www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/po/patent-reform-is-not-enough.c...


From: GNUN
Subject: www philosophy/po/patent-reform-is-not-enough.c...
Date: Wed, 8 May 2019 11:01:40 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/05/08 11:01:38

Modified files:
        philosophy/po  : patent-reform-is-not-enough.ca.po 
        proprietary    : proprietary-deception.es.html 
                         proprietary-deception.fr.html 
                         proprietary-deception.ru.html 
                         proprietary-manipulation.html 
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-apple.de-diff.html malware-apple.de.po 
                         malware-apple.es.po malware-apple.fr.po 
                         malware-apple.it-diff.html malware-apple.it.po 
                         malware-apple.ja-diff.html malware-apple.ja.po 
                         malware-apple.nl-diff.html malware-apple.nl.po 
                         malware-apple.pot malware-apple.ru.po 
                         malware-appliances.de-diff.html 
                         malware-appliances.de.po 
                         malware-appliances.fr.po malware-appliances.pot 
                         malware-appliances.ru.po nl.po pl.po pot 
                         proprietary-deception.de-diff.html 
                         proprietary-deception.de.po 
                         proprietary-deception.es-en.html 
                         proprietary-deception.es.po 
                         proprietary-deception.fr-en.html 
                         proprietary-deception.fr.po 
                         proprietary-deception.ja-diff.html 
                         proprietary-deception.ja.po 
                         proprietary-deception.pot 
                         proprietary-deception.ru-en.html 
                         proprietary-deception.ru.po 
                         proprietary-tethers.de-diff.html 
                         proprietary-tethers.de.po 
                         proprietary-tethers.fr.po 
                         proprietary-tethers.ja-diff.html 
                         proprietary-tethers.ja.po 
                         proprietary-tethers.pot 
                         proprietary-tethers.ru.po 
                         proprietary.de-diff.html proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw-diff.html 
                         proprietary.zh-tw.po pt-br.po ru.po zh-tw.po 
Added files:
        proprietary/po : proprietary-manipulation.pot 
                         proprietary-manipulation.translist 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/patent-reform-is-not-enough.ca.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.es.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.fr.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.ru.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-manipulation.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr-en.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru-en.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.199&r2=1.200
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.pot?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-manipulation.translist?cvsroot=www&rev=1.1

Patches:
Index: philosophy/po/patent-reform-is-not-enough.ca.po
===================================================================
RCS file: /web/www/www/philosophy/po/patent-reform-is-not-enough.ca.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- philosophy/po/patent-reform-is-not-enough.ca.po     23 Mar 2019 11:39:10 
-0000      1.24
+++ philosophy/po/patent-reform-is-not-enough.ca.po     8 May 2019 15:01:35 
-0000       1.25
@@ -219,6 +219,11 @@
 #. this
 #. petition</a> for a Europe free of software patents, and 
 #. type: Content of: <p>
+# | There is a massive effort in Europe to stop software patents.  Please
+# | [-support <a href=\"http://stopsoftwarepatents.eu/\";>this petition</a> for
+# | a Europe free of software patents, and-] see <a
+# | href=\"http://www.ffii.org\";> the FFII web site</a> for full details of
+# | how you can help.
 #, fuzzy
 #| msgid ""
 #| "There is a massive effort in Europe to stop software patents.  Please "
@@ -282,6 +287,8 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
+# | Copyright &copy; 1996, 1997, 1998, 2001, [-2008-] {+2008, 2019+} Free
+# | Software Foundation, Inc.
 #, fuzzy
 #| msgid ""
 #| "Copyright &copy; 1996, 1997, 1998, 2001, 2008 Free Software Foundation, "
@@ -293,6 +300,11 @@
 "Copyright &copy; 1996, 1997, 1998, 2001, 2008 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
+# | This page is licensed under a <a rel=\"license\"
+# | [-href=\"http://creativecommons.org/licenses/by-nd/3.0/us/\";>Creative-]
+# | {+href=\"http://creativecommons.org/licenses/by-nd/4.0/\";>Creative+}
+# | Commons [-Attribution-NoDerivs 3.0 United States-]
+# | {+Attribution-NoDerivatives 4.0 International+} License</a>.
 #, fuzzy
 #| msgid ""
 #| "This page is licensed under a <a rel=\"license\" href=\"http://";

Index: proprietary/proprietary-deception.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.es.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/proprietary-deception.es.html   27 Apr 2019 12:00:18 -0000      
1.3
+++ proprietary/proprietary-deception.es.html   8 May 2019 15:01:36 -0000       
1.4
@@ -117,17 +117,6 @@
 sus credenciales</a>, utilizarlas para hacerse publicidad en la fuente de
 noticias y publicar imágenes de los usuarios sin su consentimiento.</p>
   </li>
-
-  <li id="M201308290">
-    <p>Los «<cite>Dark Patterns</cite>» o «diseños oscuros» son <a
-href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>interfaces
-de usuario diseñadas para confundir a los usuarios, o hacer que las opciones
-de configuración sean difíciles de encontrar</a>.</p>
-
-    <p>Esto hace que una compañía como Apple pueda decir: «Nosotros 
permitimos a
-los usuarios desactivar esto», y al mismo tiempo se asegura de que solo unos
-pocos entiendan cómo hacerlo.</p>
-  </li>
 </ul>
 
 
@@ -206,7 +195,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2019/04/27 12:00:18 $
+$Date: 2019/05/08 15:01:36 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-deception.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.fr.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/proprietary-deception.fr.html   20 Apr 2019 18:30:28 -0000      
1.30
+++ proprietary/proprietary-deception.fr.html   8 May 2019 15:01:36 -0000       
1.31
@@ -118,17 +118,6 @@
 publicité sur leur flux et mettre des photos en ligne sans leur
 consentement.</p>
   </li>
-
-  <li id="M201308290">
-    <p>Les <cite>Dark Patterns</cite> sont <a
-href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>des
-interfaces web conçues pour piéger les utilisateurs ou rendre certains
-réglages difficiles à trouver</a>.</p>
-
-    <p>Cela permet à une société comme Apple de dire « Nous permettons aux
-utilisateurs d'inactiver ceci » tout en s'assurant que peu d'entre eux
-comprendront comment le faire.</p>
-  </li>
 </ul>
 
 
@@ -207,7 +196,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2019/04/20 18:30:28 $
+$Date: 2019/05/08 15:01:36 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-deception.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.ru.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/proprietary-deception.ru.html   22 Apr 2019 08:59:52 -0000      
1.29
+++ proprietary/proprietary-deception.ru.html   8 May 2019 15:01:36 -0000       
1.30
@@ -115,17 +115,6 @@
 воровала их пароли</a>, рекламировала себя 
на их лентах новостей и размещала
 изображения без согласия пользователей.</p>
   </li>
-
-  <li id="M201308290">
-    <p>&ldquo;Темные тактики&rdquo; представляют <a
-href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>элементы
-интерфейса пользователя, 
спроектированные так, чтобы вводить 
пользователей в
-заблуждение или затруднить нахождение 
настроек</a>.</p>
-
-    <p>Это позволяет таким компаниям как Apple 
заявлять: &ldquo;Мы позволяем
-пользователям отключить это&rdquo;, 
гарантируя в то же время, что мало кто
-поймет, как же это отключить.</p>
-  </li>
 </ul>
 
 
@@ -205,7 +194,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2019/04/22 08:59:52 $
+$Date: 2019/05/08 15:01:36 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-manipulation.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-manipulation.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/proprietary-manipulation.html   8 May 2019 14:38:33 -0000       
1.1
+++ proprietary/proprietary-manipulation.html   8 May 2019 15:01:36 -0000       
1.2
@@ -1,8 +1,8 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: $Revision: 1.1 $ -->
+<!-- Parent-Version: $Revision: 1.2 $ -->
 <title>Proprietary Manipulation
 - GNU Project - Free Software Foundation</title>
-<!--#include virtual="/server/gnun/initial-translations-list.html" -->
+ <!--#include virtual="/proprietary/po/proprietary-manipulation.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Manipulation</h2>
 
@@ -111,7 +111,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/05/08 14:38:33 $
+$Date: 2019/05/08 15:01:36 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/de.po        8 May 2019 12:31:39 -0000       1.82
+++ proprietary/po/de.po        8 May 2019 15:01:36 -0000       1.83
@@ -721,10 +721,6 @@
 msgid "<a href=\"#censorship\">Censorship</a>"
 msgstr "<a href=\"#censorship\">Zensur</a>"
 
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Täuschung</a>"
-
 # | <a href=\"#drm\">Digital restrictions management</a> or
 # | [-&ldquo;DRM&rdquo; means functionalities-]
 # | {+&ldquo;DRM&rdquo;&mdash;functionalities+} designed to restrict what
@@ -760,6 +756,14 @@
 "<a href=\"#jails\">Gefängnisse</a><br />&#8209;&#160;Systeme, die "
 "Anwendungsprogrammen Zensur auferlegen."
 
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Täuschung</a>"
+
 #. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Unter Druck setzend</a>"
@@ -871,35 +875,6 @@
 "Informationen siehe den Abschnitt <a href=\"#jails\">Gefängnisse</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Täuschung"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"„Dunkle Muster“ sind Bedieneroberflächen, entworfen, Benutzer <a 
href=\"//"
-"www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
-"designed-to-trick-you\" title=\" Harry Brignull, Dark Patterns: inside the "
-"interfaces designed to trick you, unter: The Verge, theverge.com 2013.\">in "
-"die Irre zu führen oder Einstellungsmöglichkeiten schwer auffindbar</a> zu "
-"machen."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Dies erlaubt einem Unternehmen wie Apple zu sagen, <em>„Wir ermöglichen "
-"Nutzern dies deaktivieren zu können“</em>, während gleichzeitig "
-"sichergestellt wird, dass nur wenige verstehen werden, wie man es "
-"tatsächlich deaktiviert."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "DRM"
 
@@ -1378,6 +1353,38 @@
 "Apple Accepts App That Tracks U.S. Drone Strikes, Mashable 2014.\">aufgrund "
 "der App selbst zensiert</a> wurde."
 
+# | Apple [-Deception-] {+Manipulation+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Täuschung"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"„Dunkle Muster“ sind Bedieneroberflächen, entworfen, Benutzer <a 
href=\"//"
+"www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
+"designed-to-trick-you\" title=\" Harry Brignull, Dark Patterns: inside the "
+"interfaces designed to trick you, unter: The Verge, theverge.com 2013.\">in "
+"die Irre zu führen oder Einstellungsmöglichkeiten schwer auffindbar</a> zu "
+"machen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Dies erlaubt einem Unternehmen wie Apple zu sagen, <em>„Wir ermöglichen "
+"Nutzern dies deaktivieren zu können“</em>, während gleichzeitig "
+"sichergestellt wird, dass nur wenige verstehen werden, wie man es "
+"tatsächlich deaktiviert."
+
 # Handlungszwang?
 #. type: Content of: <h3>
 msgid "Apple Pressuring"
@@ -2216,6 +2223,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -10585,6 +10606,14 @@
 "\"#f3\">3</a>)"
 msgstr "<a href=\"/proprietary/proprietary-sabotage\">Sabotage</a>"
 
+# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception\">Irreführung</a>"
+
 #. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage\">Sabotage</a>"
@@ -12143,6 +12172,12 @@
 "\">Tyrannische Software in Intel-Prozessoren eingebaut</a><a href=\"#tn01\" "
 "id=\"tn01-ref\" class=\"transnote\">[1]</a>."
 
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"#deception\">Täuschung</a>"
+
+#~ msgid "Apple Deception"
+#~ msgstr "Täuschung"
+
 #~ msgid ""
 #~ "<a href=\"http://www.scientificamerican.com/article/adobe-software-";
 #~ "subscription-model-means-you-cant-own-your-software/\"> Adobe tools "

Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/po/es.po        8 May 2019 12:31:41 -0000       1.109
+++ proprietary/po/es.po        8 May 2019 15:01:36 -0000       1.110
@@ -613,10 +613,6 @@
 msgstr "<a href=\"#censorship\">Censura</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Trampas</a>"
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo;"
 "&mdash;functionalities designed to restrict what users can do with the data "
@@ -642,6 +638,14 @@
 "<a href=\"#jails\">Prisiones</a>: Son sistemas que imponen la censura en los "
 "programas de aplicación."
 
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Trampas</a>"
+
 #. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Presiones</a>"
@@ -731,31 +735,6 @@
 "<a href=\"#jails\">Prisiones de Apple</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Trampas de Apple"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"«<cite>Dark patterns</cite>» se refiere a <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">interfaces de usuario que están diseñadas para engañar a los 
usuarios "
-"o hacer que sea difícil encontrar las opciones de configuración</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Esto hace que Apple pueda afirmar: «Los usuarios pueden deshabilitar esta "
-"opción», pero en realidad serán muy pocos los que puedan hacerlo."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "Gestión digital de restricciones en Apple"
 
@@ -1188,6 +1167,34 @@
 "mashable.com/2014/02/07/apple-app-tracks-drone-strikes/\">admitió que la "
 "estaba censurando debido al asunto del que trataba</a>."
 
+# | Apple [-Deception-] {+Manipulation+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Trampas"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"«<cite>Dark patterns</cite>» se refiere a <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">interfaces de usuario que están diseñadas para engañar a los 
usuarios "
+"o hacer que sea difícil encontrar las opciones de configuración</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Esto hace que Apple pueda afirmar: «Los usuarios pueden deshabilitar esta "
+"opción», pero en realidad serán muy pocos los que puedan hacerlo."
+
 #. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Presiones de Apple"
@@ -1802,6 +1809,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -8651,6 +8672,14 @@
 "<a href=\"/proprietary/proprietary-jails.html\">Prisiones</a>&nbsp;(<a href="
 "\"#f3\">3</a>)"
 
+# | <a [-href=\"/proprietary/proprietary-addictions.html\">Addictions</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-addictions.html\">Adicciones</a>"
+
 #. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotaje</a>"
@@ -9815,6 +9844,12 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";> Los "
 "procesadores Intel incorporarán software tirano</a>."
 
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"#deception\">Trampas</a>"
+
+#~ msgid "Apple Deception"
+#~ msgstr "Trampas de Apple"
+
 #~ msgid ""
 #~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/";
 #~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "

Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary/po/fr.po        8 May 2019 12:31:41 -0000       1.143
+++ proprietary/po/fr.po        8 May 2019 15:01:36 -0000       1.144
@@ -612,10 +612,6 @@
 msgstr "<a href=\"#censorship\">Censure</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Pratiques trompeuses</a>"
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo;"
 "&mdash;functionalities designed to restrict what users can do with the data "
@@ -642,6 +638,14 @@
 "<a href=\"#jails\">Prisons</a> – systèmes qui censurent les programmes "
 "d'application."
 
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Pratiques trompeuses</a>"
+
 #. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Pression sur le client</a>"
@@ -732,32 +736,6 @@
 "vous à la section <a href=\"#jails\">Prisons</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Pratiques trompeuses"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"Les <cite>Dark Patterns</cite> sont <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">des interfaces web conçues pour piéger les utilisateurs ou rendre "
-"certains réglages difficiles à trouver</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Cela permet à une société comme Apple de dire « Nous permettons aux "
-"utilisateurs d'inactiver ceci » tout en s'assurant que peu d'entre eux "
-"comprendront comment le faire."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "DRM"
 
@@ -1188,6 +1166,35 @@
 "com/2014/02/07/apple-app-tracks-drone-strikes/\">a admis que l'appli était "
 "censurée à cause de son thème</a>."
 
+# | Apple [-Deception-] {+Manipulation+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Pratiques trompeuses"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"Les <cite>Dark Patterns</cite> sont <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">des interfaces web conçues pour piéger les utilisateurs ou rendre "
+"certains réglages difficiles à trouver</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Cela permet à une société comme Apple de dire « Nous permettons aux "
+"utilisateurs d'inactiver ceci » tout en s'assurant que peu d'entre eux "
+"comprendront comment le faire."
+
 #. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Pression sur le client"
@@ -1772,6 +1779,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -8943,6 +8964,14 @@
 "<a href=\"/proprietary/proprietary-jails.html\">Prisons</a> (<a href="
 "\"#f3\">3</a>)"
 
+# | <a [-href=\"/proprietary/proprietary-addictions.html\">Addictions</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-addictions.html\">Addiction</a>"
+
 #. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
@@ -10236,3 +10265,9 @@
 msgstr ""
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>Les "
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"#deception\">Pratiques trompeuses</a>"
+
+#~ msgid "Apple Deception"
+#~ msgstr "Pratiques trompeuses"

Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/it.po        8 May 2019 12:31:42 -0000       1.82
+++ proprietary/po/it.po        8 May 2019 15:01:36 -0000       1.83
@@ -658,10 +658,6 @@
 msgid "<a href=\"#censorship\">Censorship</a>"
 msgstr "<a href=\"#censorship\">Censura</a>"
 
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Inganni</a>"
-
 # | <a href=\"#drm\">Digital restrictions management</a> or
 # | [-&ldquo;DRM&rdquo; means functionalities-]
 # | {+&ldquo;DRM&rdquo;&mdash;functionalities+} designed to restrict what
@@ -702,6 +698,14 @@
 "<a href=\"#jails\">Prigioni</a>&mdash;sistemi che impongono restrizioni alle "
 "applicazioni."
 
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Inganni</a>"
+
 #. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Pressioni</a>"
@@ -809,32 +813,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Inganni di Apple"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Dark patterns&rdquo; sono <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">interfacce che ingannano gli utenti</a> o rendono più difficile "
-"trovare le impostazioni."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Questo permette a un'azienda come Apple di dire che permette agli utenti di "
-"disattivare una certa funzione assicurandosi al contempo che pochi capiranno "
-"come farlo."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "DRM di Apple"
 
@@ -1388,6 +1366,35 @@
 "l'applicazione <a href=\"http://mashable.com/2014/02/07/apple-app-tracks-";
 "drone-strikes/\">solo per il tema di cui trattava</a>."
 
+# | Apple [-Deception-] {+Manipulation+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Inganni di Apple"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Dark patterns&rdquo; sono <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">interfacce che ingannano gli utenti</a> o rendono più difficile "
+"trovare le impostazioni."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Questo permette a un'azienda come Apple di dire che permette agli utenti di "
+"disattivare una certa funzione assicurandosi al contempo che pochi capiranno "
+"come farlo."
+
 #. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Pressioni di Apple"
@@ -2131,6 +2138,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -9834,6 +9855,14 @@
 "\"#f3\">3</a>)"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotaggio</a>"
 
+# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">Inganni</a>"
+
 #. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotaggio</a>"
@@ -11391,6 +11420,12 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>I "
 "processori Intel avranno del software tiranno preinstallato</a>."
 
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"#deception\">Inganni</a>"
+
+#~ msgid "Apple Deception"
+#~ msgstr "Inganni di Apple"
+
 # | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
 # | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
 # | {+functionalities (with more than 400 references to back them up),+} but

Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/ja.po        8 May 2019 12:31:42 -0000       1.82
+++ proprietary/po/ja.po        8 May 2019 15:01:36 -0000       1.83
@@ -609,10 +609,6 @@
 msgstr "<a href=\"#censorship\">検閲</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">欺き</a>"
-
-#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo; "
@@ -645,6 +641,12 @@
 "るシステム。"
 
 #. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">欺き</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">圧力</a>"
 
@@ -742,32 +744,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Appleの欺き"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Dark patterns&rdquo;は<a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">ユーザを混乱させる、もしくは理解するのが困難なように設計されたユーザイ"
-"ンタフェースです</a>。"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"これはAppleのような会社が「ユーザがオフにすることが可能です」と言うことを可能"
-"としつつ、実際にはほとんどのユーザがどのようにオフにするか理解しないことを保"
-"証します。"
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "AppleのDRM"
 
@@ -1201,6 +1177,34 @@
 "検閲していることを認めました</a>。"
 
 #. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Appleの欺き"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Dark patterns&rdquo;は<a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">ユーザを混乱させる、もしくは理解するのが困難なように設計されたユーザイ"
+"ンタフェースです</a>。"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"これはAppleのような会社が「ユーザがオフにすることが可能です」と言うことを可能"
+"としつつ、実際にはほとんどのユーザがどのようにオフにするか理解しないことを保"
+"証します。"
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Appleの圧力"
 
@@ -1818,6 +1822,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -8441,6 +8459,12 @@
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">妨害</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺き</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">妨害</a>"
 
@@ -9810,6 +9834,12 @@
 "<a 
href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>インテルの"
 
"プロセッサには暴君ソフトウェアが組み込まれるようになります</a>。"
 
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"#deception\">欺き</a>"
+
+#~ msgid "Apple Deception"
+#~ msgstr "Appleの欺き"
+
 #~ msgid ""
 #~ "<a href=\"http://www.scientificamerican.com/article/adobe-software-";
 #~ "subscription-model-means-you-cant-own-your-software/\"> Adobe tools "

Index: proprietary/po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/malware-apple.de-diff.html   13 Apr 2019 13:01:44 -0000      
1.32
+++ proprietary/po/malware-apple.de-diff.html   8 May 2019 15:01:36 -0000       
1.33
@@ -62,12 +62,12 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;!--</em></ins></span> &lt;li&gt;&lt;a 
<span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#incompatibility"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a 
href="#incompatibility"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt; 
--&gt;</em></ins></span>
   &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means 
functionalities</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM&rdquo;&mdash;functionalities</em></ins></span>
 designed
     to restrict what users can do with the data in their computers.&lt;/li&gt;
@@ -76,7 +76,8 @@
 &lt;!-- &lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt; --&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#manipulation"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
@@ -139,64 +140,50 @@
 through the Apple Store. Please refer to <span 
class="inserted"><ins><em>the</em></ins></span> &lt;a href="#jails"&gt;Apple 
Jails&lt;/a&gt;
 section for more information.&lt;/p&gt;
 
+
 &lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
 
 &lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
-  they do not count</strong></del></span> <span 
class="inserted"><ins><em>id="deception"&gt;Apple Deception&lt;/h3&gt;
+  they do not count as malware. We mention them to 
refute</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings hard
-    to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such</em></ins></span> as <span 
class="removed"><del><strong>malware. We mention them</strong></del></span> 
<span class="inserted"><ins><em>Apple</em></ins></span> to <span 
class="removed"><del><strong>refute the
-  supposition that prestigious proprietary software doesn't have grave
+  &lt;li id="M201704070.1"&gt;
+    &lt;p&gt;DRM makes</em></ins></span> the
+  <span class="removed"><del><strong>supposition that prestigious proprietary 
software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>say, &ldquo;We 
allow users</em></ins></span>
-    to <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses</strong></del></span> <span 
class="inserted"><ins><em>turn</em></ins></span> this <span 
class="removed"><del><strong>API</strong></del></span> <span 
class="inserted"><ins><em>off&rdquo; while ensuring that few will understand 
how</em></ins></span>
-    to <span class="removed"><del><strong>render
-    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>actually turn it 
off.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug in</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
-      app</strong></del></span> <span class="inserted"><ins><em>iPhone 7 
nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-        a malicious web site</strong></del></span>
+    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
+    to</strong></del></span> <span class="inserted"><ins><em>iPhone 7 
nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malicious code from any application which</strong></del></span>
     <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
     
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software</em></ins></span> to <span 
class="removed"><del><strong>extract all the user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>prevent 
people from charging an iThing
-    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
+    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;A bug</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on</em></ins></span> the <span class="removed"><del><strong>user's 
system. They are like sabotage, but they are not grave enough to 
qualify</strong></del></span> <span class="inserted"><ins><em>fact that a new 
model of Macbook introduced a
-    requirement</em></ins></span> for <span class="inserted"><ins><em>monitors 
to have malicious hardware, but DRM software
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
+      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that</em></ins></span> a <span 
class="removed"><del><strong>malicious web site</strong></del></span> <span 
class="inserted"><ins><em>new model of Macbook introduced a
+    requirement for monitors</em></ins></span> to <span 
class="removed"><del><strong>extract all the user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage,</strong></del></span> <span class="inserted"><ins><em>have 
malicious hardware,</em></ins></span> but <span 
class="removed"><del><strong>they are not grave enough to qualify 
+for</strong></del></span> <span class="inserted"><ins><em>DRM software
     in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty</strong></del></span> <span class="inserted"><ins><em>hardware. The 
software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
@@ -245,34 +232,34 @@
 
 &lt;h3 id="sabotage"&gt;Apple Sabotage&lt;/h3&gt;
 
