+"location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
+"cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
+"where it's done&rdquo;), users have no way to know what happens to the "
+"recordings unless human eavesdroppers <a "
+"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\";>
 "
+"break their non-disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.514
retrieving revision 1.515
diff -u -b -r1.514 -r1.515
--- proprietary-surveillance.ru.po      26 Apr 2019 12:32:44 -0000      1.514
+++ proprietary-surveillance.ru.po      27 Apr 2019 19:30:04 -0000      1.515
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2019-02-03 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -3329,6 +3330,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\";> "
 "&ldquo;ink subscription&rdquo; cartridges have DRM that constantly "
 "communicates with HP servers</a> to make sure the user is still paying for "

Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary.de-diff.html    26 Apr 2019 12:00:49 -0000      1.88
+++ proprietary.de-diff.html    27 Apr 2019 19:30:04 -0000      1.89
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -101,17 +101,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
@@ -125,10 +125,10 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
@@ -254,15 +273,6 @@
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -323,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.de.po   26 Apr 2019 12:00:49 -0000      1.130
+++ proprietary.de.po   27 Apr 2019 19:30:04 -0000      1.131
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -431,6 +431,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -542,19 +568,6 @@
 "prison\"> sued over this fraud</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary.es.po   27 Apr 2019 11:54:55 -0000      1.156
+++ proprietary.es.po   27 Apr 2019 19:30:04 -0000      1.157
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 "X-Generator: Poedit 1.8.11\n"
 
@@ -298,6 +299,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -437,24 +464,6 @@
 "theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-"
 "years-in-prison\">encausados por este fraude</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google rastrea los movimientos de los teléfonos Android, y a veces <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\">guarda los datos durante años</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Un software privativo presente en el teléfono debe de ser el responsable de "
-"enviar los datos de localización a Google."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -534,6 +543,22 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google rastrea los movimientos de los teléfonos Android, y a veces <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\">guarda los datos durante años</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "Un software privativo presente en el teléfono debe de ser el responsable "
+#~ "de enviar los datos de localización a Google."
+
+#~ msgid ""
 #~ "An Android phone was observed to track location even while in airplane "
 #~ "mode. It didn't send the location data while in airplane mode.  Instead, "
 #~ "<a href=\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-";

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.fr.po   26 Apr 2019 17:26:15 -0000      1.194
+++ proprietary.fr.po   27 Apr 2019 19:30:04 -0000      1.195
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2019-04-26 19:25+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -294,6 +295,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -435,24 +462,6 @@
 "com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
 "prison\">poursuivis pour cette fraude</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google piste les téléphones Android et <a href=\"https://www.nytimes.com/";
-"interactive/2019/04/13/us/google-location-tracking-police.html\">sauvegarde "
-"les données, parfois pendant des années</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Ce doit être un logiciel non libre présent dans le téléphone qui envoie 
ces "
-"données à Google."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -526,3 +535,19 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google piste les téléphones Android et <a 
href=\"https://www.nytimes.com/";
+#~ "interactive/2019/04/13/us/google-location-tracking-police.html"
+#~ "\">sauvegarde les données, parfois pendant des années</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "Ce doit être un logiciel non libre présent dans le téléphone qui 
envoie "
+#~ "ces données à Google."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.it-diff.html    26 Apr 2019 12:00:49 -0000      1.100
+++ proprietary.it-diff.html    27 Apr 2019 19:30:04 -0000      1.101
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,17 +101,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
@@ -184,6 +184,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
@@ -253,15 +272,6 @@
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -322,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:04 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.it.po   26 Apr 2019 12:00:49 -0000      1.139
+++ proprietary.it.po   27 Apr 2019 19:30:05 -0000      1.140
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -519,19 +545,6 @@
 "prison\"> sued over this fraud</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary.ja-diff.html    26 Apr 2019 12:00:49 -0000      1.101
+++ proprietary.ja-diff.html    27 Apr 2019 19:30:05 -0000      1.102
@@ -157,10 +157,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -181,6 +181,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
@@ -250,15 +269,6 @@
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -319,7 +329,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.ja.po   26 Apr 2019 12:00:49 -0000      1.122
+++ proprietary.ja.po   27 Apr 2019 19:30:05 -0000      1.123
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -452,19 +478,6 @@
 "prison\"> sued over this fraud</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- proprietary.nl-diff.html    26 Apr 2019 12:00:49 -0000      1.100
+++ proprietary.nl-diff.html    27 Apr 2019 19:30:05 -0000      1.101
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -45,14 +45,14 @@
 <span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC { width: 55em; }
-&lt;/style&gt;</em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,18 +101,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
@@ -184,6 +184,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
@@ -253,15 +272,6 @@
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -322,7 +332,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.nl.po   26 Apr 2019 12:00:49 -0000      1.111
+++ proprietary.nl.po   27 Apr 2019 19:30:05 -0000      1.112
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -512,19 +538,6 @@
 "prison\"> sued over this fraud</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary.pl-diff.html    26 Apr 2019 12:00:49 -0000      1.118
+++ proprietary.pl-diff.html    27 Apr 2019 19:30:05 -0000      1.119
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -89,8 +89,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>April, 2019, the pages in this directory list 
around 400
-instances of malicious functionalities (with more than 450 references to
+&lt;p&gt;As of April, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 450 
references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -132,11 +132,11 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -158,10 +158,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -182,6 +182,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
@@ -251,15 +270,6 @@
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -320,7 +330,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.pl.po   26 Apr 2019 12:00:49 -0000      1.106
+++ proprietary.pl.po   27 Apr 2019 19:30:05 -0000      1.107
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -594,19 +620,6 @@
 "prison\"> sued over this fraud</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary.pot     26 Apr 2019 12:00:49 -0000      1.103
+++ proprietary.pot     27 Apr 2019 19:30:05 -0000      1.104
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a "
+"href=\"https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html\";>
 "
+"recorded for Amazon employees to listen to</a>. The Google and Apple voice "
+"assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a "
+"href=\"https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788\";>
 "
+"location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the "
+"cloud</a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and "
+"where it's done&rdquo;), users have no way to know what happens to the "
+"recordings unless human eavesdroppers <a "
+"href=\"https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\";>
 "
+"break their non-disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a "
 