-&lt;p&gt;These are situations in which Apple employs its power 
over</strong></del></span>
+&lt;p&gt;These are situations</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201802120"&gt;
-    &lt;p&gt;Apple devices lock</em></ins></span> users
-<span class="removed"><del><strong>to directly intervene</strong></del></span> 
in <span class="removed"><del><strong>ways that harm them or block their 
work.&lt;/p&gt;
+    &lt;p&gt;Apple devices lock users</em></ins></span> in <span 
class="removed"><del><strong>which</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+    solely to</em></ins></span> Apple <span 
class="removed"><del><strong>employs its power over users</strong></del></span> 
<span class="inserted"><ins><em>services&lt;/a&gt; by being 
designed</em></ins></span> to <span class="removed"><del><strong>directly 
intervene in ways that harm them</strong></del></span> <span 
class="inserted"><ins><em>be incompatible
+    with all other options, ethical</em></ins></span> or <span 
class="removed"><del><strong>block their work.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, 
and</strong></del></span> &lt;a
+    &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot 
drives,</strong></del></span> <span 
class="inserted"><ins><em>unethical.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605044"&gt;
+    &lt;p&gt;iWork (office software that runs on MacOS,
+    iOS and iCloud) uses secret formats</em></ins></span> and &lt;a
     <span 
class="removed"><del><strong>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html"&gt;
     changes the file system from HFS+</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-    solely to Apple services&lt;/a&gt; by being designed</em></ins></span> to 
<span class="removed"><del><strong>APFS&lt;/a&gt;, which 
cannot</strong></del></span> be <span class="removed"><del><strong>accessed
-    from GNU/Linux, Windows</strong></del></span> <span 
class="inserted"><ins><em>incompatible
-    with all other options, ethical</em></ins></span> or <span 
class="removed"><del><strong>even older versions of 
MacOS.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unethical.&lt;/p&gt;</em></ins></span>
+    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means of
+    converting them</em></ins></span> to <span 
class="removed"><del><strong>APFS&lt;/a&gt;, which cannot be accessed
+    from GNU/Linux, Windows</strong></del></span> or <span 
class="removed"><del><strong>even older versions of MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;Apple will stop</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605044"&gt;
-    &lt;p&gt;iWork (office software that runs on MacOS,
-    iOS and iCloud) uses secret formats and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
+  &lt;li&gt;
+    &lt;p&gt;Apple will stop &lt;a 
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
 bugs for older
     model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile, Apple stops people</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means of
-    converting them to or</em></ins></span> from <span 
class="removed"><del><strong>fixing problems themselves;
+    &lt;p&gt;Meanwhile, Apple stops people</strong></del></span> from <span 
class="removed"><del><strong>fixing problems themselves;
     that's</strong></del></span> <span class="inserted"><ins><em>Open Document 
Formats&lt;/a&gt;. iWork
     formats have changed several times since they were first
     introduced. This may have had</em></ins></span> the <span 
class="removed"><del><strong>nature</strong></del></span> <span 
class="inserted"><ins><em>effect</em></ins></span> of <span 
class="removed"><del><strong>proprietary software.&lt;/p&gt;
@@ -373,34 +360,33 @@
   &lt;li&gt;&lt;p&gt;Apple proposes
       &lt;a 
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen"&gt;a
 fingerprint-scanning touch screen&lt;/a&gt;
       &mdash; which would mean no way to use it without having your 
fingerprints
-      taken. Users would have no way to tell whether</strong></del></span> 
<span class="inserted"><ins><em>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up</em></ins></span> the 
<span class="removed"><del><strong>phone is snooping on
-      them.&lt;/p&gt;&lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
-      lots of personal data</strong></del></span> <span 
class="inserted"><ins><em>user's system. They are like sabotage, but they are 
not grave enough</em></ins></span> to <span 
class="removed"><del><strong>Apple's servers&lt;/a&gt;.  Big Brother can
-        get them from there.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells
-        a server every phone number that</strong></del></span> <span 
class="inserted"><ins><em>qualify 
-for</em></ins></span> the <span class="removed"><del><strong>user types into 
it&lt;/a&gt;;</strong></del></span> <span class="inserted"><ins><em>word 
&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This section 
describes examples of Apple committing
+      taken. Users would have no way</strong></del></span> <span 
class="inserted"><ins><em>id="interference"&gt;Apple Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough</em></ins></span> to <span 
class="removed"><del><strong>tell whether</strong></del></span> <span 
class="inserted"><ins><em>qualify 
+for</em></ins></span> the <span 
class="removed"><del><strong>phone</strong></del></span> <span 
class="inserted"><ins><em>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples of Apple committing
 interference.&lt;/p&gt; --&gt;
 
 
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system of</em></ins></span> the <span 
class="removed"><del><strong>server records these numbers for at least 30
+iOS, the operating system of the Apple iThings,</em></ins></span> is <span 
class="removed"><del><strong>snooping on
+      them.&lt;/p&gt;&lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;iPhones &lt;a 
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says"&gt;send
+      lots</strong></del></span> <span class="inserted"><ins><em>the 
prototype</em></ins></span>
+of <span class="removed"><del><strong>personal data to Apple's 
servers&lt;/a&gt;.  Big Brother can
+        get them from there.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;&lt;p&gt;The iMessage app on iThings &lt;a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/"&gt;tells</strong></del></span>
 a <span class="removed"><del><strong>server every phone 
number</strong></del></span> <span class="inserted"><ins><em>jail&lt;/a&gt;.  
It was Apple</em></ins></span> that <span 
class="inserted"><ins><em>introduced</em></ins></span> the <span 
class="removed"><del><strong>user types into it&lt;/a&gt;; the server records 
these numbers for at least 30
         days.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Users cannot make an</strong></del></span> Apple <span 
class="removed"><del><strong>ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving</strong></del></span> 
<span class="inserted"><ins><em>iThings, is the prototype
-of</em></ins></span> a <span class="removed"><del><strong>valid email address 
and receiving</strong></del></span> <span 
class="inserted"><ins><em>jail&lt;/a&gt;.  It was Apple that 
introduced</em></ins></span> the <span 
class="removed"><del><strong>verification</strong></del></span> <span 
class="inserted"><ins><em>practice of
+  &lt;li&gt;&lt;p&gt;Users cannot make</strong></del></span> <span 
class="inserted"><ins><em>practice of
 designing general purpose computers with censorship of application
 programs.&lt;/p&gt;
 
-&lt;p&gt;Here is an article about the &lt;a
+&lt;p&gt;Here is</em></ins></span> an <span class="removed"><del><strong>Apple 
ID (&lt;a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool"&gt;necessary
 to install even gratis apps&lt;/a&gt;) without giving a valid email address 
and receiving</strong></del></span> <span class="inserted"><ins><em>article 
about</em></ins></span> the <span 
class="removed"><del><strong>verification</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
 
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;</em></ins></span>
 code <span class="removed"><del><strong>Apple 
       sends</strong></del></span> <span 
class="inserted"><ins><em>signing&lt;/a&gt; that the iThings 
use</em></ins></span> to <span class="removed"><del><strong>it.&lt;/p&gt;
@@ -429,211 +415,224 @@
 
     &lt;p&gt;There</strong></del></span> <span 
class="inserted"><ins><em>prison walls, it</em></ins></span> is <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>not
 big enough</em></ins></span> to <span class="removed"><del><strong>&lt;a 
href="https://support.apple.com/en-us/HT201104"&gt;
-      deactivate iCloud&lt;/a&gt;, but it's active</strong></del></span> <span 
class="inserted"><ins><em>mean that the iThings are no longer jails.&lt;/p&gt;
+      deactivate iCloud&lt;/a&gt;, but it's active by default so it still 
counts as a
+      surveillance functionality.&lt;/p&gt;
+
+    &lt;p&gt;Unknown people apparently took advantage</strong></del></span> 
<span class="inserted"><ins><em>mean that the iThings are no longer 
jails.&lt;/p&gt;
 
-&lt;h4&gt;Examples of censorship</em></ins></span> by <span 
class="removed"><del><strong>default so</strong></del></span> <span 
class="inserted"><ins><em>Apple jails&lt;/h4&gt;
+&lt;h4&gt;Examples</em></ins></span> of <span 
class="removed"><del><strong>this to</strong></del></span> <span 
class="inserted"><ins><em>censorship by Apple jails&lt;/h4&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201710130"&gt;
-    &lt;p&gt;Apple is &lt;a
-    
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
-    censoring apps for the US government too&lt;/a&gt;. 
Specifically,</em></ins></span> it <span class="removed"><del><strong>still 
counts as a
-      surveillance functionality.&lt;/p&gt;
-
-    &lt;p&gt;Unknown people apparently took advantage of this to
-      &lt;a 
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
-      nude photos of many celebrities&lt;/a&gt;. They needed to break Apple's
-      security to get at them, but NSA can access any</strong></del></span> 
<span class="inserted"><ins><em>is
+    &lt;p&gt;Apple is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence"&gt;get
+      nude photos</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"&gt;
+    censoring apps for the US government too&lt;/a&gt;. Specifically, it is
     deleting apps developed by Iranians.&lt;/p&gt;
 
-    &lt;p&gt;The root</em></ins></span> of <span 
class="removed"><del><strong>them through
-      &lt;a 
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
+    &lt;p&gt;The root</em></ins></span> of <span 
class="removed"><del><strong>many celebrities&lt;/a&gt;. They needed to break 
Apple's
+      security</strong></del></span> <span class="inserted"><ins><em>these 
wrongs are in Apple. If Apple had not designed
+    the iMonsters</em></ins></span> to <span class="removed"><del><strong>get 
at them, but NSA can access any</strong></del></span> <span 
class="inserted"><ins><em>let Apple censor applications, Apple would not have
+    had the power to stop users from installing whatever 
kind</em></ins></span> of <span class="removed"><del><strong>them 
through</strong></del></span> <span class="inserted"><ins><em>apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201707290"&gt;
+    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.
   &lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-  MacOS automatically sends to Apple servers unsaved documents being
-  edited&lt;/a&gt;. The &lt;a
-  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
-  things you have not decided to save</strong></del></span> <span 
class="inserted"><ins><em>these wrongs</em></ins></span> are <span 
class="removed"><del><strong>even more sensitive than the
-  things you have stored</strong></del></span> in <span 
class="removed"><del><strong>files&lt;/a&gt;.&lt;/p&gt;
+  MacOS automatically sends</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
+    deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
+    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>Apple servers unsaved documents being
+  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of the Chinese government.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701064"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce Russian 
surveillance</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  things you have not decided</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+    by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
+    While subjecting its users</em></ins></span> to <span 
class="removed"><del><strong>save</strong></del></span> <span 
class="inserted"><ins><em>its own surveillance, it tries to
+    protect its users from Russian surveillance, and is therefore subject
+    to Russian censorship.&lt;/p&gt;
+
+    &lt;p&gt;However, the point here is the wrong of Apple's censorship of
+    apps.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201701050"&gt;
+    &lt;p&gt;Apple used its censorship system to enforce China's censorship 
&lt;a
+    
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
+    by blocking distribution of the New York Times app&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201605190"&gt;
+    &lt;p&gt;Apple censors games, &lt;a
+    
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
+    political points they suggest. Some political points</em></ins></span> are 
<span class="removed"><del><strong>even more sensitive 
than</strong></del></span> <span class="inserted"><ins><em>apparently
+    considered acceptable.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201509290"&gt;
+    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+    banned a program from</em></ins></span> the
+  <span class="removed"><del><strong>things you have stored in 
files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>App Store&lt;/a&gt; because its developers
+    committed the enormity of disassembling some 
iThings.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201509230"&gt;
+    &lt;p&gt;As of 2015, Apple &lt;a
+    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
+    systematically bans apps that endorse abortion rights or would help
+    women find abortions&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This particular political slant &lt;a
+    
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+    affects other Apple services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple has made various
-  &lt;a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
-  MacOS programs send files to</strong></del></span> <span 
class="inserted"><ins><em>Apple. If</em></ins></span> Apple <span 
class="removed"><del><strong>servers without asking permission&lt;/a&gt;.
-  This exposes</strong></del></span> <span class="inserted"><ins><em>had not 
designed</em></ins></span>
-    the <span class="removed"><del><strong>files to Big Brother and 
perhaps</strong></del></span> <span 
class="inserted"><ins><em>iMonsters</em></ins></span> to <span 
class="removed"><del><strong>other snoops.&lt;/p&gt;
+  &lt;li id="M201506250"&gt;
+    &lt;p&gt;Apple</em></ins></span> has <span 
class="removed"><del><strong>made various</strong></del></span> <span 
class="inserted"><ins><em>banned iThing
+    applications that show the confederate flag.</em></ins></span>  &lt;a 
<span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
+  MacOS programs send files</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
+    Not only those that use it as a symbol of racism&lt;/a&gt;, but even
+    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>Apple servers without asking permission&lt;/a&gt;.
+  This exposes</strong></del></span> <span class="inserted"><ins><em>represent 
confederate army units
+    fighting in the Civil War.&lt;/p&gt;
+
+    &lt;p&gt;This ludicrous rigidity illustrates</em></ins></span> the <span 
class="removed"><del><strong>files to Big Brother and 
perhaps</strong></del></span> <span class="inserted"><ins><em>point that Apple 
should
+    not be allowed</em></ins></span> to <span 
class="removed"><del><strong>other snoops.&lt;/p&gt;
 
   &lt;p&gt;It also demonstrates how you can't trust proprietary software,
-  because even if today's version doesn't</strong></del></span> <span 
class="inserted"><ins><em>let Apple censor applications, Apple would 
not</em></ins></span> have <span class="removed"><del><strong>a malicious
+  because even</strong></del></span> <span class="inserted"><ins><em>censor 
apps.  Even</em></ins></span> if <span class="removed"><del><strong>today's 
version doesn't</strong></del></span> <span class="inserted"><ins><em>Apple 
carried out this act of
+    censorship with some care, it would still be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is bad, are not
+    the real issue.  Apple should not</em></ins></span> have <span 
class="removed"><del><strong>a malicious
   functionality, tomorrow's version might add it. The developer won't
-  remove the malfeature unless many users push back hard, 
and</strong></del></span>
-    <span class="inserted"><ins><em>had</em></ins></span> the <span 
class="inserted"><ins><em>power to stop</em></ins></span> users
-  <span class="removed"><del><strong>can't remove it 
themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>from installing whatever kind of 
apps.&lt;/p&gt;</em></ins></span>
+  remove</strong></del></span> the <span 
class="removed"><del><strong>malfeature unless many users push back 
hard,</strong></del></span> <span class="inserted"><ins><em>power to impose its 
views
+    about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201707290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
-  the latest MacOS send reports</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"&gt;
-    deleted several VPNs from its app store for China&lt;/a&gt;, thus using its
-    own censorship power</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>strengthen that of the Chinese 
government.&lt;/p&gt;</em></ins></span>
+  &lt;li id="M201412110"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
+    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>the users
+  can't remove it themselves.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in MacOS:
-  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various 
operations</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201701064"&gt;
-    &lt;p&gt;Apple used its censorship system</em></ins></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple used this censorship power</em></ins></span> in
+  <span class="removed"><del><strong>&lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+  the latest MacOS send reports</strong></del></span> <span 
class="inserted"><ins><em>2014</em></ins></span> to <span 
class="removed"><del><strong>Apple&lt;/a&gt; servers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;Apple admits the</strong></del></span> <span 
class="inserted"><ins><em>enforce Russian surveillance</em></ins></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
-  spying</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-    by blocking distribution of the LinkedIn app</em></ins></span> in <span 
class="inserted"><ins><em>Russia&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Spyware in MacOS:</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt; sends users' search terms to Apple.&lt;/p&gt;
+  &lt;/li&gt;
 
-    &lt;p&gt;This is ironic because LinkedIn is</em></ins></span> a <span 
class="removed"><del><strong>search facility&lt;/a&gt;, but there's a lot
-  &lt;a href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
-  more snooping that Apple has not talked about&lt;/a&gt;.&lt;/p&gt;
+  &lt;li&gt;&lt;p&gt;Apple admits</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the
+  <span class="removed"><del><strong>&lt;a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/"&gt;
+  spying in a search facility&lt;/a&gt;, but there's</strong></del></span> 
<span class="inserted"><ins><em>iThings for</em></ins></span> a <span 
class="removed"><del><strong>lot</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://github.com/fix-macosx/yosemite-phone-home"&gt;
+  more snooping that</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
+    about other crimes such as killing people.  Perhaps</em></ins></span> 
Apple <span class="removed"><del><strong>has not talked 
about&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>considers
+    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-  Several &ldquo;features&rdquo; of iOS seem</strong></del></span> <span 
class="inserted"><ins><em>surveillance system itself.
-    While subjecting its users</em></ins></span> to <span 
class="removed"><del><strong>exist for no possible
-  purpose other than surveillance&lt;/a&gt;.  Here</strong></del></span> <span 
class="inserted"><ins><em>its own surveillance, it tries to
-    protect its users from Russian surveillance, and is therefore subject
-    to Russian censorship.&lt;/p&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+  Several &ldquo;features&rdquo;</strong></del></span>
 
-    &lt;p&gt;However, the point here</em></ins></span> is the <span 
class="removed"><del><strong>&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
+    &lt;p&gt;Apple rejected an app that displayed the 
locations</em></ins></span>
+    of <span class="removed"><del><strong>iOS seem to exist for no possible
+  purpose other than surveillance&lt;/a&gt;.  Here is</strong></del></span> 
<span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
+    time</em></ins></span> the <span class="removed"><del><strong>&lt;a
   
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-  Technical presentation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>wrong of Apple's censorship of
-    apps.&lt;/p&gt;</em></ins></span>
+  Technical presentation&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
   
-  <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;The</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201701050"&gt;
-    &lt;p&gt;Apple used its censorship system to enforce China's 
censorship</em></ins></span> &lt;a <span 
class="removed"><del><strong>class="not-a-duplicate"
+  &lt;li&gt;&lt;p&gt;The &lt;a class="not-a-duplicate"
   
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-    by blocking distribution of</em></ins></span> the <span 
class="removed"><del><strong>iThing is, and
-  get other info too.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>New York Times 
app&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  iBeacon&lt;/a&gt; lets stores determine exactly where</strong></del></span> 
<span class="inserted"><ins><em>developers fixed one &ldquo;problem&rdquo;, 
Apple
+    complained about another.  After</em></ins></span> the <span 
class="removed"><del><strong>iThing is, and
+  get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple can, and 
regularly does,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201605190"&gt;
-    &lt;p&gt;Apple censors games,</em></ins></span> &lt;a
+  &lt;li&gt;&lt;p&gt;Apple can, and regularly does,</strong></del></span> 
<span class="inserted"><ins><em>fifth rejection, Apple</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning</em></ins></span> some <span 
class="removed"><del><strong>data</strong></del></span> <span 
class="inserted"><ins><em>games</em></ins></span> from <span 
class="removed"><del><strong>iPhones for</strong></del></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  remotely extract some data from iPhones for</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
   &lt;/p&gt;
   &lt;p&gt;This may have improved with
   &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>cr&hellip;app store&lt;/a&gt; because of which
-    political points they suggest. Some political points are apparently
-    considered acceptable.&lt;/p&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;li id="M201509290"&gt;
-    &lt;p&gt;Apple</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-    banned a program from the App Store&lt;/a&gt; because its developers
-    committed the enormity of disassembling some 
iThings.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
+&lt;h3 <span class="removed"><del><strong>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
 
-&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
+&lt;p&gt;In this section, we list characteristics of Apple programs that 
block</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics</strong></del></span>
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201308290"&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users,</em></ins></span> or
+<span class="removed"><del><strong>hinder users from 
switching</strong></del></span> <span class="inserted"><ins><em>make option 
settings hard</em></ins></span>
+    to <span class="removed"><del><strong>any alternative program&mdash;and, in
+particular, from switching</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201509230"&gt;
-    &lt;p&gt;As</em></ins></span> of <span 
class="inserted"><ins><em>2015,</em></ins></span> Apple <span 
class="removed"><del><strong>programs</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;
-    systematically bans apps</em></ins></span> that <span 
class="removed"><del><strong>block</strong></del></span> <span 
class="inserted"><ins><em>endorse abortion rights</em></ins></span> or
-<span class="removed"><del><strong>hinder users from switching to any 
alternative program&mdash;and, in
-particular, from switching to free software which can liberate the device
+    &lt;p&gt;This allows a company such as Apple</em></ins></span> to <span 
class="removed"><del><strong>free software which can liberate the device
 the software runs on.&lt;/p&gt;
 
 &lt;ul&gt;
 &lt;li&gt;
-&lt;p&gt;Apple devices lock users in</strong></del></span> <span 
class="inserted"><ins><em>would help
-    women find abortions&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This particular political slant</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
-solely to Apple services&lt;/a&gt; by being designed to be incompatible with 
all</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-    affects</em></ins></span> other <span 
class="removed"><del><strong>options, ethical or 
unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple services&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+&lt;p&gt;Apple devices lock</strong></del></span> <span 
class="inserted"><ins><em>say, &ldquo;We allow</em></ins></span> users <span 
class="removed"><del><strong>in &lt;a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
+solely</strong></del></span>
+    to <span class="removed"><del><strong>Apple services&lt;/a&gt; by being 
designed</strong></del></span> <span class="inserted"><ins><em>turn this 
off&rdquo; while ensuring that few will understand how</em></ins></span>
+    to <span class="removed"><del><strong>be incompatible with all
+other options, ethical or unethical.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;iWork (office software</strong></del></span>
+&lt;p&gt;iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and &lt;a href="https://en.wikipedia.org/wiki/IWork"&gt;provides no 
means</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201506250"&gt;
-    &lt;p&gt;Apple has banned iThing
-    applications</em></ins></span> that <span 
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
-formats and</strong></del></span> <span class="inserted"><ins><em>show the 
confederate flag.</em></ins></span>  &lt;a <span 
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork"&gt;provides
 no means</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it as a symbol</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
-    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>or from Open Document Formats&lt;/a&gt;. iWork 
formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>represent 
confederate army units
-    fighting in</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
 
-    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple should
-    not be allowed to censor apps.  Even if Apple carried out this 
act</em></ins></span> of <span class="removed"><del><strong>thwarting &lt;a
+&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
+
+&lt;p&gt;Proprietary companies can take advantage</em></ins></span> of <span 
class="removed"><del><strong>converting them</strong></del></span> <span 
class="inserted"><ins><em>their customers by imposing arbitrary 
limits</em></ins></span> to <span class="removed"><del><strong>or from Open 
Document Formats&lt;/a&gt;. iWork formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em>their use 
of</em></ins></span> the <span 
class="removed"><del><strong>effect</strong></del></span> <span 
class="inserted"><ins><em>software.  This section reports 
examples</em></ins></span> of <span class="removed"><del><strong>thwarting &lt;a
 href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
 efforts&lt;/a&gt;, thus preventing free software from fully supporting 
them.&lt;/p&gt;
 
-&lt;p&gt;iWork formats</strong></del></span>
-    <span class="inserted"><ins><em>censorship with some care, it would still 
be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is 
bad,</em></ins></span> are <span class="removed"><del><strong>considered &lt;a
+&lt;p&gt;iWork formats are considered &lt;a
 
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
-unfit for document preservation&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>not
-    the real issue.  Apple should not have the power to impose its views
-    about either of these questions, or any other.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In MacOS</strong></del></span>
+unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201412110"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary</em></ins></span> and <span 
class="removed"><del><strong>iOS,</strong></del></span> <span 
class="inserted"><ins><em>inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014 to &lt;a
-    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the <span 
class="removed"><del><strong>procedure</strong></del></span> <span 
class="inserted"><ins><em>iThings</em></ins></span> for <span 
class="inserted"><ins><em>a time.  It also &lt;a
-    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned a game about growing marijuana&lt;/a&gt;, while permitting games
-    about other crimes such as killing people.  Perhaps Apple considers
-    killing more acceptable than marijuana.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed the locations
-    of US drone assassinations, giving various excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;, Apple
-    complained about another.  After the fifth rejection, Apple &lt;a
-    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring the app based on the subject 
matter&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
-
-&lt;h3 id="pressuring"&gt;Apple Pressuring&lt;/h3&gt;
-
-&lt;p&gt;Proprietary companies can take advantage of their customers by 
imposing arbitrary limits to their use of the software.  This section reports 
examples of hard sell and other unjust commercial tactics by Apple.&lt;/p&gt;
+&lt;li&gt;
+&lt;p&gt;In MacOS</strong></del></span> <span class="inserted"><ins><em>hard 
sell</em></ins></span> and <span class="removed"><del><strong>iOS, the 
procedure for</strong></del></span> <span class="inserted"><ins><em>other 
unjust commercial tactics by Apple.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201510270"&gt;
@@ -899,33 +898,33 @@
     &lt;p&gt;Apple used its censorship system</strong></del></span>
     <span class="inserted"><ins><em>security</em></ins></span> to <span 
class="removed"><del><strong>enforce China's censorship &lt;a 
       
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"&gt;
-      by blocking distribution</strong></del></span> <span 
class="inserted"><ins><em>get at them, but NSA can access any</em></ins></span> 
of <span class="removed"><del><strong>the New York Times 
app&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+      by blocking distribution</strong></del></span> <span 
class="inserted"><ins><em>get at them, but NSA can access any</em></ins></span> 
of <span class="removed"><del><strong>the New York Times 
app&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li&gt;
+    &lt;p&gt;Apple censors games,</strong></del></span> <span 
class="inserted"><ins><em>them through</em></ins></span> &lt;a
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
+    banning some games from the cr&hellip;app store&lt;/a&gt; because of which
+    political points they suggest. Some political points are apparently
+    considered acceptable.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201411040"&gt;</em></ins></span>
-    &lt;p&gt;Apple <span class="removed"><del><strong>censors 
games,</strong></del></span> <span class="inserted"><ins><em>has made 
various</em></ins></span> &lt;a
-    <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;
-    banning some games from</strong></del></span>
+    &lt;p&gt;Apple <span class="inserted"><ins><em>has made 
various</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+      banned a program from</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud"&gt;
     MacOS programs send files to Apple servers without asking
-    permission&lt;/a&gt;.  This exposes</em></ins></span> the <span 
class="removed"><del><strong>cr&hellip;app 
store&lt;/a&gt;</strong></del></span> <span class="inserted"><ins><em>files to 
Big Brother and perhaps
+    permission&lt;/a&gt;.  This exposes</em></ins></span> the <span 
class="removed"><del><strong>App Store&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>files to Big Brother and perhaps
     to other snoops.&lt;/p&gt;
 
     &lt;p&gt;It also demonstrates how you can't trust proprietary 
software,</em></ins></span>
-    because <span class="removed"><del><strong>of which
-    political points they suggest. Some political points are apparently
-    considered acceptable.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;
-    &lt;p&gt;Apple &lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-      banned</strong></del></span> <span class="inserted"><ins><em>even if 
today's version doesn't have</em></ins></span> a <span 
class="removed"><del><strong>program from</strong></del></span> <span 
class="inserted"><ins><em>malicious functionality,
-    tomorrow's version might add it. The developer won't 
remove</em></ins></span> the <span class="removed"><del><strong>App 
Store&lt;/a&gt; because its developers
-      committed</strong></del></span>
-    <span class="inserted"><ins><em>malfeature unless many users push back 
hard, and</em></ins></span> the <span class="removed"><del><strong>enormity of 
disassembling some iThings.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>users can't
+    because <span class="removed"><del><strong>its developers
+      committed</strong></del></span> <span class="inserted"><ins><em>even if 
today's version doesn't have a malicious functionality,
+    tomorrow's version might add it. The developer won't 
remove</em></ins></span> the <span class="removed"><del><strong>enormity of 
disassembling some iThings.&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>malfeature unless many users push back 
hard, and the users can't
     remove it themselves.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -1153,7 +1152,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/13 13:01:44 $
+$Date: 2019/05/08 15:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/malware-apple.de.po  13 Apr 2019 13:01:44 -0000      1.127
+++ proprietary/po/malware-apple.de.po  8 May 2019 15:01:36 -0000       1.128
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -115,10 +115,6 @@
 msgstr "<a href=\"#censorship\">Zensur</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Täuschung</a>"
-
-#. type: Content of: <div><ul><li>
 # | <a href=\"#drm\">Digital restrictions management</a> or
 # | [-&ldquo;DRM&rdquo; means functionalities-]
 # | {+&ldquo;DRM&rdquo;&mdash;functionalities+} designed to restrict what
@@ -154,6 +150,14 @@
 "Anwendungsprogrammen Zensur auferlegen."
 