"href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk\";>no
 "
 "longer possible to disable an unscrupulous tracking anti-feature</a> that <a "
@@ -329,19 +355,6 @@
 "sued over this fraud</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a "
-"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\";>
 "
-"saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary.pt-br.po        26 Apr 2019 13:28:45 -0000      1.153
+++ proprietary.pt-br.po        27 Apr 2019 19:30:05 -0000      1.154
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2019-04-26 10:08-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -292,6 +293,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -428,24 +455,6 @@
 "com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
 "prison\"> processados por esta fraude</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"O Google acompanha os movimentos de telefones Android e, às vezes, <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> salva os dados de anos</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"Software não livre no telefone tem que ser responsável por enviar os dados "
-"de localização para o Google."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -521,6 +530,22 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "O Google acompanha os movimentos de telefones Android e, às vezes, <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> salva os dados de anos</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "Software não livre no telefone tem que ser responsável por enviar os "
+#~ "dados de localização para o Google."
+
+#~ msgid ""
 #~ "This has harmful implications for women's rights to equal employment and "
 #~ "freedom to make their own pregnancy choices. Don't use these apps, even "
 #~ "if someone offers you a reward to do so."

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.230
retrieving revision 1.231
diff -u -b -r1.230 -r1.231
--- proprietary.ru.po   26 Apr 2019 12:32:44 -0000      1.230
+++ proprietary.ru.po   27 Apr 2019 19:30:05 -0000      1.231
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-27 19:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -437,23 +464,6 @@
 "business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"
 "\"> отдали под суд за это мошенничество</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-"Google отслеживает перемещения телефонов на 
базе Android, и иногда <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> хранит эти данные годами</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-"За отсылку данных в Google в телефоне должны 
отвечать несвободные программы."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -533,6 +543,22 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Google tracks the movements of Android phones, and sometimes <a href="
+#~ "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> saves the data for years</a>."
+#~ msgstr ""
+#~ "Google отслеживает перемещения телефонов 
на базе Android, и иногда <a "
+#~ "href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-";
+#~ "tracking-police.html\"> хранит эти данные годами</a>."
+
+#~ msgid ""
+#~ "Nonfree software in the phone has to be responsible for sending the "
+#~ "location data to Google."
+#~ msgstr ""
+#~ "За отсылку данных в Google в телефоне 
должны отвечать несвободные "
+#~ "программы."
+
+#~ msgid ""
 #~ "This has harmful implications for women's rights to equal employment and "
 #~ "freedom to make their own pregnancy choices. Don't use these apps, even "
 #~ "if someone offers you a reward to do so."

Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.zh-tw-diff.html 26 Apr 2019 12:00:49 -0000      1.78
+++ proprietary.zh-tw-diff.html 27 Apr 2019 19:30:05 -0000      1.79
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
-   <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -101,17 +101,17 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
@@ -125,10 +125,10 @@
   <span class="inserted"><ins><em>&lt;/td&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
@@ -185,6 +185,25 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904240"&gt;
+    &lt;p&gt;Some of users' commands to the Alexa service are &lt;a
+    
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html"&gt;
+    recorded for Amazon employees to listen to&lt;/a&gt;. The Google and Apple
+    voice assistants do similar things.&lt;/p&gt;
+
+    &lt;p&gt;A fraction of the Alexa service staff even has access to &lt;a
+    
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788"&gt;
+    location and other personal data&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Since the client program is nonfree, and data processing is done
+    &ldquo;&lt;a href="/philosophy/words-to-avoid.html#CloudComputing"&gt;in
+    the cloud&lt;/a&gt;&rdquo; (a soothing way of saying &ldquo;We won't
+    tell you how and where it's done&rdquo;), users have no way
+    to know what happens to the recordings unless human eavesdroppers &lt;a
+    
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033"&gt;
+    break their non-disclosure agreements&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904210"&gt;
     &lt;p&gt;As of April 2019, it is &lt;a
     
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"&gt;no
@@ -254,15 +273,6 @@
     
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904130"&gt;
-    &lt;p&gt;Google tracks the movements of Android phones, and sometimes &lt;a
-    
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html"&gt;
-    saves the data for years&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Nonfree software in the phone has to be responsible for sending
-    the location data to Google.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -323,7 +333,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/26 12:00:49 $
+$Date: 2019/04/27 19:30:05 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.zh-tw.po        26 Apr 2019 12:00:49 -0000      1.89
+++ proprietary.zh-tw.po        27 Apr 2019 19:30:05 -0000      1.90
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-26 11:56+0000\n"
+"POT-Creation-Date: 2019-04-27 19:26+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/";
 "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
 "\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
@@ -428,19 +454,6 @@
 "prison\"> sued over this fraud</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google tracks the movements of Android phones, and sometimes <a href="
-"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-";
-"police.html\"> saves the data for years</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Nonfree software in the phone has to be responsible for sending the location "
-"data to Google."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- pt-br.po    26 Apr 2019 13:28:45 -0000      1.103
+++ pt-br.po    27 Apr 2019 19:30:05 -0000      1.104
@@ -334,6 +334,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- ru.po       26 Apr 2019 12:25:26 -0000      1.172
+++ ru.po       27 Apr 2019 19:30:05 -0000      1.173
@@ -432,6 +432,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."
@@ -6172,16 +6198,15 @@
 "www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
 "app-podcast\"> a new one is being developed</a>."
 msgstr ""
-"Это приводит к вредным последствиям для 
прав женщин на равные условия "
-"труда и свободу принимать решения о 
собственной береманности. Не "
+"Это приводит к вредным последствиям для 
прав женщин на равные условия труда "
+"и свободу принимать решения о собственной 
береманности. Не пользуйтесь этими "
+"приложениями, даже если кто-то предлагает 
вам за это вознаграждение. Не "
 "пользуйтесь этими приложениями, даже если 
кто-то предлагает вам за это "
-"вознаграждение. Не пользуйтесь этими "
-"приложениями, даже если кто-то предлагает 
вам за это вознаграждение. "
-"Свободное приложение, которое выполняет 
более или менее ту же работу, не "
-"шпионя за вами, можно получить на <a href="
-"\"https://search.f-droid.org/?q=menstr\";>F-Droid</a>, и <a href=\"https://";
-"www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-"
-"app-podcast\"> разрабатывается новая 
программа</a>."
+"вознаграждение. Свободное приложение, 
которое выполняет более или менее ту "
+"же работу, не шпионя за вами, можно 
получить на <a href=\"https://search.f-";
+"droid.org/?q=menstr\">F-Droid</a>, и <a href=\"https://www.bloomberg.com/";
+"news/audio/2019-04-10/building-a-better-period-tracking-app-podcast\"> "
+"разрабатывается новая программа</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- zh-tw.po    26 Apr 2019 12:00:49 -0000      1.79
+++ zh-tw.po    27 Apr 2019 19:30:05 -0000      1.80
@@ -334,6 +334,32 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Some of users' commands to the Alexa service are <a href=\"https://www.smh.";
+"com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-"
+"is-20190411-p51d4g.html\"> recorded for Amazon employees to listen to</a>. "
+"The Google and Apple voice assistants do similar things."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A fraction of the Alexa service staff even has access to <a href=\"https://";
+"www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-"
+"addresses-1.1248788\"> location and other personal data</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Since the client program is nonfree, and data processing is done &ldquo;<a "
+"href=\"/philosophy/words-to-avoid.html#CloudComputing\">in the cloud</"
+"a>&rdquo; (a soothing way of saying &ldquo;We won't tell you how and where "
+"it's done&rdquo;), users have no way to know what happens to the recordings "
+"unless human eavesdroppers <a href=\"https://www.bnnbloomberg.ca/three-";
+"cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> break their non-"
+"disclosure agreements</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Crackers found a way to break the security of an Amazon device, and <a href="
 "\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\";> turn it into a "
 "listening device</a> for them."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]