 #. type: Content of: <div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Täuschung</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Unter Druck setzend</a>"
 
@@ -264,35 +268,6 @@
 "Informationen siehe den Abschnitt <a href=\"#jails\">Gefängnisse</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Täuschung"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"„Dunkle Muster“ sind Bedieneroberflächen, entworfen, Benutzer <a 
href=\"//"
-"www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
-"designed-to-trick-you\" title=\" Harry Brignull, Dark Patterns: inside the "
-"interfaces designed to trick you, unter: The Verge, theverge.com 2013.\">in "
-"die Irre zu führen oder Einstellungsmöglichkeiten schwer auffindbar</a> zu "
-"machen."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Dies erlaubt einem Unternehmen wie Apple zu sagen, <em>„Wir ermöglichen "
-"Nutzern dies deaktivieren zu können“</em>, während gleichzeitig "
-"sichergestellt wird, dass nur wenige verstehen werden, wie man es "
-"tatsächlich deaktiviert."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "DRM"
 
@@ -771,6 +746,38 @@
 "Apple Accepts App That Tracks U.S. Drone Strikes, Mashable 2014.\">aufgrund "
 "der App selbst zensiert</a> wurde."
 
+#. type: Content of: <h3>
+# | Apple [-Deception-] {+Manipulation+}
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Täuschung"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"„Dunkle Muster“ sind Bedieneroberflächen, entworfen, Benutzer <a 
href=\"//"
+"www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
+"designed-to-trick-you\" title=\" Harry Brignull, Dark Patterns: inside the "
+"interfaces designed to trick you, unter: The Verge, theverge.com 2013.\">in "
+"die Irre zu führen oder Einstellungsmöglichkeiten schwer auffindbar</a> zu "
+"machen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Dies erlaubt einem Unternehmen wie Apple zu sagen, <em>„Wir ermöglichen "
+"Nutzern dies deaktivieren zu können“</em>, während gleichzeitig "
+"sichergestellt wird, dass nur wenige verstehen werden, wie man es "
+"tatsächlich deaktiviert."
+
 # Handlungszwang?
 #. type: Content of: <h3>
 msgid "Apple Pressuring"

Index: proprietary/po/malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/malware-apple.es.po  16 Apr 2019 08:54:29 -0000      1.131
+++ proprietary/po/malware-apple.es.po  8 May 2019 15:01:36 -0000       1.132
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 14:56+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 "Plural-Forms: nplurals=2; plural=(n!=1);\n"
 
@@ -99,10 +100,6 @@
 msgstr "<a href=\"#censorship\">Censura</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Trampas</a>"
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo;"
 "&mdash;functionalities designed to restrict what users can do with the data "
@@ -129,6 +126,14 @@
 "programas de aplicación."
 
 #. type: Content of: <div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Trampas</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Presiones</a>"
 
@@ -217,31 +222,6 @@
 "<a href=\"#jails\">Prisiones de Apple</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Trampas"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"«<cite>Dark patterns</cite>» se refiere a <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">interfaces de usuario que están diseñadas para engañar a los 
usuarios "
-"o hacer que sea difícil encontrar las opciones de configuración</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Esto hace que Apple pueda afirmar: «Los usuarios pueden deshabilitar esta "
-"opción», pero en realidad serán muy pocos los que puedan hacerlo."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "Gestión digital de restricciones"
 
@@ -675,6 +655,34 @@
 "estaba censurando debido al asunto del que trataba</a>."
 
 #. type: Content of: <h3>
+# | Apple [-Deception-] {+Manipulation+}
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Trampas"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"«<cite>Dark patterns</cite>» se refiere a <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">interfaces de usuario que están diseñadas para engañar a los 
usuarios "
+"o hacer que sea difícil encontrar las opciones de configuración</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Esto hace que Apple pueda afirmar: «Los usuarios pueden deshabilitar esta "
+"opción», pero en realidad serán muy pocos los que puedan hacerlo."
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Presiones"
 

Index: proprietary/po/malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary/po/malware-apple.fr.po  13 Apr 2019 14:12:54 -0000      1.138
+++ proprietary/po/malware-apple.fr.po  8 May 2019 15:01:36 -0000       1.139
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-04-13 16:11+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 14:56+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -96,10 +97,6 @@
 msgstr "<a href=\"#censorship\">Censure</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Pratiques trompeuses</a>"
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo;"
 "&mdash;functionalities designed to restrict what users can do with the data "
@@ -127,6 +124,14 @@
 "d'application."
 
 #. type: Content of: <div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Pratiques trompeuses</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Pression sur le client</a>"
 
@@ -216,32 +221,6 @@
 "vous à la section <a href=\"#jails\">Prisons</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Pratiques trompeuses"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"Les <cite>Dark Patterns</cite> sont <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">des interfaces web conçues pour piéger les utilisateurs ou rendre "
-"certains réglages difficiles à trouver</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Cela permet à une société comme Apple de dire « Nous permettons aux "
-"utilisateurs d'inactiver ceci » tout en s'assurant que peu d'entre eux "
-"comprendront comment le faire."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "DRM"
 
@@ -673,6 +652,35 @@
 "censurée à cause de son thème</a>."
 
 #. type: Content of: <h3>
+# | Apple [-Deception-] {+Manipulation+}
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Pratiques trompeuses"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"Les <cite>Dark Patterns</cite> sont <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">des interfaces web conçues pour piéger les utilisateurs ou rendre "
+"certains réglages difficiles à trouver</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Cela permet à une société comme Apple de dire « Nous permettons aux "
+"utilisateurs d'inactiver ceci » tout en s'assurant que peu d'entre eux "
+"comprendront comment le faire."
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Pression sur le client"
 

Index: proprietary/po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/malware-apple.it-diff.html   13 Apr 2019 13:01:44 -0000      
1.40
+++ proprietary/po/malware-apple.it-diff.html   8 May 2019 15:01:36 -0000       
1.41
@@ -62,11 +62,11 @@
 &lt;ul&gt;
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;!--</em></ins></span> &lt;li&gt;&lt;a 
<span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a 
href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt; 
--&gt;</em></ins></span>
   &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means 
functionalities</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM&rdquo;&mdash;functionalities</em></ins></span>
 designed
     to restrict what users can do with the data in their computers.&lt;/li&gt;
@@ -75,7 +75,8 @@
 &lt;!-- &lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt; --&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#manipulation"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
@@ -146,57 +147,40 @@
 &lt;/p&gt;
 
 &lt;p&gt;If</strong></del></span> Apple <span class="removed"><del><strong>had 
not designed the iMonsters</strong></del></span> <span 
class="inserted"><ins><em>Store. Please refer</em></ins></span> to <span 
class="removed"><del><strong>let Apple censor
-applications, 
-&lt;a href="/proprietary/proprietary-jails.html"&gt;
-Apple would not have had</strong></del></span> the <span 
class="removed"><del><strong>power</strong></del></span> <span 
class="inserted"><ins><em>&lt;a href="#jails"&gt;Apple Jails&lt;/a&gt;
+applications,</strong></del></span> <span 
class="inserted"><ins><em>the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-jails.html"&gt;
+Apple would not have had</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
 section for more information.&lt;/p&gt;
 
-&lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>stop users from installing
-VPNs&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple used its censorship system</strong></del></span> <span 
class="inserted"><ins><em>mislead users, or make option settings 
hard</em></ins></span>
-    to <span class="removed"><del><strong>enforce Russian
-surveillance &lt;a
-href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
-by blocking distribution of the LinkedIn app in 
Russia&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-
-    &lt;p&gt;This <span class="removed"><del><strong>is ironic because 
LinkedIn is</strong></del></span> <span 
class="inserted"><ins><em>allows</em></ins></span> a <span 
class="removed"><del><strong>surveillance system
-itself. While subjecting its users to its own surveillance, it 
tries</strong></del></span> <span class="inserted"><ins><em>company such as 
Apple</em></ins></span> to <span class="removed"><del><strong>protect 
its</strong></del></span> <span class="inserted"><ins><em>say, &ldquo;We 
allow</em></ins></span> users <span class="removed"><del><strong>from Russian 
surveillance, and is therefore
-subject</strong></del></span>
-    to <span class="removed"><del><strong>Russian 
censorship.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>turn this off&rdquo; while ensuring that few will 
understand how
-    to actually turn it off.&lt;/p&gt;
-  &lt;/li&gt;
-&lt;/ul&gt;
-
 
 &lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly &lt;a
-    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>power to stop users from installing
+VPNs&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iPhone 7 nearly &lt;a
+    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201512260"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple uses DRM software to prevent people from charging an iThing
+    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</em></ins></span>
+    Apple <span class="removed"><del><strong>used its censorship 
system</strong></del></span> <span class="inserted"><ins><em>uses DRM 
software</em></ins></span> to <span class="removed"><del><strong>enforce Russian
+surveillance &lt;a
+href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&amp;emc=rss&amp;_r=0"&gt;
+by blocking distribution of the LinkedIn app</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
     with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-    focuses on the fact that a new model of Macbook introduced a
+    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="removed"><del><strong>Russia&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;This is ironic because LinkedIn is</strong></del></span> <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
+    focuses on the fact that</em></ins></span> a <span 
class="removed"><del><strong>surveillance system
+itself. While subjecting its users to its</strong></del></span> <span 
class="inserted"><ins><em>new model of Macbook introduced a
     requirement for monitors to have malicious hardware, but DRM software
     in MacOS is involved in activating the hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
@@ -346,9 +330,9 @@
     by blocking distribution of the LinkedIn app in Russia&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This is ironic because LinkedIn is a surveillance system itself.
-    While subjecting its users to its own surveillance, it tries to
+    While subjecting its users to its</em></ins></span> own surveillance, it 
tries to
     protect its users from Russian surveillance, and is therefore subject
-    to Russian censorship.&lt;/p&gt;</em></ins></span>
+    to Russian censorship.&lt;/p&gt;
 
     &lt;p&gt;However, the point here is the wrong of Apple's censorship of
     apps.&lt;/p&gt;
@@ -413,72 +397,86 @@
 
 &lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest 
of</strong></del></span> <span 
class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;These bugs are/were not intentional, so unlike</strong></del></span> 
<span class="inserted"><ins><em>services&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201506250"&gt;
     &lt;p&gt;Apple has banned iThing
-    applications that show</em></ins></span> the <span 
class="removed"><del><strong>file
-  they do not count</strong></del></span> <span 
class="inserted"><ins><em>confederate flag.  &lt;a
+    applications that show</em></ins></span> the <span 
class="removed"><del><strong>rest</strong></del></span> <span 
class="inserted"><ins><em>confederate flag.  &lt;a
     
href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html"&gt;
-    Not only those that use it</em></ins></span> as <span 
class="removed"><del><strong>malware. We mention them</strong></del></span> 
<span class="inserted"><ins><em>a symbol of racism&lt;/a&gt;, but even
-    strategic games that use it</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>represent confederate army units
-    fighting in</em></ins></span> the
-  <span class="removed"><del><strong>supposition</strong></del></span> <span 
class="inserted"><ins><em>Civil War.&lt;/p&gt;
+    Not only those that use it as a symbol</em></ins></span> of <span 
class="inserted"><ins><em>racism&lt;/a&gt;, but even
+    strategic games that use it to represent confederate army units
+    fighting in</em></ins></span> the <span class="removed"><del><strong>file
+  they do</strong></del></span> <span class="inserted"><ins><em>Civil 
War.&lt;/p&gt;
 
-    &lt;p&gt;This ludicrous rigidity illustrates the point</em></ins></span> 
that <span class="removed"><del><strong>prestigious proprietary software 
doesn't have grave
+    &lt;p&gt;This ludicrous rigidity illustrates the point that Apple 
should</em></ins></span>
+    not <span class="removed"><del><strong>count as malware. We mention 
them</strong></del></span> <span class="inserted"><ins><em>be 
allowed</em></ins></span> to <span 
class="removed"><del><strong>refute</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried out this act of
+    censorship with some care, it would still be wrong.  Whether racism
+    is bad, whether educating people about drone attacks is bad, are 
not</em></ins></span>
+    the
+  <span class="removed"><del><strong>supposition that prestigious proprietary 
software doesn't</strong></del></span> <span class="inserted"><ins><em>real 
issue.  Apple should not</em></ins></span> have <span 
class="removed"><del><strong>grave
   bugs.&lt;/p&gt;
 
 &lt;ul&gt;
   &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API</strong></del></span> 
<span class="inserted"><ins><em>Apple should
-    not be</em></ins></span> allowed <span class="removed"><del><strong>an 
attacker</strong></del></span> to <span class="removed"><del><strong>&lt;a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which uses</strong></del></span> <span 
class="inserted"><ins><em>censor apps.  Even if Apple carried 
out</em></ins></span> this <span 
class="removed"><del><strong>API</strong></del></span> <span 
class="inserted"><ins><em>act of
-    censorship with some care, it would still be wrong.  Whether racism
-    is bad, whether educating people about drone attacks is bad, are not
-    the real issue.  Apple should not have the power</em></ins></span> to 
<span class="removed"><del><strong>render
-    a certain kind</strong></del></span> <span 
class="inserted"><ins><em>impose its views
-    about either</em></ins></span> of <span class="removed"><del><strong>image 
file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>these questions, or any other.&lt;/p&gt;
+    &lt;p&gt;A vulnerability in</strong></del></span> <span 
class="inserted"><ins><em>the power to impose its views
+    about either of these questions, or any other.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412110"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-    More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    More examples of</em></ins></span> Apple's <span 
class="removed"><del><strong>Image I/O API allowed an 
attacker</strong></del></span> <span class="inserted"><ins><em>arbitrary and 
inconsistent censorship&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
+  &lt;li id="M201405250"&gt;
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
&lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power</em></ins></span> in <span 
class="inserted"><ins><em>2014 to &lt;a
-    
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt; for</em></ins></span> the iThings <span 
class="removed"><del><strong>Messages
-      app</strong></del></span> <span class="inserted"><ins><em>for a time.  
It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
-    banned</em></ins></span> a <span class="removed"><del><strong>malicious 
web site to extract all the user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>game 
about growing marijuana&lt;/a&gt;, while permitting games
+  &lt;li&gt;
+    &lt;p&gt;A bug in</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+    ban all bitcoin apps&lt;/a&gt; for the iThings for a time.  It also &lt;a
+    
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
+    banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
-    killing more acceptable than marijuana.&lt;/p&gt;</em></ins></span>
+    killing more acceptable than marijuana.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;/ul&gt;
 
-&lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
-for</strong></del></span>
+  &lt;li id="M201402070"&gt;
+    &lt;p&gt;Apple rejected an app that displayed the locations
+    of US drone assassinations, giving various excuses. Each
+    time the developers fixed one &ldquo;problem&rdquo;, Apple
+    complained about another.  After the fifth rejection, Apple &lt;a
+    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages</strong></del></span> app <span 
class="removed"><del><strong>&lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
+        a malicious web site to extract all</strong></del></span> <span 
class="inserted"><ins><em>based on</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>subject 
matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
+&lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they</strong></del></span> <span 
class="inserted"><ins><em>id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201402070"&gt;
-    &lt;p&gt;Apple rejected an app that displayed</em></ins></span> the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples</strong></del></span> <span 
class="inserted"><ins><em>locations</em></ins></span>
-    of <span class="inserted"><ins><em>US drone assassinations, giving various 
excuses. Each
-    time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>committing
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201308290"&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo;</em></ins></span> are <span 
class="removed"><del><strong>not grave enough</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed</em></ins></span> to <span 
class="removed"><del><strong>qualify 
+for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
 interference.&lt;/p&gt;
 
 &lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings to download a system 
upgrade
-         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without 
asking</strong></del></span>
-    <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>fifth rejection,</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
-    href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>upgrade but</strong></del></span> <span 
class="inserted"><ins><em>app based on</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li&gt;&lt;p&gt;Apple forced millions of iThings</strong></del></span> 
<span class="inserted"><ins><em>mislead users, or make option settings 
hard</em></ins></span>
+    to <span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows</em></ins></span> a <span 
class="removed"><del><strong>system upgrade
+         &lt;a 
href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without asking 
the users&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>company such as</em></ins></span> Apple <span 
class="removed"><del><strong>did not forcibly install the upgrade but the 
downloading alone caused lots of trouble.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -505,40 +503,40 @@
 <span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way that hurts the user.
-But they are a lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> Apple
-<span class="removed"><del><strong>actions</strong></del></span> <span 
class="inserted"><ins><em>employs its power over users
-to directly intervene in ways</em></ins></span> that harm <span 
class="removed"><del><strong>to</strong></del></span> <span 
class="inserted"><ins><em>them or block their work.&lt;/p&gt;
+not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>which Apple employs its power over users
+to directly intervene in ways</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
     
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>performance</em></ins></span> of <span 
class="removed"><del><strong>specific</strong></del></span> <span 
class="inserted"><ins><em>older phones to force users to buy their newer
+    the <span class="removed"><del><strong>user.
+But they are</strong></del></span> <span class="inserted"><ins><em>performance 
of older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they are 
technical</strong></del></span> <span 
class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple <span class="inserted"><ins><em>to block
+    &lt;p&gt;This evidently has to do with Russia's command 
to</em></ins></span> Apple
+<span class="removed"><del><strong>actions that harm</strong></del></span> to 
<span class="inserted"><ins><em>block
     Telegram in Russia.&lt;/p&gt;
 
     &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
     iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
-    are jails&lt;/a&gt;, they don't permit any app to be 
free</em></ins></span> software.&lt;/p&gt;
-
-<span class="removed"><del><strong>&lt;ul&gt;
-  &lt;li&gt;</strong></del></span>
-  <span class="inserted"><ins><em>&lt;/li&gt;
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
+  &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
     &lt;p&gt;MacOS High Sierra forcibly reformats SSD boot drives, and &lt;a
     
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html"&gt;
-    changes the file system from HFS+  to APFS&lt;/a&gt;, which cannot be
-    accessed from GNU/Linux, Windows or even older versions of MacOS.&lt;/p&gt;
+    changes</em></ins></span> the <span 
class="removed"><del><strong>users</strong></del></span> <span 
class="inserted"><ins><em>file system from HFS+  to APFS&lt;/a&gt;, which 
cannot be
+    accessed from GNU/Linux, Windows or even older versions</em></ins></span> 
of <span class="removed"><del><strong>specific Apple software.&lt;/p&gt;
+
+&lt;ul&gt;
+  &lt;li&gt;</strong></del></span> <span 
class="inserted"><ins><em>MacOS.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201706060"&gt;</em></ins></span>
@@ -744,24 +742,26 @@
     &lt;p&gt;It also demonstrates how you can't trust proprietary software,
     because even if today's version doesn't have a malicious functionality,
     tomorrow's version might add it. The developer won't remove the
-    malfeature unless many users push back hard, and the users can't
-    remove it themselves.&lt;/p&gt;
+    malfeature unless many users push back hard, and the <span 
class="removed"><del><strong>users
+  can't remove it themselves.&lt;/p&gt;
   &lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Various operations 
in</strong></del></span>
+  &lt;li&gt;&lt;p&gt;Various operations in
+  &lt;a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;
+  the latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>users 
can't
+    remove it themselves.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Spyware in 
MacOS:</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201410300"&gt;
-    &lt;p&gt; MacOS automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
-    sends to Apple servers unsaved documents being edited&lt;/a&gt;. The
+    &lt;p&gt; MacOS automatically</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
+  Spotlight search&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;</em></ins></span>
+    sends <span class="removed"><del><strong>users' search 
terms</strong></del></span> to <span 
class="removed"><del><strong>Apple.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple servers unsaved documents being 
edited&lt;/a&gt;. The
     things you have not decided to save are &lt;a
     
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter/"&gt;
-    even more sensitive&lt;/a&gt; than</em></ins></span> the <span 
class="removed"><del><strong>latest MacOS send reports to Apple&lt;/a&gt; 
servers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;Spyware</strong></del></span> <span 
class="inserted"><ins><em>things you have stored</em></ins></span> in <span 
class="removed"><del><strong>MacOS:
-  &lt;a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-  Spotlight search&lt;/a&gt; sends users' search terms to 
Apple.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>files.&lt;/p&gt;</em></ins></span>
+    even more sensitive&lt;/a&gt; than the things you have stored in 
files.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
@@ -813,107 +813,104 @@
   &lt;li&gt;&lt;p&gt;The DMCA and the EU Copyright Directive make it &lt;a
 href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html"&gt;
       illegal to study how iOS cr...apps spy on users&lt;/a&gt;, because this
-      would require circumventing the iOS DRM.&lt;/p&gt;
+      would require circumventing the</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
+    Several &ldquo;features&rdquo; of</em></ins></span> iOS <span 
class="removed"><del><strong>DRM.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a
   
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-  Apple uses DRM software to prevent people from charging an iThing with a 
+  Apple uses DRM software</strong></del></span> <span 
class="inserted"><ins><em>seem</em></ins></span> to <span 
class="removed"><del><strong>prevent people from charging an iThing with a 
   generic USB cable&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
   
   &lt;li&gt;&lt;p&gt;&lt;a
   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
   DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-  focuses on the fact that a new model of Macbook introduced a requirement
-  for monitors to have malicious hardware, but DRM software in MacOS is
-  involved in activating the hardware. The software for accessing iTunes
-  is also responsible.&lt;/p&gt;
+  focuses on the fact that a new model of Macbook introduced a 
requirement</strong></del></span> <span 
class="inserted"><ins><em>exist</em></ins></span>
+    for <span class="removed"><del><strong>monitors to have malicious 
hardware, but DRM software in MacOS</strong></del></span> <span 
class="inserted"><ins><em>no possible purpose other than 
surveillance&lt;/a&gt;.  Here</em></ins></span> is
+  <span class="removed"><del><strong>involved in 
activating</strong></del></span> the <span 
class="removed"><del><strong>hardware. The software for accessing iTunes
+  is also responsible.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
-  iOS, the operating system of the Apple iThings, is a jail for
-  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
-
-  &lt;p&gt;Apple has used this power to
-  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
-
-  &lt;p&gt;Apple, in the iThings, pioneered the practice</strong></del></span>
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>general purpose
-  computers that are jails, and the term comes from iThing users, who
-  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>iOS seem 
to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  
Here</em></ins></span> is <span class="removed"><del><strong>an article 
about</strong></del></span> the &lt;a
-  <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-  code signing&lt;/a&gt; that the iThings use</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201401100.1"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
+    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>Bluray disks&lt;/a&gt;.  (The article 
focused on Windows
+  and said that MacOS would do</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>user.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;p&gt;Curiously,</strong></del></span> <span 
class="inserted"><ins><em>iThing is, and
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
+  iOS,</strong></del></span> <span class="inserted"><ins><em>iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through the
-  walls of</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="inserted"><ins><em>data in an iThing, or it
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>operating system of</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="inserted"><ins><em>data in an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The</em></ins></span> iThing <span 
class="removed"><del><strong>jail: users</strong></del></span> <span 
class="inserted"><ins><em>also &lt;a
+    &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though 
that</em></ins></span> can <span class="removed"><del><strong>now install apps 
built from
-  source code, provided the source code</strong></del></span> <span 
class="inserted"><ins><em>be
+    tells</em></ins></span> Apple <span 
class="removed"><del><strong>iThings,</strong></del></span> <span 
class="inserted"><ins><em>its geolocation&lt;/a&gt; by default, though that can 
be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is <span 
class="removed"><del><strong>written in Swift.  Users
-  cannot do this freely because they are required</strong></del></span> <span 
class="inserted"><ins><em>also a feature for web sites</em></ins></span> to 
<span class="removed"><del><strong>identify themselves.
-  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;There</em></ins></span> is <span 
class="inserted"><ins><em>also</em></ins></span> a <span 
class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>feature</em></ins></span> for
+  <span class="removed"><del><strong>users.&lt;/a&gt;  That means it imposes 
censorship of application programs.&lt;/p&gt;
+
+  &lt;p&gt;Apple has used this power</strong></del></span> <span 
class="inserted"><ins><em>web sites</em></ins></span> to
+  <span class="removed"><del><strong>&lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
 
-  &lt;p&gt;While this</strong></del></span> <span 
class="inserted"><ins><em>track users, which</em></ins></span> is <span 
class="removed"><del><strong>a crack in the prison walls,</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from 
iThing</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> users, <span 
class="removed"><del><strong>who
+  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
+
+  &lt;p&gt;Here</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> is <span 
class="removed"><del><strong>an</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it is <span class="removed"><del><strong>not big 
enough</strong></del></span>
-    <span class="inserted"><ins><em>still true in iOS 7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That</em></ins></span> article <span 
class="inserted"><ins><em>talks</em></ins></span> about <span 
class="removed"><del><strong>the &lt;a
+  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+  code signing&lt;/a&gt; that the iThings use to jail the user.&lt;/p&gt;
+
+  &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+  walls of the the iThing jail: users can now install apps built from
+  source code, provided the source code</strong></del></span> <span 
class="inserted"><ins><em>iOS 6, but it</em></ins></span> is <span 
class="removed"><del><strong>written</strong></del></span>
+    <span class="inserted"><ins><em>still true</em></ins></span> in <span 
class="removed"><del><strong>Swift.  Users</strong></del></span> <span 
class="inserted"><ins><em>iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    &lt;p&gt;Users</em></ins></span> cannot <span 
class="removed"><del><strong>do this freely because they are 
required</strong></del></span> <span class="inserted"><ins><em>make an Apple ID 
(&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>identify themselves.
+  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;While this is</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving</em></ins></span> a <span class="removed"><del><strong>crack 
in</strong></del></span> <span class="inserted"><ins><em>valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>prison walls, it is not big 
enough</strong></del></span> <span class="inserted"><ins><em>verification code 
Apple sends</em></ins></span>
     to
   <span class="removed"><del><strong>mean that the iThings are no longer 
jails.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-  More examples of Apple's arbitrary</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>receiving the verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+  More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -1014,7 +1011,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/13 13:01:44 $
+$Date: 2019/05/08 15:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/malware-apple.it.po  13 Apr 2019 13:01:44 -0000      1.121
+++ proprietary/po/malware-apple.it.po  8 May 2019 15:01:36 -0000       1.122
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -101,10 +101,6 @@
 msgstr "<a href=\"#censorship\">Censura</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Inganni</a>"
-
-#. type: Content of: <div><ul><li>
 # | <a href=\"#drm\">Digital restrictions management</a> or
 # | [-&ldquo;DRM&rdquo; means functionalities-]
 # | {+&ldquo;DRM&rdquo;&mdash;functionalities+} designed to restrict what
@@ -145,6 +141,14 @@
 "applicazioni."
 
 #. type: Content of: <div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Inganni</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Pressioni</a>"
 
@@ -251,32 +255,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Inganni di Apple"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Dark patterns&rdquo; sono <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">interfacce che ingannano gli utenti</a> o rendono più difficile "
-"trovare le impostazioni."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Questo permette a un'azienda come Apple di dire che permette agli utenti di "
-"disattivare una certa funzione assicurandosi al contempo che pochi capiranno "
-"come farlo."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "DRM di Apple"
 
@@ -831,6 +809,35 @@
 "drone-strikes/\">solo per il tema di cui trattava</a>."
 
 #. type: Content of: <h3>
+# | Apple [-Deception-] {+Manipulation+}
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Inganni di Apple"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Dark patterns&rdquo; sono <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">interfacce che ingannano gli utenti</a> o rendono più difficile "
+"trovare le impostazioni."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Questo permette a un'azienda come Apple di dire che permette agli utenti di "
+"disattivare una certa funzione assicurandosi al contempo che pochi capiranno "
+"come farlo."
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Pressioni di Apple"
 

Index: proprietary/po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/malware-apple.ja-diff.html   13 Apr 2019 13:01:44 -0000      
1.51
+++ proprietary/po/malware-apple.ja-diff.html   8 May 2019 15:01:36 -0000       
1.52
@@ -71,11 +71,11 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;!--</em></ins></span> &lt;li&gt;&lt;a 
<span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a 
href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt; 
--&gt;</em></ins></span>
   &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means 
functionalities</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM&rdquo;&mdash;functionalities</em></ins></span>
 designed
     to restrict what users can do with the data in their computers.&lt;/li&gt;
@@ -84,7 +84,8 @@
 &lt;!-- &lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt; --&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#manipulation"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
@@ -144,122 +145,87 @@
 
 &lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-Apple censors
-games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
-some games from the cr&hellip;app store&lt;/a&gt; because 
of</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Apple mainly uses 
iOS,</em></ins></span> which <span class="removed"><del><strong>political
-points they suggest. Some political points are apparently considered
-acceptable.&lt;/p&gt;
-&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
 
-&lt;li&gt;&lt;p&gt;
-Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-banned</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> a <span 
class="removed"><del><strong>program from the App Store&lt;/a&gt; because its 
developers
-committed the enormity of disassembling some iThings.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple rejected an app that displayed the locations of US drone
-assassinations, giving various excuses. Each time</strong></del></span> <span 
class="inserted"><ins><em>typical jail, to impose censorship
-through</em></ins></span> the <span class="removed"><del><strong>developers
-fixed one &ldquo;problem&rdquo;,</strong></del></span> Apple <span 
class="removed"><del><strong>complained about another.
-After</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to</em></ins></span> the <span class="removed"><del><strong>fifth 
rejection,
-Apple</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
-it was censoring the app based on the subject matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As of 2015, Apple</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
+<span class="inserted"><ins><em>&lt;p&gt;Apple mainly uses iOS, which is a 
typical jail, to impose censorship
+through the</em></ins></span> Apple <span class="removed"><del><strong>censors
+games,</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
 section for more information.&lt;/p&gt;
 
-&lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
-rights</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users,</em></ins></span> or <span 
class="removed"><del><strong>would help women find 
abortions&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;
-This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-affects other</strong></del></span> <span class="inserted"><ins><em>make 
option settings hard
-    to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such as</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span class="inserted"><ins><em>to 
say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-&lt;/ul&gt;
-
-
-&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
-    to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which</strong></del></span>
-    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>cr&hellip;app store&lt;/a&gt; because of which 
political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iPhone 7 nearly &lt;a
+    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201512260"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
-    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</em></ins></span>
+    Apple <span class="removed"><del><strong>&lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program</strong></del></span> <span class="inserted"><ins><em>uses 
DRM software to prevent people</em></ins></span> from <span 
class="removed"><del><strong>the App Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
+&lt;li&gt;&lt;p&gt;
+Apple rejected</strong></del></span> <span 
class="inserted"><ins><em>charging</em></ins></span> an <span 
class="removed"><del><strong>app that displayed</strong></del></span> <span 
class="inserted"><ins><em>iThing
+    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
+  &lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
-    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
-      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that</em></ins></span> a <span 
class="inserted"><ins><em>new model of Macbook introduced a
-    requirement for monitors to have</em></ins></span> malicious <span 
class="removed"><del><strong>web site</strong></del></span> <span 
class="inserted"><ins><em>hardware, but DRM software
-    in MacOS is involved in activating the hardware. The software for
+    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>locations</strong></del></span> <span 
class="inserted"><ins><em>fact that a new model</em></ins></span> of <span 
class="removed"><del><strong>US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring</strong></del></span> <span class="inserted"><ins><em>Macbook 
introduced a
+    requirement for monitors to have malicious hardware, but DRM software
+    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>app based</strong></del></span> <span 
class="inserted"><ins><em>hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
-    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
+    DRM that caters to Bluray disks&lt;/a&gt;.  (The article 
focused</em></ins></span> on <span class="inserted"><ins><em>Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As</strong></del></span> <span class="inserted"><ins><em>same thing 
subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
     &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
     href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
-    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
+&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up</strong></del></span> 
<span class="inserted"><ins><em>that block or
+&lt;p&gt;In this section, we list characteristics</em></ins></span> of <span 
class="removed"><del><strong>2015,</strong></del></span> Apple <span 
class="inserted"><ins><em>programs that block or
 hinder users from switching to any alternative program&mdash;and, in
-particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>user's 
system. They are like sabotage, but</strong></del></span> <span 
class="inserted"><ins><em>device
+particular, from switching to free software which can liberate the device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201803300"&gt;
-    &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
-    
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+    &lt;p&gt;In MacOS and iOS, the procedure for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
     converting images from the Photos format&lt;/a&gt; to a free format is so
-    tedious and time-consuming that users just give up if</em></ins></span> 
they <span class="removed"><del><strong>are not grave 
enough</strong></del></span> <span class="inserted"><ins><em>have a
+    tedious and time-consuming</em></ins></span> that <span 
class="removed"><del><strong>endorse abortion
+rights</strong></del></span> <span class="inserted"><ins><em>users just give 
up if they have a
     lot of them.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -267,7 +233,9 @@
     &lt;p&gt;Apple devices lock users in &lt;a
     
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
     solely to Apple services&lt;/a&gt; by being designed to be incompatible
-    with all other options, ethical or unethical.&lt;/p&gt;
+    with all other options, ethical</em></ins></span> or <span 
class="removed"><del><strong>would help women find 
abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605044"&gt;
@@ -276,38 +244,47 @@
     href="https://en.wikipedia.org/wiki/IWork"&gt;provides no means of
     converting them to or from Open Document Formats&lt;/a&gt;. iWork
     formats have changed several times since they were first
-    introduced. This may have had the effect of thwarting &lt;a
-    href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+    introduced.</em></ins></span> This <span 
class="removed"><del><strong>particular political slant</strong></del></span> 
<span class="inserted"><ins><em>may have had the effect of 
thwarting</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse
 engineering
     efforts&lt;/a&gt;, thus preventing free software from fully supporting
     them.&lt;/p&gt;
 
     &lt;p&gt;iWork formats are considered &lt;a
     
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
     unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
 &lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;These bugs are/were not intentional, 
so unlike the rest of the file
   they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201607220"&gt;
+  &lt;li id="M201607220"&gt;</em></ins></span>
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to render a
+    <span class="removed"><del><strong>malacious</strong></del></span>
+    <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201604120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604120"&gt;</em></ins></span>
     &lt;p&gt;A bug in the iThings Messages app &lt;a
     
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-    a malicious web site to extract all the user's messaging
-    history&lt;/a&gt;.&lt;/p&gt;
+    a malicious web site to extract all the user's messaging <span 
class="removed"><del><strong>history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311120"&gt;
@@ -319,21 +296,24 @@
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!--
+<span class="inserted"><ins><em>&lt;!--</em></ins></span>
 &lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
 for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
-interference.&lt;/p&gt; --&gt;
+interference.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions</strong></del></span> <span 
class="inserted"><ins><em>--&gt;
 
 
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system of the Apple iThings, is the prototype
+iOS, the operating system</em></ins></span> of <span 
class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>the Apple iThings, is the prototype
 of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
 designing general purpose computers with censorship of application
 programs.&lt;/p&gt;
@@ -439,13 +419,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt;</em></ins></span> for the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples of Apple committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of</strong></del></span> iThings 
<span class="removed"><del><strong>to download</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    ban all bitcoin apps&lt;/a&gt; for the iThings for</em></ins></span> a 
<span class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
@@ -458,7 +434,23 @@
     time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>did not forcibly 
install</strong></del></span>
     <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span class="removed"><del><strong>upgrade 
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection, 
Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201308290"&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -484,30 +476,28 @@
 
 <span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since 
they</strong></del></span> <span class="inserted"><ins><em>situations in which 
Apple employs its power over users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>performance 
of older phones to force users to buy their newer
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they</strong></del></span> 
<span class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to</em></ins></span> do <span 
class="inserted"><ins><em>with Russia's command to Apple to block
     Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they</em></ins></span>
-    are <span class="removed"><del><strong>technical</strong></del></span> 
<span class="inserted"><ins><em>jails&lt;/a&gt;, they don't permit any app to 
be free software.&lt;/p&gt;
+    &lt;p&gt;The Telegram client is free software on other platforms, 
but</em></ins></span> not <span class="removed"><del><strong>involve 
making</strong></del></span> <span class="inserted"><ins><em>on
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
@@ -522,8 +512,7 @@
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> 
<span class="inserted"><ins><em>stops people from fixing problems themselves;
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
     that's the nature of proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -534,8 +523,10 @@
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer</em></ins></span> to <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>program that runs in a way that 
hurts</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
+    to describe</em></ins></span> the <span class="removed"><del><strong>user.
+But they are a lot like malware, since they are technical Apple
+actions that harm</strong></del></span> <span class="inserted"><ins><em>DRM, 
but we prefer</em></ins></span> to <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="inserted"><ins><em>term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -694,11 +685,11 @@
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
   MacOS automatically sends to Apple servers unsaved documents being
-  edited&lt;/a&gt;. The &lt;a
-  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>of them through</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
   things you have not decided to save are even more sensitive than the
-  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
@@ -788,96 +779,93 @@
   &lt;li&gt;&lt;p&gt;&lt;a
   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
   DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-  focuses on the fact that a new model of Macbook introduced a requirement
-  for monitors to have malicious hardware, but DRM software in MacOS is
-  involved in activating the hardware. The software for accessing iTunes
-  is also responsible.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
-  iOS, the operating system of the Apple iThings, is a jail for
-  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
-
-  &lt;p&gt;Apple has used this power to
-  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
-
-  &lt;p&gt;Apple, in the iThings, pioneered the practice</strong></del></span>
+  focuses on the fact that a new model</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>general purpose
-  computers that are jails, and the term comes from iThing users, who
-  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>iOS seem 
to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  
Here</em></ins></span> is <span class="removed"><del><strong>an article 
about</strong></del></span> the &lt;a
-  <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-  code signing&lt;/a&gt; that the iThings use</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
+  for monitors</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span class="removed"><del><strong>have malicious 
hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software</strong></del></span> 
<span class="inserted"><ins><em>exist</em></ins></span>
+    for <span class="removed"><del><strong>accessing 
iTunes</strong></del></span> <span class="inserted"><ins><em>no possible 
purpose other than surveillance&lt;/a&gt;.  Here</em></ins></span> is <span 
class="removed"><del><strong>also responsible.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the &lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401100.1"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
+    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>Bluray disks&lt;/a&gt;.  (The article 
focused on Windows
+  and said that MacOS would do</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>user.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;p&gt;Curiously,</strong></del></span> <span 
class="inserted"><ins><em>iThing is, and
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
+  iOS,</strong></del></span> <span class="inserted"><ins><em>iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through the
-  walls of</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="inserted"><ins><em>data in an iThing, or it
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>operating system of</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="inserted"><ins><em>data in an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The</em></ins></span> iThing <span 
class="removed"><del><strong>jail: users</strong></del></span> <span 
class="inserted"><ins><em>also &lt;a
+    &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though 
that</em></ins></span> can <span class="removed"><del><strong>now install apps 
built from
-  source code, provided the source code</strong></del></span> <span 
class="inserted"><ins><em>be
+    tells</em></ins></span> Apple <span 
class="removed"><del><strong>iThings,</strong></del></span> <span 
class="inserted"><ins><em>its geolocation&lt;/a&gt; by default, though that can 
be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is <span 
class="removed"><del><strong>written in Swift.  Users
-  cannot do this freely because they are required</strong></del></span> <span 
class="inserted"><ins><em>also a feature for web sites</em></ins></span> to 
<span class="removed"><del><strong>identify themselves.
-  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;There</em></ins></span> is <span 
class="inserted"><ins><em>also</em></ins></span> a <span 
class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>feature</em></ins></span> for
+  <span class="removed"><del><strong>users.&lt;/a&gt;  That means it imposes 
censorship of application programs.&lt;/p&gt;
+
+  &lt;p&gt;Apple has used this power</strong></del></span> <span 
class="inserted"><ins><em>web sites</em></ins></span> to
+  <span class="removed"><del><strong>&lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
+
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from 
iThing</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> users, <span 
class="removed"><del><strong>who
+  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;While this</strong></del></span> <span 
class="inserted"><ins><em>track users, which</em></ins></span> is <span 
class="removed"><del><strong>a crack in the prison walls,</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+  &lt;p&gt;Here</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> is <span 
class="removed"><del><strong>an</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it is <span class="removed"><del><strong>not big 
enough</strong></del></span>
-    <span class="inserted"><ins><em>still true in iOS 7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That</em></ins></span> article <span 
class="inserted"><ins><em>talks</em></ins></span> about <span 
class="removed"><del><strong>the &lt;a
+  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+  code signing&lt;/a&gt; that the iThings use to jail the user.&lt;/p&gt;
+
+  &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+  walls of the the iThing jail: users can now install apps built from
+  source code, provided the source code</strong></del></span> <span 
class="inserted"><ins><em>iOS 6, but it</em></ins></span> is <span 
class="removed"><del><strong>written</strong></del></span>
+    <span class="inserted"><ins><em>still true</em></ins></span> in <span 
class="removed"><del><strong>Swift.  Users</strong></del></span> <span 
class="inserted"><ins><em>iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    &lt;p&gt;Users</em></ins></span> cannot <span 
class="removed"><del><strong>do this freely because they are 
required</strong></del></span> <span class="inserted"><ins><em>make an Apple ID 
(&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>identify themselves.
+  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;While this is</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving</em></ins></span> a <span class="removed"><del><strong>crack 
in</strong></del></span> <span class="inserted"><ins><em>valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>prison walls, it is not big 
enough</strong></del></span> <span class="inserted"><ins><em>verification code 
Apple sends</em></ins></span>
     to
   <span class="removed"><del><strong>mean that the iThings are no longer 
jails.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-  More examples of Apple's arbitrary</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>receiving the verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+  More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -978,7 +966,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/13 13:01:44 $
+$Date: 2019/05/08 15:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-apple.ja.po  13 Apr 2019 13:01:44 -0000      1.102
+++ proprietary/po/malware-apple.ja.po  8 May 2019 15:01:36 -0000       1.103
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2016-12-20 14:42+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -91,10 +91,6 @@
 msgstr "<a href=\"#censorship\">検閲</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">欺き</a>"
-
-#. type: Content of: <div><ul><li>
 #, fuzzy
 #| msgid ""
 #| "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo; "
@@ -127,6 +123,12 @@
 "るシステム。"
 
 #. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">欺き</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">圧力</a>"
 
@@ -224,32 +226,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Appleの欺き"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Dark patterns&rdquo;は<a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">ユーザを混乱させる、もしくは理解するのが困難なように設計されたユーザイ"
-"ンタフェースです</a>。"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"これはAppleのような会社が「ユーザがオフにすることが可能です」と言うことを可能"
-"としつつ、実際にはほとんどのユーザがどのようにオフにするか理解しないことを保"
-"証します。"
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "AppleのDRM"
 
@@ -683,6 +659,34 @@
 "検閲していることを認めました</a>。"
 
 #. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Appleの欺き"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Dark patterns&rdquo;は<a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">ユーザを混乱させる、もしくは理解するのが困難なように設計されたユーザイ"
+"ンタフェースです</a>。"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"これはAppleのような会社が「ユーザがオフにすることが可能です」と言うことを可能"
+"としつつ、実際にはほとんどのユーザがどのようにオフにするか理解しないことを保"
+"証します。"
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Appleの圧力"
 

Index: proprietary/po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-apple.nl-diff.html   13 Apr 2019 13:01:44 -0000      
1.57
+++ proprietary/po/malware-apple.nl-diff.html   8 May 2019 15:01:36 -0000       
1.58
@@ -71,11 +71,11 @@
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
   &lt;li&gt;&lt;a href="#back-doors"&gt;Back doors&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#censorship"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
+<span class="inserted"><ins><em>&lt;!--</em></ins></span> &lt;li&gt;&lt;a 
<span 
class="removed"><del><strong>href="#insecurity"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+&lt;li&gt;&lt;a 
href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span> 
<span 
class="inserted"><ins><em>href="#deception"&gt;Deception&lt;/a&gt;&lt;/li&gt; 
--&gt;</em></ins></span>
   &lt;li&gt;&lt;a href="#drm"&gt;Digital restrictions
     management&lt;/a&gt; or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means 
functionalities</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;DRM&rdquo;&mdash;functionalities</em></ins></span>
 designed
     to restrict what users can do with the data in their computers.&lt;/li&gt;
@@ -84,7 +84,8 @@
 &lt;!-- &lt;li&gt;&lt;a 
href="#interference"&gt;Interference&lt;/a&gt;&lt;/li&gt; --&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#jails"&gt;Jails&lt;/a&gt;&mdash;systems
     that impose censorship on application programs.&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="#manipulation"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+  &lt;li&gt;&lt;a href="#pressuring"&gt;Pressuring&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#sabotage"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a href="#surveillance"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
   &lt;li&gt;&lt;a</em></ins></span> 
href="#tyrants"&gt;Tyrants&lt;/a&gt;&mdash;systems
@@ -144,122 +145,87 @@
 
 &lt;h3 id="censorship"&gt;Apple Censorship&lt;/h3&gt;
 <span class="removed"><del><strong>&lt;ul&gt;
-&lt;li&gt;&lt;p&gt;
-Apple censors
-games, &lt;a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
-some games from the cr&hellip;app store&lt;/a&gt; because 
of</strong></del></span>
-
-<span class="inserted"><ins><em>&lt;p&gt;Apple mainly uses 
iOS,</em></ins></span> which <span class="removed"><del><strong>political
-points they suggest. Some political points are apparently considered
-acceptable.&lt;/p&gt;
-&lt;/li&gt;
+&lt;li&gt;&lt;p&gt;</strong></del></span>
 
-&lt;li&gt;&lt;p&gt;
-Apple &lt;a href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
-banned</strong></del></span> <span 
class="inserted"><ins><em>is</em></ins></span> a <span 
class="removed"><del><strong>program from the App Store&lt;/a&gt; because its 
developers
-committed the enormity of disassembling some iThings.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-Apple rejected an app that displayed the locations of US drone
-assassinations, giving various excuses. Each time</strong></del></span> <span 
class="inserted"><ins><em>typical jail, to impose censorship
-through</em></ins></span> the <span class="removed"><del><strong>developers
-fixed one &ldquo;problem&rdquo;,</strong></del></span> Apple <span 
class="removed"><del><strong>complained about another.
-After</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to</em></ins></span> the <span class="removed"><del><strong>fifth 
rejection,
-Apple</strong></del></span> &lt;a <span 
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
-it was censoring the app based on the subject matter&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;
-As of 2015, Apple</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
+<span class="inserted"><ins><em>&lt;p&gt;Apple mainly uses iOS, which is a 
typical jail, to impose censorship
+through the</em></ins></span> Apple <span class="removed"><del><strong>censors
+games,</strong></del></span> <span class="inserted"><ins><em>Store. Please 
refer to the</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game"&gt;banning
+some games from</strong></del></span> <span 
class="inserted"><ins><em>href="#jails"&gt;Apple Jails&lt;/a&gt;
 section for more information.&lt;/p&gt;
 
-&lt;h3 id="deception"&gt;Apple Deception&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201308290"&gt;
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps that endorse abortion
-rights</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users,</em></ins></span> or <span 
class="removed"><del><strong>would help women find 
abortions&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;
-This particular political slant &lt;a 
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
-affects other</strong></del></span> <span class="inserted"><ins><em>make 
option settings hard
-    to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such as</em></ins></span> Apple <span 
class="removed"><del><strong>services&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;</strong></del></span> <span class="inserted"><ins><em>to 
say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;
-  &lt;/li&gt;</em></ins></span>
-&lt;/ul&gt;
-
-
-&lt;h3 <span class="removed"><del><strong>id="insecurity"&gt;Apple 
Insecurity&lt;/h3&gt;
 
-&lt;ul&gt;
-  &lt;li&gt;
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker
-    to</strong></del></span> <span class="inserted"><ins><em>id="drm"&gt;Apple 
DRM&lt;/h3&gt;
+&lt;h3 id="drm"&gt;Apple DRM&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201704070.1"&gt;
-    &lt;p&gt;DRM makes the iPhone 7 nearly</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malacious code from any application which</strong></del></span>
-    <span 
class="inserted"><ins><em>href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by 
anyone else but Apple.&lt;/p&gt;
+    &lt;p&gt;DRM makes</em></ins></span> the <span 
class="removed"><del><strong>cr&hellip;app store&lt;/a&gt; because of which 
political
+points they suggest. Some political points are apparently considered
+acceptable.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>iPhone 7 nearly &lt;a
+    href="#iphone7-sabotage"&gt;unrepairable&lt;/a&gt; by anyone else but 
Apple.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201512260"&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201512260"&gt;
     &lt;p&gt;&lt;a
-    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;
-    Apple</em></ins></span> uses <span class="removed"><del><strong>this 
API</strong></del></span> <span class="inserted"><ins><em>DRM 
software</em></ins></span> to <span 
class="removed"><del><strong>render</strong></del></span> <span 
class="inserted"><ins><em>prevent people from charging an iThing
-    with</em></ins></span> a <span class="removed"><del><strong>certain kind 
of image file&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>generic USB 
cable&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    
href="https://motherboard.vice.com/en_us/article/bmvxp4/switzerland-wants-a-single-universal-phone-charger-by-2017"&gt;</em></ins></span>
+    Apple <span class="removed"><del><strong>&lt;a 
href="http://ifixit.org/blog/7401/ifixit-app-pulled/"&gt;
+banned a program</strong></del></span> <span class="inserted"><ins><em>uses 
DRM software to prevent people</em></ins></span> from <span 
class="removed"><del><strong>the App Store&lt;/a&gt; because its developers
+committed the enormity of disassembling some iThings.
+&lt;/p&gt;&lt;/li&gt;
 
-  <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A bug</strong></del></span>
+&lt;li&gt;&lt;p&gt;
+Apple rejected</strong></del></span> <span 
class="inserted"><ins><em>charging</em></ins></span> an <span 
class="removed"><del><strong>app that displayed</strong></del></span> <span 
class="inserted"><ins><em>iThing
+    with a generic USB cable&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M200811210"&gt;
+  &lt;li id="M200811210"&gt;
     &lt;p&gt;&lt;a
     
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
-    DRM (digital restrictions mechanisms)</em></ins></span> in <span 
class="inserted"><ins><em>MacOS&lt;/a&gt;. This article
-    focuses on</em></ins></span> the <span 
class="removed"><del><strong>iThings Messages
-      app &lt;a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed</strong></del></span>
 <span class="inserted"><ins><em>fact that</em></ins></span> a <span 
class="inserted"><ins><em>new model of Macbook introduced a
-    requirement for monitors to have</em></ins></span> malicious <span 
class="removed"><del><strong>web site</strong></del></span> <span 
class="inserted"><ins><em>hardware, but DRM software
-    in MacOS is involved in activating the hardware. The software for
+    DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
+    focuses on</em></ins></span> the <span 
class="removed"><del><strong>locations</strong></del></span> <span 
class="inserted"><ins><em>fact that a new model</em></ins></span> of <span 
class="removed"><del><strong>US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple &lt;a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;admitted
+it was censoring</strong></del></span> <span class="inserted"><ins><em>Macbook 
introduced a
+    requirement for monitors to have malicious hardware, but DRM software
+    in MacOS is involved in activating</em></ins></span> the <span 
class="removed"><del><strong>app based</strong></del></span> <span 
class="inserted"><ins><em>hardware. The software for
     accessing iTunes is also responsible.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200708130"&gt;
     &lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-    DRM that caters</em></ins></span> to <span 
class="removed"><del><strong>extract all</strong></del></span> <span 
class="inserted"><ins><em>Bluray disks&lt;/a&gt;.  (The article focused on 
Windows
-    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>user's messaging history&lt;/a&gt;.
-    &lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same 
thing subsequently.)&lt;/p&gt;
+    DRM that caters to Bluray disks&lt;/a&gt;.  (The article 
focused</em></ins></span> on <span class="inserted"><ins><em>Windows
+    and said that MacOS would do</em></ins></span> the <span 
class="removed"><del><strong>subject matter&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;
+As</strong></del></span> <span class="inserted"><ins><em>same thing 
subsequently.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200703310"&gt;
     &lt;p&gt;iTunes videos have DRM, which allows Apple to &lt;a
     href="https://en.wikipedia.org/wiki/FairPlay"&gt;dictate where its
-    customers can watch the videos they 
purchased&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    customers can watch the videos they purchased&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
 
 
-&lt;h3 <span class="removed"><del><strong>id="interference"&gt;Apple 
Interference&lt;/h3&gt;
-&lt;p&gt;Various proprietary</strong></del></span> <span 
class="inserted"><ins><em>id="incompatibility"&gt;Apple 
Incompatibility&lt;/h3&gt;
+&lt;h3 id="incompatibility"&gt;Apple Incompatibility&lt;/h3&gt;
 
-&lt;p&gt;In this section, we list characteristics of Apple</em></ins></span> 
programs <span class="removed"><del><strong>often mess up</strong></del></span> 
<span class="inserted"><ins><em>that block or
+&lt;p&gt;In this section, we list characteristics</em></ins></span> of <span 
class="removed"><del><strong>2015,</strong></del></span> Apple <span 
class="inserted"><ins><em>programs that block or
 hinder users from switching to any alternative program&mdash;and, in
-particular, from switching to free software which can 
liberate</em></ins></span> the <span class="removed"><del><strong>user's 
system. They are like sabotage, but</strong></del></span> <span 
class="inserted"><ins><em>device
+particular, from switching to free software which can liberate the device
 the software runs on.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201803300"&gt;
-    &lt;p&gt;In MacOS and iOS, the procedure for &lt;a
-    
href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
+    &lt;p&gt;In MacOS and iOS, the procedure for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"&gt;systematically
 bans apps</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac"&gt;
     converting images from the Photos format&lt;/a&gt; to a free format is so
-    tedious and time-consuming that users just give up if</em></ins></span> 
they <span class="removed"><del><strong>are not grave 
enough</strong></del></span> <span class="inserted"><ins><em>have a
+    tedious and time-consuming</em></ins></span> that <span 
class="removed"><del><strong>endorse abortion
+rights</strong></del></span> <span class="inserted"><ins><em>users just give 
up if they have a
     lot of them.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -267,7 +233,9 @@
     &lt;p&gt;Apple devices lock users in &lt;a
     
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
     solely to Apple services&lt;/a&gt; by being designed to be incompatible
-    with all other options, ethical or unethical.&lt;/p&gt;
+    with all other options, ethical</em></ins></span> or <span 
class="removed"><del><strong>would help women find 
abortions&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;</strong></del></span> <span 
class="inserted"><ins><em>unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201605044"&gt;
@@ -276,38 +244,47 @@
     href="https://en.wikipedia.org/wiki/IWork"&gt;provides no means of
     converting them to or from Open Document Formats&lt;/a&gt;. iWork
     formats have changed several times since they were first
-    introduced. This may have had the effect of thwarting &lt;a
-    href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse engineering
+    introduced.</em></ins></span> This <span 
class="removed"><del><strong>particular political slant</strong></del></span> 
<span class="inserted"><ins><em>may have had the effect of 
thwarting</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"&gt;
+affects other Apple services&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://github.com/obriensp/iWorkFileFormat"&gt;reverse
 engineering
     efforts&lt;/a&gt;, thus preventing free software from fully supporting
     them.&lt;/p&gt;
 
     &lt;p&gt;iWork formats are considered &lt;a
     
href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&amp;modificationDate=1459873751000&amp;api=v2"&gt;
     unfit for document preservation&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
+  &lt;/li&gt;</em></ins></span>
 &lt;/ul&gt;
 
 
 &lt;h3 id="insecurity"&gt;Apple Insecurity&lt;/h3&gt;
 
-&lt;p&gt;These bugs are/were not intentional, so unlike the rest of the file
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;p&gt;These bugs are/were not intentional, 
so unlike the rest of the file
   they do not count as malware. We mention them to refute the
   supposition that prestigious proprietary software doesn't have grave
   bugs.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201607220"&gt;
+  &lt;li id="M201607220"&gt;</em></ins></span>
     &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
-    malicious code from any application which uses this API to render a
+    <span class="removed"><del><strong>malacious</strong></del></span>
+    <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
     certain kind of image file&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201604120"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201604120"&gt;</em></ins></span>
     &lt;p&gt;A bug in the iThings Messages app &lt;a
     
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/"&gt;allowed
-    a malicious web site to extract all the user's messaging
-    history&lt;/a&gt;.&lt;/p&gt;
+    a malicious web site to extract all the user's messaging <span 
class="removed"><del><strong>history&lt;/a&gt;.
+    &lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>history&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311120"&gt;
@@ -319,21 +296,24 @@
     the universal back door that we know nearly all portable
     phones have. It may involve exploiting various bugs.  There are &lt;a
     
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
-    lots of bugs in the phones' radio software&lt;/a&gt;.&lt;/p&gt;
+    lots of bugs in the phones' radio 
software&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
-&lt;!--
+<span class="inserted"><ins><em>&lt;!--</em></ins></span>
 &lt;h3 id="interference"&gt;Apple Interference&lt;/h3&gt;
 &lt;p&gt;Various proprietary programs often mess up the user's system. They 
are like sabotage, but they are not grave enough to qualify 
 for the word &ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. 
This section describes examples of Apple committing
-interference.&lt;/p&gt; --&gt;
+interference.&lt;/p&gt;
+
+<span class="removed"><del><strong>&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;Apple forced millions</strong></del></span> <span 
class="inserted"><ins><em>--&gt;
 
 
 &lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
 
 &lt;p&gt;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&amp;oldid=835861046"&gt;
-iOS, the operating system of the Apple iThings, is the prototype
+iOS, the operating system</em></ins></span> of <span 
class="removed"><del><strong>iThings</strong></del></span> <span 
class="inserted"><ins><em>the Apple iThings, is the prototype
 of a jail&lt;/a&gt;.  It was Apple that introduced the practice of
 designing general purpose computers with censorship of application
 programs.&lt;/p&gt;
@@ -439,13 +419,9 @@
   &lt;/li&gt;
 
   &lt;li id="M201405250"&gt;
-    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>qualify</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    &lt;p&gt;Apple used this censorship power in 2014</em></ins></span> to 
<span class="removed"><del><strong>download</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-    ban all bitcoin apps&lt;/a&gt;</em></ins></span> for the <span 
class="removed"><del><strong>word &ldquo;sabotage&rdquo;. Nonetheless, they are 
nasty and wrong. This section describes examples of Apple committing
-interference.&lt;/p&gt;
-
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;Apple forced millions of</strong></del></span> iThings 
<span class="removed"><del><strong>to download</strong></del></span> <span 
class="inserted"><ins><em>for</em></ins></span> a <span 
class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
+    ban all bitcoin apps&lt;/a&gt; for the iThings for</em></ins></span> a 
<span class="removed"><del><strong>system upgrade</strong></del></span> <span 
class="inserted"><ins><em>time.  It also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0="&gt;without
 asking</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/"&gt;
     banned a game about growing marijuana&lt;/a&gt;, while permitting games
     about other crimes such as killing people.  Perhaps Apple considers
@@ -458,7 +434,23 @@
     time the developers fixed one &ldquo;problem&rdquo;,</em></ins></span> 
Apple <span class="removed"><del><strong>did not forcibly 
install</strong></del></span>
     <span class="inserted"><ins><em>complained about another.  
After</em></ins></span> the <span class="removed"><del><strong>upgrade 
but</strong></del></span> <span class="inserted"><ins><em>fifth rejection, 
Apple &lt;a
     href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/"&gt;
-    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    admitted it was censoring</em></ins></span> the <span 
class="removed"><del><strong>downloading alone caused lots of 
trouble.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>app 
based on the subject matter&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;
+
+
+&lt;h3 id="manipulation"&gt;Apple Manipulation&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201308290"&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
+    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+    interfaces designed to mislead users, or make option settings hard
+    to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
+    to turn this off&rdquo; while ensuring that few will understand how
+    to actually turn it off.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -484,30 +476,28 @@
 
 <span class="removed"><del><strong>&lt;p&gt;The wrongs in this 
section</strong></del></span>
 
-<span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span 
class="inserted"><ins><em>situations</em></ins></span> in <span 
class="removed"><del><strong>a way</strong></del></span> <span 
class="inserted"><ins><em>which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span 
class="removed"><del><strong>hurts</strong></del></span> <span 
class="inserted"><ins><em>harm them or block their work.&lt;/p&gt;
+<span class="inserted"><ins><em>&lt;p&gt;These</em></ins></span> are <span 
class="removed"><del><strong>not precisely malware, since 
they</strong></del></span> <span class="inserted"><ins><em>situations in which 
Apple employs its power over users
+to directly intervene in ways that harm them or block their work.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201810240"&gt;
     &lt;p&gt;Apple and Samsung deliberately &lt;a
-    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade</em></ins></span>
-    the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>performance 
of older phones to force users to buy their newer
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
     phones&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201805310"&gt;
     &lt;p&gt;Apple has &lt;a
     
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia"&gt;blocked
-    Telegram from upgrading its app for</em></ins></span> a <span 
class="removed"><del><strong>lot like malware, since they</strong></del></span> 
<span class="inserted"><ins><em>month&lt;/a&gt;.&lt;/p&gt;
+    Telegram from upgrading its app for a month&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This evidently has to do with Russia's command to Apple to block
+    &lt;p&gt;This evidently has to</em></ins></span> do <span 
class="inserted"><ins><em>with Russia's command to Apple to block
     Telegram in Russia.&lt;/p&gt;
 
-    &lt;p&gt;The Telegram client is free software on other platforms, but not 
on
-    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they</em></ins></span>
-    are <span class="removed"><del><strong>technical</strong></del></span> 
<span class="inserted"><ins><em>jails&lt;/a&gt;, they don't permit any app to 
be free software.&lt;/p&gt;
+    &lt;p&gt;The Telegram client is free software on other platforms, 
but</em></ins></span> not <span class="removed"><del><strong>involve 
making</strong></del></span> <span class="inserted"><ins><em>on
+    iThings. Since &lt;a 
href="/proprietary/proprietary-jails.html#apple"&gt;they
+    are jails&lt;/a&gt;, they don't permit any app to be free 
software.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201710044"&gt;
@@ -522,8 +512,7 @@
     
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete"&gt;fixing
     bugs for older model iThings&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Meanwhile,</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> 
<span class="inserted"><ins><em>stops people from fixing problems themselves;
+    &lt;p&gt;Meanwhile, Apple stops people from fixing problems themselves;
     that's the nature of proprietary software.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -534,8 +523,10 @@
     brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it&lt;/a&gt;.
     &ldquo;Unauthorized&rdquo; essentially means anyone besides 
Apple.&lt;/p&gt;
 
-    &lt;p&gt;The article uses the term &ldquo;lock&rdquo;
-    to describe the DRM, but we prefer</em></ins></span> to <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;The article uses</em></ins></span> the <span 
class="removed"><del><strong>program that runs in a way that 
hurts</strong></del></span> <span class="inserted"><ins><em>term 
&ldquo;lock&rdquo;
+    to describe</em></ins></span> the <span class="removed"><del><strong>user.
+But they are a lot like malware, since they are technical Apple
+actions that harm</strong></del></span> <span class="inserted"><ins><em>DRM, 
but we prefer</em></ins></span> to <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="inserted"><ins><em>term &lt;a
     href="/philosophy/words-to-avoid.html#DigitalLocks"&gt; digital
     handcuffs&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -694,11 +685,11 @@
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"&gt;
   MacOS automatically sends to Apple servers unsaved documents being
-  edited&lt;/a&gt;. The &lt;a
-  
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
+  edited&lt;/a&gt;. The</strong></del></span> <span 
class="inserted"><ins><em>of them through</em></ins></span> &lt;a
+  <span 
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&amp;utm_medium=twitter"&gt;
   things you have not decided to save are even more sensitive than the
-  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>of them through &lt;a
-    
href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  things you have stored in files&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash"&gt;PRISM&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
   <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;Apple</strong></del></span>
@@ -788,96 +779,93 @@
   &lt;li&gt;&lt;p&gt;&lt;a
   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm"&gt;
   DRM (digital restrictions mechanisms) in MacOS&lt;/a&gt;. This article
-  focuses on the fact that a new model of Macbook introduced a requirement
-  for monitors to have malicious hardware, but DRM software in MacOS is
-  involved in activating the hardware. The software for accessing iTunes
-  is also responsible.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
-  DRM that caters to Bluray disks&lt;/a&gt;.  (The article focused on Windows
-  and said that MacOS would do the same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
-&lt;/ul&gt;
-
-&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
-  iOS, the operating system of the Apple iThings, is a jail for
-  users.&lt;/a&gt;  That means it imposes censorship of application 
programs.&lt;/p&gt;
-
-  &lt;p&gt;Apple has used this power to
-  &lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
-  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
-
-  &lt;p&gt;Apple, in the iThings, pioneered the practice</strong></del></span>
+  focuses on the fact that a new model</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201407230"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services"&gt;
-    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>general purpose
-  computers that are jails, and the term comes from iThing users, who
-  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
-
-  &lt;p&gt;Here</strong></del></span> <span class="inserted"><ins><em>iOS seem 
to exist
-    for no possible purpose other than surveillance&lt;/a&gt;.  
Here</em></ins></span> is <span class="removed"><del><strong>an article 
about</strong></del></span> the &lt;a
-  <span 
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
-  code signing&lt;/a&gt; that the iThings use</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
-    Technical presentation&lt;/a&gt;.&lt;/p&gt;
+    Several &ldquo;features&rdquo;</em></ins></span> of <span 
class="removed"><del><strong>Macbook introduced a requirement
+  for monitors</strong></del></span> <span class="inserted"><ins><em>iOS 
seem</em></ins></span> to <span class="removed"><del><strong>have malicious 
hardware, but DRM software in MacOS is
+  involved in activating the hardware. The software</strong></del></span> 
<span class="inserted"><ins><em>exist</em></ins></span>
+    for <span class="removed"><del><strong>accessing 
iTunes</strong></del></span> <span class="inserted"><ins><em>no possible 
purpose other than surveillance&lt;/a&gt;.  Here</em></ins></span> is <span 
class="removed"><del><strong>also responsible.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>the &lt;a
+    
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf"&gt;
+    Technical presentation&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201401100.1"&gt;
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/"&gt;
+  DRM that caters</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201401100.1"&gt;
     &lt;p&gt;&lt;a
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
+    Spotlight search&lt;/a&gt; sends users' search terms</em></ins></span> to 
<span class="removed"><del><strong>Bluray disks&lt;/a&gt;.  (The article 
focused on Windows
+  and said that MacOS would do</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201401100"&gt;
     &lt;p&gt;The &lt;a class="not-a-duplicate"
     
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html"&gt;
-    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>user.&lt;/p&gt;
+    iBeacon&lt;/a&gt; lets stores determine exactly where</em></ins></span> 
the <span class="removed"><del><strong>same thing 
subsequently.)&lt;/p&gt;&lt;/li&gt;
+&lt;/ul&gt;
 
-  &lt;p&gt;Curiously,</strong></del></span> <span 
class="inserted"><ins><em>iThing is, and
+&lt;h3 id="jails"&gt;Apple Jails&lt;/h3&gt;
+&lt;ul&gt;
+  &lt;li&gt;&lt;p&gt;&lt;a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html"&gt;
+  iOS,</strong></del></span> <span class="inserted"><ins><em>iThing is, and
     get other info too.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201312300"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep"&gt;
-    Either</em></ins></span> Apple <span class="removed"><del><strong>is 
beginning to allow limited passage through the
-  walls of</strong></del></span> <span 
class="inserted"><ins><em>helps</em></ins></span> the <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="inserted"><ins><em>data in an iThing, or it
+    Either Apple helps</em></ins></span> the <span 
class="removed"><del><strong>operating system of</strong></del></span> <span 
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span 
class="inserted"><ins><em>data in an iThing, or it
     is totally incompetent&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201308080"&gt;
-    &lt;p&gt;The</em></ins></span> iThing <span 
class="removed"><del><strong>jail: users</strong></del></span> <span 
class="inserted"><ins><em>also &lt;a
+    &lt;p&gt;The iThing also &lt;a
     
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"&gt;
-    tells Apple its geolocation&lt;/a&gt; by default, though 
that</em></ins></span> can <span class="removed"><del><strong>now install apps 
built from
-  source code, provided the source code</strong></del></span> <span 
class="inserted"><ins><em>be
+    tells</em></ins></span> Apple <span 
class="removed"><del><strong>iThings,</strong></del></span> <span 
class="inserted"><ins><em>its geolocation&lt;/a&gt; by default, though that can 
be
     turned off.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201210170"&gt;
-    &lt;p&gt;There</em></ins></span> is <span 
class="removed"><del><strong>written in Swift.  Users
-  cannot do this freely because they are required</strong></del></span> <span 
class="inserted"><ins><em>also a feature for web sites</em></ins></span> to 
<span class="removed"><del><strong>identify themselves.
-  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+    &lt;p&gt;There</em></ins></span> is <span 
class="inserted"><ins><em>also</em></ins></span> a <span 
class="removed"><del><strong>jail</strong></del></span> <span 
class="inserted"><ins><em>feature</em></ins></span> for
+  <span class="removed"><del><strong>users.&lt;/a&gt;  That means it imposes 
censorship of application programs.&lt;/p&gt;
+
+  &lt;p&gt;Apple has used this power</strong></del></span> <span 
class="inserted"><ins><em>web sites</em></ins></span> to
+  <span class="removed"><del><strong>&lt;a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html"&gt;
+  censor all bitcoin apps&lt;/a&gt; for the iThings.&lt;/p&gt;
+
+  &lt;p&gt;Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from 
iThing</strong></del></span> <span 
class="inserted"><ins><em>track</em></ins></span> users, <span 
class="removed"><del><strong>who
+  referred to escaping from the censorship as 
&ldquo;jailbreaking.&rdquo;&lt;/p&gt;
 
-  &lt;p&gt;While this</strong></del></span> <span 
class="inserted"><ins><em>track users, which</em></ins></span> is <span 
class="removed"><del><strong>a crack in the prison walls,</strong></del></span> 
<span class="inserted"><ins><em>&lt;a
+  &lt;p&gt;Here</strong></del></span> <span 
class="inserted"><ins><em>which</em></ins></span> is <span 
class="removed"><del><strong>an</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/"&gt;
-    enabled by default&lt;/a&gt;.  (That article talks about iOS 6, 
but</em></ins></span> it is <span class="removed"><del><strong>not big 
enough</strong></del></span>
-    <span class="inserted"><ins><em>still true in iOS 7.)&lt;/p&gt;
+    enabled by default&lt;/a&gt;.  (That</em></ins></span> article <span 
class="inserted"><ins><em>talks</em></ins></span> about <span 
class="removed"><del><strong>the &lt;a
+  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"&gt;
+  code signing&lt;/a&gt; that the iThings use to jail the user.&lt;/p&gt;
+
+  &lt;p&gt;Curiously, Apple is beginning to allow limited passage through the
+  walls of the the iThing jail: users can now install apps built from
+  source code, provided the source code</strong></del></span> <span 
class="inserted"><ins><em>iOS 6, but it</em></ins></span> is <span 
class="removed"><del><strong>written</strong></del></span>
+    <span class="inserted"><ins><em>still true</em></ins></span> in <span 
class="removed"><del><strong>Swift.  Users</strong></del></span> <span 
class="inserted"><ins><em>iOS 7.)&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201204280"&gt;
-    &lt;p&gt;Users cannot make an Apple ID (&lt;a
+    &lt;p&gt;Users</em></ins></span> cannot <span 
class="removed"><del><strong>do this freely because they are 
required</strong></del></span> <span class="inserted"><ins><em>make an Apple ID 
(&lt;a
     
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id"&gt;necessary</em></ins></span>
+    to <span class="removed"><del><strong>identify themselves.
+  &lt;a href="https://developer.apple.com/xcode/"&gt;Here are 
details.&lt;/a&gt;&lt;/p&gt;
+
+  &lt;p&gt;While this is</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without 
giving</em></ins></span> a <span class="removed"><del><strong>crack 
in</strong></del></span> <span class="inserted"><ins><em>valid
+    email address and receiving</em></ins></span> the <span 
class="removed"><del><strong>prison walls, it is not big 
enough</strong></del></span> <span class="inserted"><ins><em>verification code 
Apple sends</em></ins></span>
     to
   <span class="removed"><del><strong>mean that the iThings are no longer 
jails.&lt;/p&gt;&lt;/li&gt;
 
   &lt;li&gt;&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans"&gt;
-  More examples of Apple's arbitrary</strong></del></span> <span 
class="inserted"><ins><em>install even gratis apps&lt;/a&gt;) without giving a 
valid
-    email address</em></ins></span> and <span 
class="removed"><del><strong>inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>receiving the verification code Apple sends
-    to it.&lt;/p&gt;</em></ins></span>
+  More examples of Apple's arbitrary and inconsistent 
censorship&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>it.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
 
@@ -978,7 +966,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/13 13:01:44 $
+$Date: 2019/05/08 15:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-apple.nl.po  13 Apr 2019 13:01:44 -0000      1.57
+++ proprietary/po/malware-apple.nl.po  8 May 2019 15:01:36 -0000       1.58
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2017-01-10 22:15+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -94,10 +94,6 @@
 msgstr "<a href=\"#censorship\">Censuur</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Oplichterij</a>"
-
-#. type: Content of: <div><ul><li>
 # | <a href=\"#drm\">Digital restrictions management</a> or
 # | [-&ldquo;DRM&rdquo; means functionalities-]
 # | {+&ldquo;DRM&rdquo;&mdash;functionalities+} designed to restrict what
@@ -137,6 +133,14 @@
 "toepassingen."
 
 #. type: Content of: <div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Oplichterij</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Be&iuml;nvloeden</a>"
 
@@ -226,32 +230,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Apple-oplichterij"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Donkere patronen&rdquo; zijn <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">gebruikersinterfaces die zijn ontworpen om gebruikers te misleiden, of "
-"instellingen moeilijk vindbaar te maken</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Hiermee kan een bedrijf als Apple zeggen: &ldquo;Wij zorgen ervoor dat "
-"gebruikers dit kunnen uitzetten&rdquo; terwijl ze er toch voor zorgen dat "
-"weinigen begrijpen hoe het echt uit te zetten."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "Apple-DRM"
 
@@ -669,6 +647,35 @@
 "op basis van de inhoud</a>."
 
 #. type: Content of: <h3>
+# | Apple [-Deception-] {+Manipulation+}
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Apple-oplichterij"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Donkere patronen&rdquo; zijn <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">gebruikersinterfaces die zijn ontworpen om gebruikers te misleiden, of "
+"instellingen moeilijk vindbaar te maken</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Hiermee kan een bedrijf als Apple zeggen: &ldquo;Wij zorgen ervoor dat "
+"gebruikers dit kunnen uitzetten&rdquo; terwijl ze er toch voor zorgen dat "
+"weinigen begrijpen hoe het echt uit te zetten."
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Apple-invloed"
 

Index: proprietary/po/malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/malware-apple.pot    13 Apr 2019 13:01:44 -0000      1.69
+++ proprietary/po/malware-apple.pot    8 May 2019 15:01:36 -0000       1.70
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -74,10 +74,6 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr ""
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or "
 "&ldquo;DRM&rdquo;&mdash;functionalities designed to restrict what users can "
@@ -99,6 +95,10 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li>
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr ""
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr ""
 
@@ -165,25 +165,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a "
-"href=\"http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you\";>user
 "
-"interfaces designed to mislead users, or make option settings hard to "
-"find</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr ""
 
@@ -472,6 +453,25 @@
 msgstr ""
 
 #. type: Content of: <h3>
+msgid "Apple Manipulation"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a "
+"href=\"http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you\";>user
 "
+"interfaces designed to mislead users, or make option settings hard to "
+"find</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr ""
 

Index: proprietary/po/malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- proprietary/po/malware-apple.ru.po  13 Apr 2019 14:59:56 -0000      1.190
+++ proprietary/po/malware-apple.ru.po  8 May 2019 15:01:36 -0000       1.191
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-13 12:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-01-29 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 14:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -93,10 +94,6 @@
 msgstr "<a href=\"#censorship\"> Цензура</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\"> Обман</a>"
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo;"
 "&mdash;functionalities designed to restrict what users can do with the data "
@@ -123,6 +120,14 @@
 "на прикладные программы."
 
 #. type: Content of: <div><ul><li>
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\"> Обман</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\"> Давление</a>"
 
@@ -212,32 +217,6 @@
 "\">Тюрьмы</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Обман"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Темные тактики&rdquo; представляют <a 
href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">элементы интерфейса пользователя, 
спроектированные так, чтобы вводить "
-"пользователей в заблуждение или 
затруднить нахождение настроек</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Это позволяет таким компаниям как Apple 
заявлять: &ldquo;Мы позволяем "
-"пользователям отключить это&rdquo;, 
гарантируя в то же время, что мало кто "
-"поймет, как же это отключить."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "Цифровое управление ограничениями"
 
@@ -667,6 +646,35 @@
 "drone-strikes/\">признала, что это цензура 
приложения по тематике</a>."
 
 #. type: Content of: <h3>
+# | Apple [-Deception-] {+Manipulation+}
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Обман"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Темные тактики&rdquo; представляют <a 
href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">элементы интерфейса пользователя, 
спроектированные так, чтобы вводить "
+"пользователей в заблуждение или 
затруднить нахождение настроек</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Это позволяет таким компаниям как Apple 
заявлять: &ldquo;Мы позволяем "
+"пользователям отключить это&rdquo;, 
гарантируя в то же время, что мало кто "
+"поймет, как же это отключить."
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Давление"
 

Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/malware-appliances.de-diff.html      11 Apr 2019 07:00:32 
-0000      1.42
+++ proprietary/po/malware-appliances.de-diff.html      8 May 2019 15:01:36 
-0000       1.43
@@ -71,41 +71,49 @@
 
   &lt;li&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its manufacturer can 
communicate with it,
-      is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>surveillance 
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two
+      is</strong></del></span> <span class="inserted"><ins><em>URL 
of</em></ins></span> a <span class="removed"><del><strong>surveillance device. 
&lt;a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+       Canary camera is an example&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
 &lt;/div&gt;
 &lt;div class="column-limit" id="malware-appliances"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;</em></ins></span>
+    &lt;p&gt;The <span class="removed"><del><strong>article describes 
wrongdoing by</strong></del></span> <span class="inserted"><ins><em>Jibo robot 
toys were tethered to</em></ins></span> the <span 
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span 
class="inserted"><ins><em>manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>fact</strong></del></span> <span 
class="inserted"><ins><em>company made them all cease to work&lt;/a&gt; by 
shutting down</em></ins></span> that
+    <span class="inserted"><ins><em>server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, 
since</em></ins></span> the <span class="removed"><del><strong>device is 
tethered</strong></del></span>
+    <span class="inserted"><ins><em>product was designed</em></ins></span> to 
<span class="inserted"><ins><em>manipulate people by 
presenting</em></ins></span> a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about 
proprietary tethering&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;But it also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201903210"&gt;
-    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-       Canary camera is</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
-    two vulnerabilities that affect several models of implantable
-    defibrillators&lt;/a&gt; and the devices they connect to.&lt;/p&gt;
+    &lt;p&gt;The Medtronics Conexus Telemetry Protocol has &lt;a
+    
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/"&gt;
+    two vulnerabilities</em></ins></span> that <span 
class="inserted"><ins><em>affect several models of implantable
+    defibrillators&lt;/a&gt; and</em></ins></span> the <span 
class="removed"><del><strong>device gives</strong></del></span> <span 
class="inserted"><ins><em>devices they connect to.&lt;/p&gt;
 
     &lt;p&gt;This protocol has been around since 2006, and similar
-    vulnerabilities were discovered in</em></ins></span> an <span 
class="removed"><del><strong>example&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;The article describes wrongdoing</strong></del></span> <span 
class="inserted"><ins><em>earlier Medtronics communication
-    protocol in 2008. Apparently, nothing was done</em></ins></span> by the 
<span class="removed"><del><strong>manufacturer, based on the fact
-      that the device is tethered</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span> to <span 
class="removed"><del><strong>a server.&lt;/p&gt;
-    &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More 
about</strong></del></span>
-    <span class="inserted"><ins><em>correct them. This means you can't rely 
on</em></ins></span> proprietary <span 
class="removed"><del><strong>tethering&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;But it also demonstrates</strong></del></span> <span 
class="inserted"><ins><em>software
-    developers to fix bugs in their products.&lt;/p&gt;
+    vulnerabilities were discovered in an earlier Medtronics communication
+    protocol in 2008. Apparently, nothing was done by</em></ins></span> the 
company
+      <span class="removed"><del><strong>surveillance 
capability.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>to
+    correct them. This means you can't rely on proprietary software
+    developers to fix bugs in their products.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201902270"&gt;
-    &lt;p&gt;The Ring (now Amazon) doorbell camera is designed 
so</em></ins></span> that the <span class="removed"><del><strong>device 
gives</strong></del></span>
-    <span class="inserted"><ins><em>manufacturer (now Amazon) can watch 
all</em></ins></span> the <span class="removed"><del><strong>company
-      surveillance capability.&lt;/p&gt;
-&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump</strong></del></span>
   
-&lt;li&gt;
-  &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump designed for
-    hospitals</strong></del></span> <span class="inserted"><ins><em>time. Now 
it turns out
+  <span class="inserted"><ins><em>&lt;li id="M201902270"&gt;
+    &lt;p&gt;The Ring (now Amazon) doorbell camera is</em></ins></span> 
designed <span class="removed"><del><strong>for
+    hospitals</strong></del></span> <span class="inserted"><ins><em>so that the
+    manufacturer (now Amazon) can watch all the time. Now it turns out
     that &lt;a 
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/"&gt;
     anyone else can also watch, and fake videos too&lt;/a&gt;.&lt;/p&gt;
 
@@ -125,12 +133,11 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201902080"&gt;</em></ins></span>
     &lt;p&gt;The <span class="removed"><del><strong>bad security in many 
Internet of Stings devices
-    allows</strong></del></span> <span 
class="inserted"><ins><em>HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs
-    to snoop on the people</strong></del></span>
+    allows</strong></del></span> <span 
class="inserted"><ins><em>HP</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html"&gt;
-    &ldquo;ink subscription&rdquo; cartridges have DRM</em></ins></span> that 
<span class="removed"><del><strong>use them&lt;/a&gt;.&lt;/p&gt;
-  &lt;p&gt;Don't be a sucker&mdash;reject all</strong></del></span> <span 
class="inserted"><ins><em>constantly
-    communicates with HP servers&lt;/a&gt; to make sure</em></ins></span> the 
<span class="removed"><del><strong>stings.&lt;/p&gt;
+    &ldquo;ink subscription&rdquo; cartridges have DRM that constantly
+    communicates with HP servers&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>snoop on</strong></del></span> <span 
class="inserted"><ins><em>make sure</em></ins></span> the <span 
class="removed"><del><strong>people that use them&lt;/a&gt;.&lt;/p&gt;
+  &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
   &lt;p&gt;It</strong></del></span> <span 
class="inserted"><ins><em>user</em></ins></span> is <span 
class="removed"><del><strong>unfortunate that</strong></del></span> <span 
class="inserted"><ins><em>still
     paying for</em></ins></span> the <span 
class="removed"><del><strong>article uses</strong></del></span> <span 
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
     paid for.&lt;/p&gt;
@@ -194,17 +201,17 @@
 &lt;li&gt;
 &lt;p&gt;When Miele's Internet</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019"&gt;
-    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of <span class="removed"><del><strong>Stings hospital 
disinfectant dishwasher is
-&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> the <span class="removed"><del><strong>Internet,
-its security</strong></del></span> <span class="inserted"><ins><em>company's
-    CTO, and this data</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
-&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>sold</em></ins></span> to <span 
class="removed"><del><strong>the dishwasher's filesystem,
- infect it with malware,</strong></del></span> <span 
class="inserted"><ins><em>third parties. This is in return for
-    &ldquo;better service&rdquo; (meaning more intrusive 
ads?)</em></ins></span> and <span class="removed"><del><strong>force the 
dishwasher</strong></del></span> <span class="inserted"><ins><em>slightly
+    collect &ldquo;whatever the TV sees,&rdquo;&lt;/a&gt; in the own 
words</em></ins></span> of <span class="removed"><del><strong>Stings hospital 
disinfectant dishwasher</strong></del></span> <span 
class="inserted"><ins><em>the company's
+    CTO, and this data</em></ins></span> is
+<span class="removed"><del><strong>&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
 <span class="inserted"><ins><em>sold</em></ins></span> to <span 
class="removed"><del><strong>the Internet,
+its security</strong></del></span> <span class="inserted"><ins><em>third 
parties. This</em></ins></span> is <span 
class="removed"><del><strong>crap&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;For example, a cracker can gain access</strong></del></span> <span 
class="inserted"><ins><em>in return for
+    &ldquo;better service&rdquo; (meaning more intrusive ads?) and slightly
     lower retail prices.&lt;/p&gt;
 
-    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>launch attacks on
- other devices</strong></del></span> <span class="inserted"><ins><em>make this 
spying acceptable, according to him,
+    &lt;p&gt;What is supposed</em></ins></span> to <span 
class="removed"><del><strong>the dishwasher's filesystem,
+ infect it with malware, and force the dishwasher</strong></del></span> <span 
class="inserted"><ins><em>make this spying acceptable, 
according</em></ins></span> to <span class="removed"><del><strong>launch 
attacks on
+ other devices</strong></del></span> <span class="inserted"><ins><em>him,
     is that it is opt-in</em></ins></span> in <span 
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span 
class="removed"><del><strong>network. Since these dishwashers are used in 
hospitals,
  such attacks could potentially put hundreds of lives at risk.&lt;/p&gt;
 
@@ -349,23 +356,21 @@
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span>
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have back doors that give 
HP</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
-    
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;We link to</em></ins></span> the <span 
class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors</strong></del></span> 
<span class="inserted"><ins><em>article for the facts it presents. It
-    is too bad</em></ins></span> that <span class="removed"><del><strong>give 
HP
-&lt;a
-href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access to</strong></del></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>article finishes by 
advocating</em></ins></span> the <span class="removed"><del><strong>back door 
allows
-installation</strong></del></span>
-    <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span 
class="removed"><del><strong>software changes, a change could be installed that
-would give access</strong></del></span> <span 
class="inserted"><ins><em>surrendering</em></ins></span> to <span 
class="removed"><del><strong>the customer's data.
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>this does not give HP
+access</strong></del></span> <span class="inserted"><ins><em>install a 
surveillance app&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;We link</em></ins></span> to the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>article for</em></ins></span> the <span 
class="removed"><del><strong>back door allows
+installation of software changes, a change could be 
installed</strong></del></span> <span class="inserted"><ins><em>facts it 
presents. It
+    is too bad</em></ins></span> that
+<span class="removed"><del><strong>would give access to</strong></del></span> 
the <span class="removed"><del><strong>customer's data.
 &lt;/p&gt;
 &lt;/li&gt;
 
@@ -376,12 +381,13 @@
 dlink of an eye.&lt;/p&gt;
 
 &lt;p&gt;
-&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many models of routers
+&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models</strong></del></span> <span class="inserted"><ins><em>article finishes 
by advocating the
+    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>routers
 have back doors&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;</strong></del></span> 
<span class="inserted"><ins><em>Netflix.</em></ins></span> The <span 
class="removed"><del><strong>TP-Link router has a 
backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix app &lt;a
+&lt;p&gt;&lt;a 
href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt;</strong></del></span> 
<span class="inserted"><ins><em>surrendering to Netflix.</em></ins></span> The 
<span class="removed"><del><strong>TP-Link router has a 
backdoor&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -395,286 +401,210 @@
     <span 
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347"&gt;
     solely to Apple services&lt;/a&gt; by being</em></ins></span> designed 
<span class="inserted"><ins><em>to be incompatible</em></ins></span>
     with <span class="removed"><del><strong>DRM&lt;/a&gt;: it won't accept
-third-party printing materials.  It is the Keurig</strong></del></span> <span 
class="inserted"><ins><em>all other options, ethical or unethical.&lt;/p&gt;
+third-party printing materials.  It is</strong></del></span> <span 
class="inserted"><ins><em>all other options, ethical or unethical.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201712240"&gt;
-    &lt;p&gt;One</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it is
-being discontinued, which means that eventually authorized materials won't
-be available and the printers may become unusable.&lt;/p&gt;
-
-&lt;p&gt;With a &lt;a 
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
-printer that gets the Respects Your Freedom&lt;/a&gt;, this problem would not
-even be a remote possibility.&lt;/p&gt;
-
-&lt;p&gt;How pitiful that</strong></del></span> the <span 
class="removed"><del><strong>author</strong></del></span> <span 
class="inserted"><ins><em>dangers</em></ins></span> of <span 
class="removed"><del><strong>that article says that there was
-&ldquo;nothing wrong&rdquo; with designing the device to restrict users 
in</strong></del></span> the <span class="removed"><del><strong>first place.  
This</strong></del></span> <span class="inserted"><ins><em>&ldquo;internet of 
stings&rdquo;</em></ins></span>
-    is <span class="removed"><del><strong>like putting a &ldquo;cheat me and 
mistreat me&rdquo;
-sign on</strong></del></span> <span class="inserted"><ins><em>that, if you 
lose</em></ins></span> your <span class="removed"><del><strong>chest.  We 
should know better: we should condemn all companies
-that take advantage</strong></del></span> <span 
class="inserted"><ins><em>internet service, you also &lt;a
+    &lt;p&gt;One of</em></ins></span> the <span 
class="removed"><del><strong>Keurig</strong></del></span> <span 
class="inserted"><ins><em>dangers</em></ins></span> of <span 
class="removed"><del><strong>printers.  Now it</strong></del></span> <span 
class="inserted"><ins><em>the &ldquo;internet of stings&rdquo;</em></ins></span>
+    is
+<span class="removed"><del><strong>being discontinued, which means that 
eventually authorized materials won't</strong></del></span> <span 
class="inserted"><ins><em>that, if you lose your internet service, you also 
&lt;a
     
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/"&gt;
-    lose control</em></ins></span> of <span 
class="removed"><del><strong>people like him.  Indeed, it 
is</strong></del></span> <span class="inserted"><ins><em>your house and 
appliances&lt;/a&gt;.&lt;/p&gt;
+    lose control of your house and appliances&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;For your safety, don't use any appliance with a connection 
to</em></ins></span> the <span class="removed"><del><strong>acceptance of
-their unjust practice that teaches people</strong></del></span>
-    <span class="inserted"><ins><em>real internet.&lt;/p&gt;
+    &lt;p&gt;For your safety, don't use any appliance with a connection to the
+    real internet.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711200"&gt;
-    &lt;p&gt;Amazon recently invited consumers</em></ins></span> to be <span 
class="removed"><del><strong>doormats.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span> <span 
class="inserted"><ins><em>suckers and</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
-have been designed not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
-    allow delivery staff</em></ins></span> to <span 
class="removed"><del><strong>interact with other companies' smart
-lightbulbs&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;If a product is &ldquo;smart&rdquo;, and</strong></del></span> <span 
class="inserted"><ins><em>open their front doors&lt;/a&gt;. 
Wouldn't</em></ins></span> you <span class="removed"><del><strong>didn't 
build</strong></del></span> <span 
class="inserted"><ins><em>know</em></ins></span>
-    it, <span class="removed"><del><strong>it is
-cleverly serving its manufacturer &lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
-DVDs and Bluray disks have DRM&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;That page uses spin terms that favor DRM,
-including &lt;a 
href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
-digital &ldquo;rights&rdquo; management&lt;/a&gt;
-and &lt;a 
href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,
-and it claims that &ldquo;artists&rdquo; (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks.  Nonetheless, it is a reference for</strong></del></span> the 
<span class="removed"><del><strong>facts.
-&lt;/p&gt;
-
-&lt;p&gt;Every Bluray disk (with few, rare exceptions)</strong></del></span> 
<span class="inserted"><ins><em>system</em></ins></span> has <span 
class="removed"><del><strong>DRM&mdash;so
-don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a grave security flaw.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;Amazon recently invited consumers to</em></ins></span> be <span 
class="removed"><del><strong>available</strong></del></span> <span 
class="inserted"><ins><em>suckers</em></ins></span> and <span 
class="inserted"><ins><em>&lt;a
+    
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"&gt;
+    allow delivery staff to open their front doors&lt;/a&gt;. Wouldn't you know
+    it,</em></ins></span> the <span class="removed"><del><strong>printers may 
become unusable.&lt;/p&gt;
+
+&lt;p&gt;With</strong></del></span> <span class="inserted"><ins><em>system 
has</em></ins></span> a <span class="inserted"><ins><em>grave security 
flaw.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
-&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>id="M201711100"&gt;
-    &lt;p&gt;A remote-control sex toy was found to make &lt;a
-    
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
-    recordings</em></ins></span> of <span 
class="removed"><del><strong>network-connected surveillance cameras 
have</strong></del></span> <span class="inserted"><ins><em>the conversation 
between two users&lt;/a&gt;.&lt;/p&gt;
+  &lt;li id="M201711100"&gt;
+    &lt;p&gt;A remote-control sex toy was found to make</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects"&gt;
+printer that gets</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei"&gt;audio
+    recordings of</em></ins></span> the <span 
class="removed"><del><strong>Respects Your 
Freedom&lt;/a&gt;,</strong></del></span> <span 
class="inserted"><ins><em>conversation between two users&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711080"&gt;
     &lt;p&gt;Logitech will sabotage
-    all Harmony Link household control devices by</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
-security bugs</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
+    all Harmony Link household control devices by &lt;a
+    
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/"&gt;
     turning off the server through which the products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
-    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that <span class="removed"><del><strong>allow 
anyone</strong></del></span>
-    <span class="inserted"><ins><em>requires users</em></ins></span> to <span 
class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>talk with them</em></ins></span> through <span 
class="removed"><del><strong>them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>some specialized 
service.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;The owners suspect</em></ins></span> this <span 
class="removed"><del><strong>problem would not
+even be</strong></del></span> <span class="inserted"><ins><em>is to pressure 
them to buy</em></ins></span> a <span class="removed"><del><strong>remote 
possibility.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has</strong></del></span>
+&lt;p&gt;How pitiful that the author of</strong></del></span> <span 
class="inserted"><ins><em>newer model. If
+    they are wise, they will learn, rather, to distrust any 
product</em></ins></span> that
+    <span class="inserted"><ins><em>requires users to talk with them through 
some specialized service.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201710040"&gt;
+  &lt;li id="M201710040"&gt;
     &lt;p&gt;Every &ldquo;home security&rdquo; camera, if its
-    manufacturer can communicate with it, is</em></ins></span> a <span 
class="removed"><del><strong>big security hole;</strong></del></span> <span 
class="inserted"><ins><em>surveillance device.</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
-unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
-
-&lt;p&gt;Samsung claims that this</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
-    Canary camera</em></ins></span> is an <span 
class="removed"><del><strong>&ldquo;open&rdquo; platform 
so</strong></del></span> <span 
class="inserted"><ins><em>example&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article describes wrongdoing by</em></ins></span> the
-<span class="removed"><del><strong>problem is partly</strong></del></span> 
<span class="inserted"><ins><em>manufacturer, based on</em></ins></span>
-    the <span class="removed"><del><strong>fault of app developers. That is 
clearly true if</strong></del></span> <span class="inserted"><ins><em>fact 
that</em></ins></span> the <span class="removed"><del><strong>apps are 
proprietary software.&lt;/p&gt;
-
-&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>device</em></ins></span> is <span 
class="removed"><del><strong>most likely going</strong></del></span> <span 
class="inserted"><ins><em>tethered</em></ins></span> to
-<span class="removed"><del><strong>screw you.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>a server.&lt;/p&gt;
+    manufacturer can communicate with it, is a surveillance device. &lt;a
+    
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change"&gt;
+    Canary camera is an example&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The</em></ins></span> article <span 
class="removed"><del><strong>says</strong></del></span> <span 
class="inserted"><ins><em>describes wrongdoing by the manufacturer, based on
+    the fact</em></ins></span> that <span class="removed"><del><strong>there 
was
+&ldquo;nothing wrong&rdquo; with designing</strong></del></span> the device 
<span class="removed"><del><strong>to restrict users in
+the first place.  This</strong></del></span> is <span 
class="removed"><del><strong>like putting</strong></del></span> <span 
class="inserted"><ins><em>tethered to</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;cheat me and mistreat me&rdquo;
+sign on your chest.  We should know better: we should condemn all companies
+that take advantage of people like him.  Indeed,</strong></del></span> <span 
class="inserted"><ins><em>server.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;More about
     proprietary tethering&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;But it also demonstrates that the device gives the company
-    surveillance capability.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;But</em></ins></span> it <span class="inserted"><ins><em>also 
demonstrates that the device gives the company
+    surveillance capability.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;
-Malware found on &lt;a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;
-security cameras available through Amazon&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201709200"&gt;</em></ins></span>
-    &lt;p&gt;A <span class="removed"><del><strong>camera that records locally 
on physical media, and has no network
-connection, does not threaten people with surveillance&mdash;neither
-by watching people through the camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>&ldquo;smart&rdquo; 
intravenous pump
-    designed for hospitals is connected to</em></ins></span> the
-<span class="removed"><del><strong>camera.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>internet. 
Naturally</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-FitBit fitness trackers have a Bluetooth 
vulnerability&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
+  &lt;li id="M201709200"&gt;
+    &lt;p&gt;A &ldquo;smart&rdquo; intravenous pump
+    designed for hospitals</em></ins></span> is <span 
class="inserted"><ins><em>connected to</em></ins></span> the <span 
class="removed"><del><strong>acceptance of
+their unjust practice</strong></del></span> <span 
class="inserted"><ins><em>internet. Naturally &lt;a
+    
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"&gt;
     its security has been cracked&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>allows
-attackers to send malware to</strong></del></span> <span 
class="inserted"><ins><em>this article misuses</em></ins></span> the <span 
class="removed"><del><strong>devices, which can subsequently
-spread</strong></del></span> <span class="inserted"><ins><em>term &lt;a
+    &lt;p&gt;Note</em></ins></span> that <span 
class="removed"><del><strong>teaches people</strong></del></span> <span 
class="inserted"><ins><em>this article misuses the term &lt;a
     
href="/philosophy/words-to-avoid.html#Hacker"&gt;&ldquo;hackers&rdquo;&lt;/a&gt;
-    referring</em></ins></span> to <span 
class="removed"><del><strong>computers and other FitBit trackers that interact 
with
-them.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
+    referring</em></ins></span> to <span class="removed"><del><strong>be 
doormats.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>crackers.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt; &ldquo;Self-encrypting&rdquo; disk drives do the encryption with
-proprietary firmware so you can't trust it.  Western 
Digital's</strong></del></span>
+&lt;p&gt;Philips &ldquo;smart&rdquo; lightbulbs</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201708280"&gt;
     &lt;p&gt;The bad security in many Internet of Stings devices 
allows</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
-&ldquo;My Passport&rdquo; drives have a back door&lt;/a&gt;.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;
-Hospira infusion pumps, which are used to administer 
drugs</strong></del></span>
+<span 
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"&gt;
+have been designed not</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml"&gt;ISPs</em></ins></span>
-    to
-<span class="removed"><del><strong>a patient, were rated &ldquo;&lt;a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
-least secure IP device I've ever seen&lt;/a&gt;&rdquo; by a security
-researcher.&lt;/p&gt;
+    to <span class="removed"><del><strong>interact with other companies' smart
+lightbulbs&lt;/a&gt;.&lt;/p&gt;
 
-&lt;p&gt;Depending</strong></del></span> <span 
class="inserted"><ins><em>snoop</em></ins></span> on <span 
class="removed"><del><strong>what drug</strong></del></span> <span 
class="inserted"><ins><em>the people that use them&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;If</strong></del></span> <span class="inserted"><ins><em>snoop on the 
people that use them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;Don't be a sucker&mdash;reject all the stings.&lt;/p&gt;
+    &lt;p&gt;Don't be</em></ins></span> a <span 
class="removed"><del><strong>product is &ldquo;smart&rdquo;, and you didn't 
build it, it</strong></del></span> <span 
class="inserted"><ins><em>sucker&mdash;reject all the stings.&lt;/p&gt;
 
-    &lt;p&gt;It</em></ins></span> is <span class="removed"><del><strong>being 
infused,</strong></del></span> <span class="inserted"><ins><em>unfortunate 
that</em></ins></span> the <span class="removed"><del><strong>insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>article 
uses</em></ins></span> the <span class="removed"><del><strong>door to 
murder.&lt;/p&gt;
+    &lt;p&gt;It</em></ins></span> is
+<span class="removed"><del><strong>cleverly serving its manufacturer 
&lt;em&gt;against you&lt;/em&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Due to bad security in a drug pump, crackers could use it 
to</strong></del></span> <span class="inserted"><ins><em>term</em></ins></span> 
&lt;a
-<span 
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
-kill patients&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
-&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out</strong></del></span>
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up"&gt;
+DVDs and Bluray disks have DRM&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;That page uses spin terms</strong></del></span> <span 
class="inserted"><ins><em>unfortunate</em></ins></span> that <span 
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>the article 
uses the term</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement"&gt;
+digital &ldquo;rights&rdquo; management&lt;/a&gt;
+and</strong></del></span>
+    <span 
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize"&gt;&ldquo;monetize&rdquo;&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201708230"&gt;
-    &lt;p&gt;Sonos &lt;a
-    
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
-    told all its customers, &ldquo;Agree&rdquo;</em></ins></span>
-    to <span class="inserted"><ins><em>snooping or the product will stop 
working&lt;/a&gt;.  &lt;a
+  &lt;li id="M201708230"&gt;
+    &lt;p&gt;Sonos</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection"&gt;&ldquo;protect&rdquo;&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/"&gt;
+    told all its customers, &ldquo;Agree&rdquo;
+    to snooping or the product will stop working&lt;/a&gt;.  &lt;a
     
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/"&gt;
     Another article&lt;/a&gt; says they won't forcibly change the software, but
-    people won't</em></ins></span> be <span 
class="removed"><del><strong>stupidly vulnerable</strong></del></span> <span 
class="inserted"><ins><em>able</em></ins></span> to
-<span class="removed"><del><strong>intrusion.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>get any upgrades and eventually it will
-    stop working.&lt;/p&gt;</em></ins></span>
+    people won't be able to get any upgrades</em></ins></span> and <span 
class="inserted"><ins><em>eventually</em></ins></span> it <span 
class="removed"><del><strong>claims that &ldquo;artists&rdquo; (rather than 
companies) are
+primarily responsible for putting digital restrictions management into
+these disks.  Nonetheless, it is</strong></del></span> <span 
class="inserted"><ins><em>will
+    stop working.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The &lt;a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
-FTC punished</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201708040"&gt;
-    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>company for making webcams with bad 
security&lt;/a&gt; so
-that it was easy for anyone</strong></del></span> <span 
class="inserted"><ins><em>DJI drone</em></ins></span>
-    to <span class="removed"><del><strong>watch them.&lt;/p&gt;
-&lt;/li&gt;
+  &lt;li id="M201708040"&gt;
+    &lt;p&gt;While you're using</em></ins></span> a <span 
class="removed"><del><strong>reference for the facts.
+&lt;/p&gt;
 
-&lt;li&gt;
-&lt;p&gt;It</strong></del></span> <span class="inserted"><ins><em>snoop on 
other people, DJI</em></ins></span> is <span 
class="removed"><del><strong>possible to</strong></del></span> <span 
class="inserted"><ins><em>in many cases</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
-kill people by taking control</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
-    on you&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;Every Bluray disk (with few, rare exceptions) has DRM&mdash;so
+don't use Bluray disks!&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>DJI drone
+    to snoop on other people, DJI is in many cases &lt;a
+    
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity"&gt;snooping
+    on you&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201706200"&gt;
-    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>medical implants by radio&lt;/a&gt;.  More
-information in &lt;a
-href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC 
News&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected cameras
-    are tremendously insecure.  They have login
-    accounts with hard-coded passwords, which can't be 
changed,</em></ins></span> and &lt;a
-<span 
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
-IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;</strong></del></span>
+  &lt;li <span class="removed"><del><strong>id="cameras-bugs"&gt;
+&lt;p&gt;Over 70 brands</strong></del></span> <span 
class="inserted"><ins><em>id="M201706200"&gt;
+    &lt;p&gt;Many models</em></ins></span> of <span 
class="removed"><del><strong>network-connected 
surveillance</strong></del></span> <span 
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
+    <span class="inserted"><ins><em>are tremendously insecure.  
They</em></ins></span> have <span class="inserted"><ins><em>login
+    accounts with hard-coded passwords, which can't be changed, 
and</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"&gt;
+security bugs that allow anyone</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/"&gt;there
-    is no way to delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    is no way</em></ins></span> to <span class="removed"><del><strong>watch 
through them&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>delete these accounts 
either&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Lots of &lt;a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
+&lt;p&gt;Samsung's &ldquo;Smart Home&rdquo; has a big security hole; &lt;a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"&gt;
+unauthorized people can remotely control it&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Samsung claims that this is an &ldquo;open&rdquo; platform so the
+problem is partly the fault of app developers. That is clearly true if
+the apps are</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201705250"&gt;
-    &lt;p&gt;The proprietary code that runs pacemakers,
-    insulin pumps,</em></ins></span> and <span class="removed"><del><strong>it 
can be fatal.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>other medical devices is &lt;a
-    href="http://www.bbc.co.uk/news/technology-40042584"&gt; full of gross
-    security faults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+    &lt;p&gt;The</em></ins></span> proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-Point-of-sale terminals running Windows were taken 
over&lt;/a&gt;</strong></del></span>
+&lt;p&gt;Anything whose name is &ldquo;Smart&rdquo;</strong></del></span> 
<span class="inserted"><ins><em>code that runs pacemakers,
+    insulin pumps, and other medical devices</em></ins></span> is <span 
class="removed"><del><strong>most likely going to
+screw you.&lt;/p&gt;
+&lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M201705180"&gt;
-    &lt;p&gt;Bird</em></ins></span> and <span 
class="removed"><del><strong>turned
-into a botnet</strong></del></span> <span class="inserted"><ins><em>rabbit 
pets were implemented</em></ins></span> for <span 
class="inserted"><ins><em>Second
-    Life by a company that tethered their food to a server.  &lt;a
+&lt;li&gt;
+&lt;p&gt;
+Malware found on</strong></del></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full of gross</em></ins></span>
+    security <span class="removed"><del><strong>cameras available through 
Amazon&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;A camera that records locally on physical 
media,</strong></del></span> <span 
class="inserted"><ins><em>faults&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201705180"&gt;
+    &lt;p&gt;Bird</em></ins></span> and <span class="removed"><del><strong>has 
no network
+connection, does not threaten people with 
surveillance&mdash;neither</strong></del></span> <span 
class="inserted"><ins><em>rabbit pets were implemented for Second
+    Life</em></ins></span> by <span class="removed"><del><strong>watching 
people through</strong></del></span> <span class="inserted"><ins><em>a company 
that tethered their food to a server.  &lt;a
     
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying"&gt;
-    It shut down</em></ins></span> the <span 
class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>server and the pets more or less 
died&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    It shut down</em></ins></span> the <span 
class="removed"><del><strong>camera, nor through malware 
in</strong></del></span> <span class="inserted"><ins><em>server 
and</em></ins></span> the
+<span class="removed"><del><strong>camera.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>pets more or less 
died&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li <span class="removed"><del><strong>id="vizio-snoop"&gt;
-&lt;p&gt;Vizio</strong></del></span> <span 
class="inserted"><ins><em>id="M201704190"&gt;
-    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
-used</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201704190"&gt;
+    &lt;p&gt;Users are suing Bose for</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+FitBit fitness trackers have</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/"&gt;
-    distributing</em></ins></span> a <span 
class="removed"><del><strong>firmware &ldquo;upgrade&rdquo; to 
make</strong></del></span> <span class="inserted"><ins><em>spyware app 
for</em></ins></span> its <span class="removed"><del><strong>TVs snoop on 
what</strong></del></span> <span 
class="inserted"><ins><em>headphones&lt;/a&gt;.  Specifically,
-    the app would record the names of the audio files</em></ins></span> users 
<span class="removed"><del><strong>watch&lt;/a&gt;.  The TVs did not 
do</strong></del></span> <span class="inserted"><ins><em>listen to
+    distributing</em></ins></span> a <span 
class="removed"><del><strong>Bluetooth vulnerability&lt;/a&gt; that allows
+attackers to send malware</strong></del></span> <span 
class="inserted"><ins><em>spyware app for its headphones&lt;/a&gt;.  
Specifically,
+    the app would record the names of the audio files users listen to
     along with the headphone's unique serial number.&lt;/p&gt;
 
-    &lt;p&gt;The suit accuses</em></ins></span> that <span 
class="removed"><del><strong>when first sold.&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;LG &lt;a
-href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
-&ldquo;smart&rdquo; TVs, unless</strong></del></span> <span 
class="inserted"><ins><em>this was done without</em></ins></span> the <span 
class="removed"><del><strong>purchasers agreed</strong></del></span> <span 
class="inserted"><ins><em>users' consent.
+    &lt;p&gt;The suit accuses that this was done without the users' consent.
     If the fine print of the app said that users gave consent for this,
     would that make it acceptable? No way! It should be flat out &lt;a
-    href="/philosophy/surveillance-vs-democracy.html"&gt; 
illegal</em></ins></span> to <span class="removed"><del><strong>let LG
-begin</strong></del></span> <span class="inserted"><ins><em>design
-    the app</em></ins></span> to snoop <span class="removed"><del><strong>on 
them and distribute their personal data.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>at all&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    href="/philosophy/surveillance-vs-democracy.html"&gt; illegal to design
+    the app to snoop at all&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
-Barbie is going</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201704120"&gt;
+  &lt;li id="M201704120"&gt;
     &lt;p&gt;Anova sabotaged users' cooking devices
-    with a downgrade that tethered them</em></ins></span> to <span 
class="removed"><del><strong>spy&lt;/a&gt; on children and 
adults.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>a 
remote server. &lt;a
+    with a downgrade that tethered them to a remote server. &lt;a
     
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/"&gt;Unless
     users create an account on Anova's servers, their cookers won't
     function&lt;/a&gt;.&lt;/p&gt;
@@ -920,15 +850,10 @@
     are nearby.  Once your Internet devices are paired with
     your TV, advertisers can correlate ads with Web activity, and other &lt;a
     
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/"&gt;
-    cross-device tracking&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    cross-device tracking&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
-Cisco TNP</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201511060"&gt;
+  &lt;li id="M201511060"&gt;
     &lt;p&gt;Vizio goes a step further than other TV
     manufacturers in spying on their users: their &lt;a
     
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
@@ -954,57 +879,113 @@
   &lt;li id="M201510210"&gt;
     &lt;p&gt;FitBit fitness trackers have a &lt;a
     
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-    Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
+    Bluetooth vulnerability&lt;/a&gt; that allows attackers to send 
malware</em></ins></span>
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with them.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201510200"&gt;
-    &lt;p&gt;&ldquo;Self-encrypting&rdquo; disk drives
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt; &ldquo;Self-encrypting&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510200"&gt;
+    &lt;p&gt;&ldquo;Self-encrypting&rdquo;</em></ins></span> disk drives
     do the encryption with proprietary firmware so you
-    can't trust it.  Western Digital's &ldquo;My Passport&rdquo; drives &lt;a
-    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;
+    can't trust it.  Western Digital's <span class="removed"><del><strong>&lt;a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</strong></del></span>
 &ldquo;My Passport&rdquo; drives <span class="inserted"><ins><em>&lt;a
+    
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"&gt;</em></ins></span>
     have a back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201507240"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;
+Hospira infusion pumps, which</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201507240"&gt;
     &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs recognize and &lt;a
     href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/"&gt;track
-    what people are watching&lt;/a&gt;, even if it isn't a TV 
channel.&lt;/p&gt;
+    what people</em></ins></span> are <span class="removed"><del><strong>used 
to administer drugs to
+a patient, were rated &ldquo;&lt;a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;
+least secure IP device I've ever seen&lt;/a&gt;&rdquo; 
by</strong></del></span> <span class="inserted"><ins><em>watching&lt;/a&gt;, 
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
+researcher.&lt;/p&gt;
+
+&lt;p&gt;Depending on what drug is being infused, the insecurity could
+open the door to murder.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>TV channel.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201506080"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201506080"&gt;</em></ins></span>
     &lt;p&gt;Due to bad security in a drug pump, crackers could use it to &lt;a
     
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"&gt;
     kill patients&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201505290"&gt;
-    &lt;p&gt;Verizon cable TV &lt;a
-    
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
-    snoops on what programs people watch, and even what they wanted to
-    record&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/"&gt;
+&ldquo;Smart homes&rdquo;&lt;/a&gt; turn out to be stupidly vulnerable to
+intrusion.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The &lt;a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html"&gt;
+FTC punished a company for making webcams with bad security&lt;/a&gt; so
+that it was easy for anyone to watch them.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;It is possible to &lt;a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/"&gt;
+kill people by taking control of medical implants by radio&lt;/a&gt;.  More
+information in &lt;a
+href="http://www.bbc.co.uk/news/technology-17631838"&gt;BBC News&lt;/a&gt; and
+&lt;a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html"&gt;
+IOActive Labs Research blog&lt;/a&gt;.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Lots of</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505290"&gt;
+    &lt;p&gt;Verizon cable TV</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+hospital equipment has lousy security&lt;/a&gt;,</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/"&gt;
+    snoops on what programs people watch,</em></ins></span> and <span 
class="removed"><del><strong>it can be fatal.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>even what they wanted to
+    record&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201505050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+Point-of-sale terminals running Windows</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201505050"&gt;
     &lt;p&gt;Hospira infusion pumps, which are used
-    to administer drugs to a patient, were rated &ldquo;&lt;a
+    to administer drugs to a patient,</em></ins></span> were <span 
class="removed"><del><strong>taken over&lt;/a&gt; and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated &ldquo;&lt;a
     
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/"&gt;least
-    secure</em></ins></span> IP <span 
class="removed"><del><strong>phones</strong></del></span> <span 
class="inserted"><ins><em>device I've ever seen&lt;/a&gt;&rdquo; by a security
+    secure IP device I've ever seen&lt;/a&gt;&rdquo; by</em></ins></span> a 
<span class="removed"><del><strong>botnet for</strong></del></span> <span 
class="inserted"><ins><em>security
     researcher.&lt;/p&gt;
 
-    &lt;p&gt;Depending on what drug is being infused, the insecurity could open
-    the door to murder.&lt;/p&gt;
+    &lt;p&gt;Depending on what drug is being infused,</em></ins></span> the 
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>insecurity could open
+    the door to murder.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201504300"&gt;
+  &lt;li <span 
class="removed"><del><strong>id="vizio-snoop"&gt;</strong></del></span> <span 
class="inserted"><ins><em>id="M201504300"&gt;</em></ins></span>
     &lt;p&gt;Vizio &lt;a
     
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html"&gt;
     used a firmware &ldquo;upgrade&rdquo; to make its TVs snoop on what
     users watch&lt;/a&gt;.  The TVs did not do that when first sold.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201502180"&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201502180"&gt;
     &lt;p&gt;Barbie &lt;a
     
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;is
     going to spy on children and adults&lt;/a&gt;.&lt;/p&gt;
@@ -1041,7 +1022,7 @@
     better.&lt;/p&gt;
 
     &lt;p&gt;This shows that laws requiring products to get users' formal
-    consent before collecting personal data</em></ins></span> are <span 
class="removed"><del><strong>spying 
devices&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>totally inadequate.
+    consent before collecting personal data are totally inadequate.
     And what happens if a user declines consent? Probably the TV will
     say, &ldquo;Without your consent to tracking, the TV will not
     work.&rdquo;&lt;/p&gt;
@@ -1053,48 +1034,75 @@
   &lt;li id="M201407170"&gt;
     &lt;p id="nest-thermometers"&gt;Nest thermometers send &lt;a
     href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack"&gt;a lot of
-    data about the user&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+    data about the user&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201405200.1"&gt;</em></ins></span>
+    &lt;p&gt;LG &lt;a
+    
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
+    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;
+    &ldquo;smart&rdquo; TVs, unless the purchasers agreed to let LG begin
+    to snoop on them and distribute their personal data.&lt;/p&gt;
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The</strong></del></span>
+&lt;p&gt;&lt;a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673"&gt;
+Barbie is going to spy&lt;/a&gt; on children</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201405200.1"&gt;
-    &lt;p&gt;LG</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712"&gt;Nest
 Cam
-&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
-&ldquo;owner&rdquo; switches it &ldquo;off.&rdquo;&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201404250"&gt;
+    &lt;p&gt;Lots of &lt;a
+    href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
+    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
<span class="removed"><del><strong>adults.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>it can be fatal.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-&lt;p&gt;A</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml"&gt;
-    disabled network features&lt;/a&gt; on &lt;em&gt;previously 
purchased&lt;/em&gt;</em></ins></span>
-    &ldquo;smart&rdquo; <span class="removed"><del><strong>device 
means</strong></del></span> <span class="inserted"><ins><em>TVs, 
unless</em></ins></span> the <span class="removed"><del><strong>manufacturer is 
using it</strong></del></span> <span class="inserted"><ins><em>purchasers 
agreed</em></ins></span> to <span class="removed"><del><strong>outsmart
-you.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201312290"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a
+<span 
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html"&gt;
+Cisco TNP IP phones are spying devices&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Vizio goes a step further than other TV manufacturers in 
spying</strong></del></span> <span class="inserted"><ins><em>let LG begin
-    to snoop</em></ins></span> on <span class="inserted"><ins><em>them and 
distribute</em></ins></span> their <span class="removed"><del><strong>users: 
their</strong></del></span> <span class="inserted"><ins><em>personal 
data.&lt;/p&gt;
+&lt;p&gt;The &lt;a
+href="http://www.bbc.com/news/technology-34922712"&gt;Nest Cam
+&ldquo;smart&rdquo; camera is always watching&lt;/a&gt;, even when the
+&ldquo;owner&rdquo; switches</strong></del></span> <span 
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554"&gt; 
Some flash
+    memories have modifiable software&lt;/a&gt;, which makes them vulnerable
+    to viruses.&lt;/p&gt;
+
+    &lt;p&gt;We don't call this a &ldquo;back door&rdquo; 
because</em></ins></span> it <span 
class="removed"><del><strong>&ldquo;off.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;A &ldquo;smart&rdquo; device means the 
manufacturer</strong></del></span> is <span class="removed"><del><strong>using 
it</strong></del></span> <span class="inserted"><ins><em>normal
+    that you can install a new system in a computer, given physical 
access</em></ins></span>
+    to <span class="removed"><del><strong>outsmart
+you.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>it.  
However, memory sticks and cards should not be modifiable in
+    this way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201404250"&gt;
-    &lt;p&gt;Lots of</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;
-&ldquo;smart&rdquo; TVs analyze your viewing habits in 
detail</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/"&gt;
-    hospital equipment has lousy security&lt;/a&gt;,</em></ins></span> and 
-<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers</strong></del></span> <span 
class="inserted"><ins><em>it</em></ins></span> can <span 
class="removed"><del><strong>track you 
-across devices.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;Vizio goes</strong></del></span>
 
-&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>be fatal.&lt;/p&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201312040"&gt;
+    &lt;p&gt;&lt;a
+    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
+    Point-of-sale terminals running Windows were taken over&lt;/a&gt; and
+    turned into</em></ins></span> a <span class="removed"><del><strong>step 
further than other TV manufacturers</strong></del></span> <span 
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
+    card numbers.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201312290"&gt;
-    &lt;p&gt;&lt;a href="http://www.bunniestudios.com/blog/?p=3554"&gt; Some 
flash
-    memories have modifiable software&lt;/a&gt;, which makes them 
vulnerable</em></ins></span>
-    to <span class="removed"><del><strong>turn</strong></del></span> <span 
class="inserted"><ins><em>viruses.&lt;/p&gt;
+  &lt;li id="M201311210"&gt;
+    &lt;p&gt;Spyware</em></ins></span> in <span 
class="removed"><del><strong>spying on 
+their users: their &lt;a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"&gt;</strong></del></span>
 <span class="inserted"><ins><em>LG</em></ins></span> &ldquo;smart&rdquo; TVs 
<span class="removed"><del><strong>analyze your viewing habits in 
detail</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
+    reports what the user watches,</em></ins></span> and 
+<span class="removed"><del><strong>link them your IP address&lt;/a&gt; so that 
advertisers can track you 
+across devices.&lt;/p&gt;
 
-    &lt;p&gt;We don't call</em></ins></span> this <span 
class="removed"><del><strong>off, but having</strong></del></span> <span 
class="inserted"><ins><em>a &ldquo;back door&rdquo; because</em></ins></span> 
it <span class="removed"><del><strong>enabled by default</strong></del></span> 
is <span class="removed"><del><strong>an injustice already.&lt;/p&gt;
+&lt;p&gt;It is possible</strong></del></span> <span 
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span 
class="removed"><del><strong>off, but having it enabled by default
+is an injustice already.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
@@ -1102,32 +1110,15 @@
 millions social media profiles the company already monitors.  Tivo
 customers are unaware they're being watched by advertisers.  By
 combining TV viewing information with online social media
-participation, Tivo</strong></del></span> <span 
class="inserted"><ins><em>normal
-    that you</em></ins></span> can <span class="removed"><del><strong>now &lt;a
+participation, Tivo can now &lt;a
 href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102"&gt;
 correlate TV advertisement with online purchases&lt;/a&gt;, exposing all
-users to</strong></del></span> <span class="inserted"><ins><em>install 
a</em></ins></span> new <span class="removed"><del><strong>combined 
surveillance by default.&lt;/p&gt;
+users to new combined surveillance by default.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Some web and TV advertisements play inaudible 
sounds</strong></del></span> <span class="inserted"><ins><em>system in a 
computer, given physical access</em></ins></span>
-    to <span class="inserted"><ins><em>it.  However, memory sticks and cards 
should not</em></ins></span> be <span class="removed"><del><strong>picked
-up by proprietary malware</strong></del></span> <span 
class="inserted"><ins><em>modifiable in
-    this way.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201312040"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/"&gt;
-    Point-of-sale terminals</em></ins></span> running <span 
class="inserted"><ins><em>Windows were taken over&lt;/a&gt; and
-    turned into a botnet for the purpose of collecting customers' credit
-    card numbers.&lt;/p&gt;
-  &lt;/li&gt;
-
-  &lt;li id="M201311210"&gt;
-    &lt;p&gt;Spyware in LG &ldquo;smart&rdquo; TVs &lt;a
-    
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html"&gt;
-    reports what the user watches, and the switch to turn this off has
+&lt;p&gt;Some web and TV advertisements play inaudible sounds to be picked
+up by proprietary malware running</strong></del></span> <span 
class="inserted"><ins><em>off has
     no effect&lt;/a&gt;.  (The fact that the transmission reports a 404 error
     really means nothing; the server could save that data anyway.)&lt;/p&gt; 
 
@@ -1336,7 +1327,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/11 07:00:32 $
+$Date: 2019/05/08 15:01:36 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/malware-appliances.de.po     11 Apr 2019 07:00:32 -0000      
1.76
+++ proprietary/po/malware-appliances.de.po     8 May 2019 15:01:37 -0000       
1.77
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -108,6 +108,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "

Index: proprietary/po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary/po/malware-appliances.fr.po     11 Apr 2019 08:20:02 -0000      
1.122
+++ proprietary/po/malware-appliances.fr.po     8 May 2019 15:01:37 -0000       
1.123
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-04-11 10:16+0200\n"
 "Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 14:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "

Index: proprietary/po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/malware-appliances.pot       11 Apr 2019 07:00:33 -0000      
1.61
+++ proprietary/po/malware-appliances.pot       8 May 2019 15:01:37 -0000       
1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a "
+"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+"company made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a "
 
"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\";>
 "
 "two vulnerabilities that affect several models of implantable "

Index: proprietary/po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary/po/malware-appliances.ru.po     11 Apr 2019 08:00:13 -0000      
1.156
+++ proprietary/po/malware-appliances.ru.po     8 May 2019 15:01:37 -0000       
1.157
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-12-02 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 14:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "

Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/nl.po        8 May 2019 12:31:42 -0000       1.82
+++ proprietary/po/nl.po        8 May 2019 15:01:37 -0000       1.83
@@ -539,10 +539,6 @@
 msgid "<a href=\"#censorship\">Censorship</a>"
 msgstr "<a href=\"#censorship\">Censuur</a>"
 
-#. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\">Oplichterij</a>"
-
 # | <a href=\"#drm\">Digital restrictions management</a> or
 # | [-&ldquo;DRM&rdquo; means functionalities-]
 # | {+&ldquo;DRM&rdquo;&mdash;functionalities+} designed to restrict what
@@ -582,6 +578,14 @@
 "<a href=\"#jails\">Tralies</a>&mdash;systemen die censuur opleggen op "
 "toepassingen."
 
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\">Oplichterij</a>"
+
 #. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\">Be&iuml;nvloeden</a>"
@@ -672,32 +676,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Apple-oplichterij"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Donkere patronen&rdquo; zijn <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">gebruikersinterfaces die zijn ontworpen om gebruikers te misleiden, of "
-"instellingen moeilijk vindbaar te maken</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Hiermee kan een bedrijf als Apple zeggen: &ldquo;Wij zorgen ervoor dat "
-"gebruikers dit kunnen uitzetten&rdquo; terwijl ze er toch voor zorgen dat "
-"weinigen begrijpen hoe het echt uit te zetten."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "Apple-DRM"
 
@@ -1114,6 +1092,35 @@
 "apple-app-tracks-drone-strikes/\">gaf Apple toe dat het de app censureerde "
 "op basis van de inhoud</a>."
 
+# | Apple [-Deception-] {+Manipulation+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Apple-oplichterij"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Donkere patronen&rdquo; zijn <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">gebruikersinterfaces die zijn ontworpen om gebruikers te misleiden, of "
+"instellingen moeilijk vindbaar te maken</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Hiermee kan een bedrijf als Apple zeggen: &ldquo;Wij zorgen ervoor dat "
+"gebruikers dit kunnen uitzetten&rdquo; terwijl ze er toch voor zorgen dat "
+"weinigen begrijpen hoe het echt uit te zetten."
+
 #. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Apple-invloed"
@@ -1782,6 +1789,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -6851,6 +6872,14 @@
 "\"#f3\">3</a>)"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 
+# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">Oplichterij</a>"
+
 #. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
@@ -8060,6 +8089,12 @@
 "processors will have tyrant software built in</a>."
 msgstr ""
 
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"#deception\">Oplichterij</a>"
+
+#~ msgid "Apple Deception"
+#~ msgstr "Apple-oplichterij"
+
 # | As of April, 201[-7-]{+9+}, the [-files-] {+pages+} in this directory list
 # | around [-3-]{+4+}00 instances of malicious [-functionalities,-]
 # | {+functionalities (with more than 400 references to back them up),+} but

Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/pl.po        8 May 2019 12:31:42 -0000       1.82
+++ proprietary/po/pl.po        8 May 2019 15:01:37 -0000       1.83
@@ -497,15 +497,6 @@
 msgstr ""
 "<a href=\"/philosophy/proprietary/proprietary-censorship.html\">Cenzura</a>"
 
-# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
-# | {+href=\"/proprietary/proprietary-deception.html\">Deception</a>+}
-#. type: Content of: <div><ul><li>
-#, fuzzy
-#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr ""
-"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
-
 # | [-<a href=\"/philosophy/proprietary-drm.html\">Digital-]{+<em>Digital+}
 # | restrictions [-management</a>-] {+management,+} or [-&ldquo;DRM&rdquo;
 # | means-] {+&ldquo;DRM&rdquo;:</em>&nbsp;+} functionalities designed to
@@ -560,6 +551,15 @@
 "<a href=\"/philosophy/proprietary-jails.html\">Więzienia</a>&nbsp;&ndash;"
 "systemy, które wymuszają cenzurę na&nbsp;oprogramowanie."
 
+# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr ""
+"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
+
 #. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr ""
@@ -648,25 +648,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr ""
 
@@ -952,6 +933,25 @@
 msgstr ""
 
 #. type: Content of: <h3>
+msgid "Apple Manipulation"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr ""
 
@@ -1348,6 +1348,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -6338,6 +6352,15 @@
 "\"#f3\">3</a>)"
 msgstr "<a href=\"/philosophy/proprietary-sabotage.html\">Sabotaż</a>"
 
+# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr ""
+"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
+
 # | <a [-href=\"/philosophy/proprietary-sabotage.html\">Sabotage</a>-]
 # | {+href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>+}
 #. type: Content of: <table><tr><td><ul><li>
@@ -7563,6 +7586,15 @@
 "processors will have tyrant software built in</a>."
 msgstr ""
 
+# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
+# | {+href=\"/proprietary/proprietary-deception.html\">Deception</a>+}
+#, fuzzy
+#~| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr ""
+#~ "<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</"
+#~ "a>"
+
 # | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018+} Free
 # | Software Foundation, Inc.
 #, fuzzy

Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/pot  8 May 2019 12:31:42 -0000       1.82
+++ proprietary/po/pot  8 May 2019 15:01:37 -0000       1.83
@@ -434,10 +434,6 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr ""
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo;"
 "&mdash;functionalities designed to restrict what users can do with the data "
@@ -459,6 +455,10 @@
 msgstr ""
 
 #. type: Content of: <div><ul><li>
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr ""
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr ""
 
@@ -525,25 +525,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr ""
 
@@ -829,6 +810,25 @@
 msgstr ""
 
 #. type: Content of: <h3>
+msgid "Apple Manipulation"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr ""
 
@@ -1218,6 +1218,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -5977,6 +5991,10 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><ul><li>
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr ""
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr ""
 

Index: proprietary/po/proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-deception.de-diff.html   20 Apr 2019 16:30:39 
-0000      1.28
+++ proprietary/po/proprietary-deception.de-diff.html   8 May 2019 15:01:37 
-0000       1.29
@@ -53,24 +53,24 @@
     &lt;p id="M201509210"&gt;Volkswagen programmed its car engine computers to 
&lt;a
     
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"&gt;
     detect the Environmental Protection Agency's emission tests&lt;/a&gt;, and
-    run dirty the rest of the time. In real driving,</em></ins></span> the 
<span class="removed"><del><strong>specifics.&lt;/p&gt;
+    run dirty</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
 
 &lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>cars exceeded
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>rest of the 
time. In real driving, the cars exceeded
     emissions standards by a factor of up to 35.&lt;/p&gt;
 
     &lt;p&gt;Using free software would not have stopped Volkswagen from
     programming it this way, but would have made it harder to conceal,
     and given the users the possibility of correcting the deception.&lt;/p&gt;
 
-    &lt;p&gt;Former executives of Volkswagen are being &lt;a
-    
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
+    &lt;p&gt;Former executives of Volkswagen are being</em></ins></span> &lt;a
+    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison"&gt;
     sued over this fraud&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903281"&gt;
-    &lt;p&gt;OfficeMax cheated customers by</em></ins></span> &lt;a
-    <span 
class="inserted"><ins><em>href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/"&gt;
+    &lt;p&gt;OfficeMax cheated customers by &lt;a
+    
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/"&gt;
     using proprietary &ldquo;PC Health Check&rdquo; software&lt;/a&gt; rigged
     to give false results, deceiving the customer into thinking per
     computer was infected and buy unneeded support services from the
@@ -113,36 +113,28 @@
     &lt;p&gt;The</em></ins></span> proprietor of the Pokémon Go game &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business"&gt;
     invites restaurants and other businesses to pay to have the game lure
-    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;
+    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo;
+      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+      interfaces designed to mislead users, or make option settings
+      hard to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
+    users to turn this off&rdquo; while ensuring that few will
+    understand how to actually turn it off.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201511110"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;</em></ins></span>
     &lt;p&gt;A top-ranking proprietary Instagram client promising
     to tell users who's been watching their pictures was in reality &lt;a
     
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
     their credentials&lt;/a&gt;, advertising itself on their feed, and posting
-    images without their consent.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308290"&gt;</em></ins></span>
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings hard
-    to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;
+    images without their consent.&lt;/p&gt;
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A top-ranking proprietary Instagram client promising to tell
-      users who's been watching their pictures was in reality
-      &lt;a 
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
 their credentials&lt;/a&gt;,
-      advertising itself on their feed, and posting images without
-      their consent.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
     &lt;p&gt;Volkswagen programmed its car engine computers to detect the
       Environmental Protection Agency's emission tests,
       and run dirty the rest of the time.&lt;/p&gt;
@@ -217,7 +209,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/20 16:30:39 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-deception.de.po  20 Apr 2019 16:30:39 -0000      
1.40
+++ proprietary/po/proprietary-deception.de.po  8 May 2019 15:01:37 -0000       
1.41
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:43+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -218,31 +218,6 @@
 "sie im Klartext an einen Dritt-Server</a>, bewarb sich selbst auf deren Feed "
 "und veröffentlichte Bilder ohne deren Zustimmung."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"„Dunkle Muster“ sind Bedieneroberflächen, entworfen, Benutzer <a 
href=\"//"
-"www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
-"designed-to-trick-you\" title=\" Harry Brignull, Dark Patterns: inside the "
-"interfaces designed to trick you, unter: The Verge, theverge.com 2013.\">in "
-"die Irre zu führen oder Einstellungsmöglichkeiten schwer auffindbar</a> zu "
-"machen."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Dies erlaubt einem Unternehmen wie Apple zu sagen, <em>„Wir ermöglichen "
-"Benutzern, dies deaktivieren zu können“</em>, während gleichzeitig "
-"sichergestellt wird, dass nur wenige verstehen werden, wie man es "
-"tatsächlich deaktiviert."
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !
@@ -338,6 +313,29 @@
 msgstr "Letzte Änderung:"
 
 #~ msgid ""
+#~ "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ "trick-you\">user interfaces designed to mislead users, or make option "
+#~ "settings hard to find</a>."
+#~ msgstr ""
+#~ "„Dunkle Muster“ sind Bedieneroberflächen, entworfen, Benutzer <a 
href=\"//"
+#~ "www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
+#~ "designed-to-trick-you\" title=\" Harry Brignull, Dark Patterns: inside "
+#~ "the interfaces designed to trick you, unter: The Verge, theverge.com 2013."
+#~ "\">in die Irre zu führen oder Einstellungsmöglichkeiten schwer "
+#~ "auffindbar</a> zu machen."
+
+#~ msgid ""
+#~ "This allows a company such as Apple to say, &ldquo;We allow users to turn "
+#~ "this off&rdquo; while ensuring that few will understand how to actually "
+#~ "turn it off."
+#~ msgstr ""
+#~ "Dies erlaubt einem Unternehmen wie Apple zu sagen, <em>„Wir ermöglichen 
"
+#~ "Benutzern, dies deaktivieren zu können“</em>, während gleichzeitig "
+#~ "sichergestellt wird, dass nur wenige verstehen werden, wie man es "
+#~ "tatsächlich deaktiviert."
+
+#~ msgid ""
 #~ "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
 #~ "emissions\">https://www.petri.com/volkswagen-used-software-to-cheat-on-";
 #~ "emissions</a>."

Index: proprietary/po/proprietary-deception.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/proprietary-deception.es-en.html     27 Apr 2019 12:00:18 
-0000      1.2
+++ proprietary/po/proprietary-deception.es-en.html     8 May 2019 15:01:37 
-0000       1.3
@@ -106,17 +106,6 @@
     their credentials</a>, advertising itself on their feed, and posting
     images without their consent.</p>
   </li>
-
-  <li id="M201308290">
-    <p>&ldquo;Dark patterns&rdquo; are <a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
-    interfaces designed to mislead users, or make option settings hard
-    to find</a>.</p>
-
-    <p>This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.</p>
-  </li>
 </ul>
 
 
@@ -177,7 +166,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/27 12:00:18 $
+$Date: 2019/05/08 15:01:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-deception.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-deception.es.po  27 Apr 2019 11:55:09 -0000      
1.6
+++ proprietary/po/proprietary-deception.es.po  8 May 2019 15:01:37 -0000       
1.7
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-04-27 13:32+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -201,29 +201,6 @@
 "para hacerse publicidad en la fuente de noticias y publicar imágenes de los "
 "usuarios sin su consentimiento."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"Los «<cite>Dark Patterns</cite>» o «diseños oscuros» son <a 
href=\"http://";
-"www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
-"designed-to-trick-you\">interfaces de usuario diseñadas para confundir a los 
"
-"usuarios, o hacer que las opciones de configuración sean difíciles de "
-"encontrar</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Esto hace que una compañía como Apple pueda decir: «Nosotros permitimos a "
-"los usuarios desactivar esto», y al mismo tiempo se asegura de que solo unos 
"
-"pocos entiendan cómo hacerlo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -299,3 +276,24 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Última actualización:"
+
+#~ msgid ""
+#~ "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ "trick-you\">user interfaces designed to mislead users, or make option "
+#~ "settings hard to find</a>."
+#~ msgstr ""
+#~ "Los «<cite>Dark Patterns</cite>» o «diseños oscuros» son <a 
href=\"http://";
+#~ "www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-"
+#~ "designed-to-trick-you\">interfaces de usuario diseñadas para confundir a "
+#~ "los usuarios, o hacer que las opciones de configuración sean difíciles 
de "
+#~ "encontrar</a>."
+
+#~ msgid ""
+#~ "This allows a company such as Apple to say, &ldquo;We allow users to turn "
+#~ "this off&rdquo; while ensuring that few will understand how to actually "
+#~ "turn it off."
+#~ msgstr ""
+#~ "Esto hace que una compañía como Apple pueda decir: «Nosotros permitimos 
a "
+#~ "los usuarios desactivar esto», y al mismo tiempo se asegura de que solo "
+#~ "unos pocos entiendan cómo hacerlo."

Index: proprietary/po/proprietary-deception.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr-en.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/proprietary-deception.fr-en.html     20 Apr 2019 18:30:28 
-0000      1.27
+++ proprietary/po/proprietary-deception.fr-en.html     8 May 2019 15:01:37 
-0000       1.28
@@ -106,17 +106,6 @@
     their credentials</a>, advertising itself on their feed, and posting
     images without their consent.</p>
   </li>
-
-  <li id="M201308290">
-    <p>&ldquo;Dark patterns&rdquo; are <a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
-    interfaces designed to mislead users, or make option settings hard
-    to find</a>.</p>
-
-    <p>This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.</p>
-  </li>
 </ul>
 
 
@@ -177,7 +166,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/20 18:30:28 $
+$Date: 2019/05/08 15:01:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-deception.fr.po  20 Apr 2019 18:03:19 -0000      
1.45
+++ proprietary/po/proprietary-deception.fr.po  8 May 2019 15:01:37 -0000       
1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-04-20 20:02+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: fr <address@hidden>\n"
@@ -202,28 +202,6 @@
 "servait pour faire sa propre publicité sur leur flux et mettre des photos en 
"
 "ligne sans leur consentement."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"Les <cite>Dark Patterns</cite> sont <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">des interfaces web conçues pour piéger les utilisateurs ou rendre "
-"certains réglages difficiles à trouver</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Cela permet à une société comme Apple de dire « Nous permettons aux "
-"utilisateurs d'inactiver ceci » tout en s'assurant que peu d'entre eux "
-"comprendront comment le faire."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -295,3 +273,23 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ "trick-you\">user interfaces designed to mislead users, or make option "
+#~ "settings hard to find</a>."
+#~ msgstr ""
+#~ "Les <cite>Dark Patterns</cite> sont <a href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ "trick-you\">des interfaces web conçues pour piéger les utilisateurs ou "
+#~ "rendre certains réglages difficiles à trouver</a>."
+
+#~ msgid ""
+#~ "This allows a company such as Apple to say, &ldquo;We allow users to turn "
+#~ "this off&rdquo; while ensuring that few will understand how to actually "
+#~ "turn it off."
+#~ msgstr ""
+#~ "Cela permet à une société comme Apple de dire « Nous permettons aux "
+#~ "utilisateurs d'inactiver ceci » tout en s'assurant que peu d'entre eux "
+#~ "comprendront comment le faire."

Index: proprietary/po/proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-deception.ja-diff.html   20 Apr 2019 16:30:39 
-0000      1.31
+++ proprietary/po/proprietary-deception.ja-diff.html   8 May 2019 15:01:37 
-0000       1.32
@@ -44,7 +44,7 @@
 <span class="inserted"><ins><em>&lt;div class="important"&gt;
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
-to</em></ins></span> &lt;a <span 
class="inserted"><ins><em>href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
+to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
 to inform us. Please include the URL of a trustworthy reference or two
 to serve as specific substantiation.&lt;/p&gt;
 &lt;/div&gt;
@@ -79,8 +79,8 @@
 
   &lt;li id="M201902041.2"&gt;
     &lt;p&gt;Twenty nine &ldquo;beauty camera&rdquo; apps that used to
-    be on Google Play had one or more malicious functionalities, such as &lt;a
-    
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
+    be on Google Play had one or more malicious functionalities, such 
as</em></ins></span> &lt;a
+    <span 
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923"&gt;
     stealing users' photos instead of &ldquo;beautifying&rdquo; them&lt;/a&gt;,
     pushing unwanted and often malicious ads on users, and redirecting
     them to phishing sites that stole their credentials. Furthermore,
@@ -113,36 +113,28 @@
     &lt;p&gt;The</em></ins></span> proprietor of the Pokémon Go game &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business"&gt;
     invites restaurants and other businesses to pay to have the game lure
-    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;
+    people <span 
class="removed"><del><strong>there&lt;/a&gt;.</strong></del></span> <span 
class="inserted"><ins><em>there&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
+  <span class="removed"><del><strong>&lt;li&gt;
+    &lt;p&gt;&ldquo;Dark patterns&rdquo;
+      are &lt;a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
+      interfaces designed to mislead users, or make option settings
+      hard to find&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow
+    users to turn this off&rdquo; while ensuring that few will
+    understand how to actually turn it off.&lt;/p&gt;
+  &lt;/li&gt;
+  &lt;li&gt;</strong></del></span>
 
-  &lt;li id="M201511110"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201511110"&gt;</em></ins></span>
     &lt;p&gt;A top-ranking proprietary Instagram client promising
     to tell users who's been watching their pictures was in reality &lt;a
     
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
     their credentials&lt;/a&gt;, advertising itself on their feed, and posting
-    images without their consent.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-  <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201308290"&gt;</em></ins></span>
-    &lt;p&gt;&ldquo;Dark patterns&rdquo; are &lt;a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you"&gt;user
-    interfaces designed to mislead users, or make option settings hard
-    to find&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.&lt;/p&gt;
+    images without their consent.&lt;/p&gt;
   &lt;/li&gt;
   <span class="removed"><del><strong>&lt;li&gt;
-    &lt;p&gt;A top-ranking proprietary Instagram client promising to tell
-      users who's been watching their pictures was in reality
-      &lt;a 
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords"&gt;stealing
 their credentials&lt;/a&gt;,
-      advertising itself on their feed, and posting images without
-      their consent.&lt;/p&gt;
-  &lt;/li&gt;
-  &lt;li&gt;
     &lt;p&gt;Volkswagen programmed its car engine computers to detect the
       Environmental Protection Agency's emission tests,
       and run dirty the rest of the time.&lt;/p&gt;
@@ -217,7 +209,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/20 16:30:39 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-deception.ja.po  20 Apr 2019 16:30:39 -0000      
1.39
+++ proprietary/po/proprietary-deception.ja.po  8 May 2019 15:01:37 -0000       
1.40
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2016-11-18 13:31+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -184,28 +184,6 @@
 "stole-instagram-passwords\">ユーザの資æ 
¼(パスワード)を盗用し</a>、アプリ自身"
 
"をユーザのフィードに広告し、同意なしに画像を投稿するのです。"
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Dark patterns&rdquo;は<a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">ユーザを混乱させる、もしくは理解するのが困難なように設計されたユーザイ"
-"ンタフェースです</a>。"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"これはAppleのような会社が「ユーザがオフにすることが可能です」と言うことを可能"
-"としつつ、実際にはほとんどのユーザがどのようにオフにするか理解しないことを保"
-"証します。"
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -281,6 +259,26 @@
 msgstr "最終更新:"
 
 #~ msgid ""
+#~ "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ "trick-you\">user interfaces designed to mislead users, or make option "
+#~ "settings hard to find</a>."
+#~ msgstr ""
+#~ "&ldquo;Dark patterns&rdquo;は<a href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ 
"trick-you\">ユーザを混乱させる、もしくは理解するのが困難なように設計された"
+#~ "ユーザインタフェースです</a>。"
+
+#~ msgid ""
+#~ "This allows a company such as Apple to say, &ldquo;We allow users to turn "
+#~ "this off&rdquo; while ensuring that few will understand how to actually "
+#~ "turn it off."
+#~ msgstr ""
+#~ 
"これはAppleのような会社が「ユーザがオフにすることが可能です」と言うことを"
+#~ 
"可能としつつ、実際にはほとんどのユーザがどのようにオフにするか理解しないこ"
+#~ "とを保証します。"
+
+#~ msgid ""
 #~ "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-";
 #~ "emissions\">https://www.petri.com/volkswagen-used-software-to-cheat-on-";
 #~ "emissions</a>."

Index: proprietary/po/proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-deception.pot    20 Apr 2019 16:30:39 -0000      
1.25
+++ proprietary/po/proprietary-deception.pot    8 May 2019 15:01:37 -0000       
1.26
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -139,21 +139,6 @@
 "without their consent."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a "
-"href=\"http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you\";>user
 "
-"interfaces designed to mislead users, or make option settings hard to "
-"find</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary-deception.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-deception.ru-en.html     22 Apr 2019 08:59:53 
-0000      1.26
+++ proprietary/po/proprietary-deception.ru-en.html     8 May 2019 15:01:37 
-0000       1.27
@@ -106,17 +106,6 @@
     their credentials</a>, advertising itself on their feed, and posting
     images without their consent.</p>
   </li>
-
-  <li id="M201308290">
-    <p>&ldquo;Dark patterns&rdquo; are <a
-    
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
-    interfaces designed to mislead users, or make option settings hard
-    to find</a>.</p>
-
-    <p>This allows a company such as Apple to say, &ldquo;We allow users
-    to turn this off&rdquo; while ensuring that few will understand how
-    to actually turn it off.</p>
-  </li>
 </ul>
 
 
@@ -177,7 +166,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2019/04/22 08:59:53 $
+$Date: 2019/05/08 15:01:37 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/po/proprietary-deception.ru.po  22 Apr 2019 08:59:53 -0000      
1.56
+++ proprietary/po/proprietary-deception.ru.po  8 May 2019 15:01:37 -0000       
1.57
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-20 16:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-09-27 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -200,28 +200,6 @@
 "a>, рекламировала себя на их лентах 
новостей и размещала изображения без "
 "согласия пользователей."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Темные тактики&rdquo; представляют <a 
href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">элементы интерфейса пользователя, 
спроектированные так, чтобы вводить "
-"пользователей в заблуждение или 
затруднить нахождение настроек</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Это позволяет таким компаниям как Apple 
заявлять: &ldquo;Мы позволяем "
-"пользователям отключить это&rdquo;, 
гарантируя в то же время, что мало кто "
-"поймет, как же это отключить."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -297,3 +275,24 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Обновлено:"
+
+#~ msgid ""
+#~ "&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ "trick-you\">user interfaces designed to mislead users, or make option "
+#~ "settings hard to find</a>."
+#~ msgstr ""
+#~ "&ldquo;Темные тактики&rdquo; представляют <a 
href=\"http://www.theverge.";
+#~ "com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-"
+#~ "trick-you\">элементы интерфейса 
пользователя, спроектированные так, чтобы "
+#~ "вводить пользователей в заблуждение или 
затруднить нахождение настроек</"
+#~ "a>."
+
+#~ msgid ""
+#~ "This allows a company such as Apple to say, &ldquo;We allow users to turn "
+#~ "this off&rdquo; while ensuring that few will understand how to actually "
+#~ "turn it off."
+#~ msgstr ""
+#~ "Это позволяет таким компаниям как Apple 
заявлять: &ldquo;Мы позволяем "
+#~ "пользователям отключить это&rdquo;, 
гарантируя в то же время, что мало "
+#~ "кто поймет, как же это отключить."

Index: proprietary/po/proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-tethers.de-diff.html     17 Apr 2019 09:00:34 
-0000      1.18
+++ proprietary/po/proprietary-tethers.de-diff.html     8 May 2019 15:01:37 
-0000       1.19
@@ -50,32 +50,42 @@
 &lt;div class="column-limit" id="proprietary-tethers"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201904040"&gt;
-    &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
-    their DRM is valid by connecting to</em></ins></span> the <span 
class="removed"><del><strong>specifics.&lt;/p&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;</em></ins></span>
+    the <span class="removed"><del><strong>specifics.&lt;/p&gt;
 
 &lt;ul&gt;
 
-&lt;li&gt;
-&lt;p&gt;The game Metal Gear Rising</strong></del></span> <span 
class="inserted"><ins><em>store every time their
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>company made 
them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;</em></ins></span>
+
+    &lt;p&gt;The <span class="removed"><del><strong>game Metal Gear 
Rising</strong></del></span> <span class="inserted"><ins><em>shutdown might 
ironically be good</em></ins></span> for <span 
class="removed"><del><strong>MacOS</strong></del></span> <span 
class="inserted"><ins><em>their users, since the
+    product</em></ins></span> was <span 
class="removed"><del><strong>tethered</strong></del></span> <span 
class="inserted"><ins><em>designed</em></ins></span> to <span 
class="inserted"><ins><em>manipulate people by presenting</em></ins></span> a 
<span class="removed"><del><strong>server.
+The company</strong></del></span> <span class="inserted"><ins><em>phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201904040"&gt;
+    &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
+    their DRM is valid by connecting to the store every time their
     &ldquo;owner&rdquo; wants to read them. Microsoft is going to close
-    this store, &lt;a href="https://www.bbc.com/news/technology-47810367"&gt;
+    this store,</em></ins></span> &lt;a
+<span 
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
+shut down</strong></del></span> <span 
class="inserted"><ins><em>href="https://www.bbc.com/news/technology-47810367"&gt;
     bricking all DRM'ed ebooks it has ever &ldquo;sold&rdquo;&lt;/a&gt;. (The
-    article additionally highlights the pitfalls of DRM.)&lt;/p&gt;
+    article additionally highlights</em></ins></span> the <span 
class="removed"><del><strong>server,</strong></del></span> <span 
class="inserted"><ins><em>pitfalls of DRM.)&lt;/p&gt;
 
     &lt;p&gt;This is another proof that a DRM-encumbered product doesn't belong
     to the person who bought it. Microsoft said it will refund customers,
-    but this is no excuse</em></ins></span> for <span 
class="removed"><del><strong>MacOS was</strong></del></span> <span 
class="inserted"><ins><em>selling them restricted books.&lt;/p&gt;
+    but this is no excuse for selling them restricted books.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201903250"&gt;
-    &lt;p&gt;The British supermarket Tesco sold tablets which 
were</em></ins></span> tethered
-    to <span class="removed"><del><strong>a server.
-The company</strong></del></span> <span class="inserted"><ins><em>Tesco's 
server for reinstalling default settings.  Tesco</em></ins></span> &lt;a
-<span 
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
-shut down</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix"&gt;
-    turned off</em></ins></span> the <span 
class="removed"><del><strong>server,</strong></del></span> <span 
class="inserted"><ins><em>server for old models&lt;/a&gt;, so now if you try to
+    &lt;p&gt;The British supermarket Tesco sold tablets which were tethered
+    to Tesco's server for reinstalling default settings.  Tesco &lt;a
+    
href="https://www.theguardian.com/money/2019/mar/25/tesco-hudl-tablet-support-kill-fix"&gt;
+    turned off the server for old models&lt;/a&gt;, so now if you try to
     reinstall the default settings, it bricks them instead.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -286,7 +296,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 09:00:34 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-tethers.de.po    17 Apr 2019 09:00:34 -0000      
1.30
+++ proprietary/po/proprietary-tethers.de.po    8 May 2019 15:01:37 -0000       
1.31
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-17 08:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:39+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -85,6 +85,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";

Index: proprietary/po/proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-tethers.fr.po    17 Apr 2019 10:46:13 -0000      
1.54
+++ proprietary/po/proprietary-tethers.fr.po    8 May 2019 15:01:37 -0000       
1.55
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-04-17 08:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-04-17 12:45+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 14:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -72,6 +73,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";

Index: proprietary/po/proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/proprietary-tethers.ja-diff.html     17 Apr 2019 09:00:34 
-0000      1.35
+++ proprietary/po/proprietary-tethers.ja-diff.html     8 May 2019 15:01:37 
-0000       1.36
@@ -52,6 +52,17 @@
 &lt;div class="column-limit" id="proprietary-tethers"&gt;&lt;/div&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201904040"&gt;
     &lt;p&gt;Ebooks &ldquo;bought&rdquo; from Microsoft's store check that
     their DRM is valid by connecting to the store every time their
@@ -94,7 +105,7 @@
     the existing trackers stopped working forever&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;The article focuses on a further nasty fillip, that sales of the
-    broken devices continued. But I think that is a secondary issue;
+    broken devices continued. But I think that</em></ins></span> is <span 
class="inserted"><ins><em>a secondary issue;
     it made the nasty consequences extend to some additional people.
     The fundamental wrong was to design the devices to depend on something
     else that didn't respect users' freedom.&lt;/p&gt;
@@ -102,7 +113,10 @@
 
   &lt;li id="M201806250"&gt;
     &lt;p&gt;The game Metal Gear Rising for
-    MacOS was tethered to a server.  The company &lt;a
+    MacOS was</em></ins></span> tethered to a <span 
class="removed"><del><strong>server.&lt;/p&gt;
+
+&lt;ul&gt;
+&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>server.  The 
company &lt;a
     
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"&gt;
     shut down the server, and all copies stopped working&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -114,7 +128,7 @@
     turning off the server through which the products' supposed owners
     communicate with them&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;The owners suspect this</em></ins></span> is <span 
class="inserted"><ins><em>to pressure them to buy a newer model. If
+    &lt;p&gt;The owners suspect this is to pressure them to buy a newer model. 
If
     they are wise, they will learn, rather, to distrust any product that
     requires users to talk with them through some specialized 
service.&lt;/p&gt;
   &lt;/li&gt;
@@ -122,10 +136,7 @@
   &lt;li id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and</em></ins></span> tethered to a <span 
class="removed"><del><strong>server.&lt;/p&gt;
-
-&lt;ul&gt;
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>server that 
requires
+    with a universal back door, and tethered to a server that requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -270,7 +281,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/04/17 09:00:34 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/proprietary-tethers.ja.po    17 Apr 2019 09:00:35 -0000      
1.27
+++ proprietary/po/proprietary-tethers.ja.po    8 May 2019 15:01:37 -0000       
1.28
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-04-17 08:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -66,6 +66,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";

Index: proprietary/po/proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/proprietary-tethers.pot      17 Apr 2019 09:00:35 -0000      
1.27
+++ proprietary/po/proprietary-tethers.pot      8 May 2019 15:01:37 -0000       
1.28
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-04-17 08:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -58,6 +58,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a "
+"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+"company made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a "

Index: proprietary/po/proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary-tethers.ru.po    17 Apr 2019 13:30:15 -0000      
1.61
+++ proprietary/po/proprietary-tethers.ru.po    8 May 2019 15:01:37 -0000       
1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-04-17 08:56+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-10-01 09:13+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-08 14:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -73,6 +74,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Ebooks &ldquo;bought&rdquo; from Microsoft's store check that their DRM is "
 "valid by connecting to the store every time their &ldquo;owner&rdquo; wants "
 "to read them. Microsoft is going to close this store, <a href=\"https://www.";

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary.de-diff.html     8 May 2019 12:31:44 -0000       
1.91
+++ proprietary/po/proprietary.de-diff.html     8 May 2019 15:01:37 -0000       
1.92
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,19 +101,20 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -128,16 +129,16 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -185,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
@@ -244,32 +256,6 @@
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft has been  &lt;a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
-    force-installing a &ldquo;remediation&rdquo;
-    program&lt;/a&gt; on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
-    may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
-    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
-    critical&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a &lt;a
-    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
-    can!&lt;/p&gt;
-
-    &lt;p&gt;If your employer makes you run Windows, tell the financial
-    department how this wastes your time dealing with endless connections
-    and premature hardware failures.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -330,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/08 12:31:44 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary/po/proprietary.de.po    8 May 2019 12:31:44 -0000       1.133
+++ proprietary/po/proprietary.de.po    8 May 2019 15:01:37 -0000       1.134
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -194,6 +194,14 @@
 msgstr "<a href=\"/proprietary/proprietary-sabotage\">Sabotage</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception\">Irreführung</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage\">Sabotage</a>"
 
@@ -431,6 +439,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -503,37 +525,6 @@
 "app-podcast\"> a new one is being developed</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary/po/proprietary.es.po    8 May 2019 12:31:44 -0000       1.160
+++ proprietary/po/proprietary.es.po    8 May 2019 15:01:37 -0000       1.161
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -162,6 +162,14 @@
 "\"#f3\">3</a>)"
 
 #. type: Content of: <table><tr><td><ul><li>
+# | <a [-href=\"/proprietary/proprietary-addictions.html\">Addictions</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-addictions.html\">Adicciones</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotaje</a>"
 
@@ -299,6 +307,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -407,58 +429,6 @@
 "building-a-better-period-tracking-app-podcast\">hay una nueva en desarrollo</"
 "a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-"Microsoft ha estado instalando <a href=\"https://borncity.com/win/2019/01/17/";
-"windows-10-update-kb4023057-re-released-1-16-2019/\">a la fuerza un programa "
-"de «corrección»</a> en ordenadores con ciertas versiones de Windows 10. La 
"
-"corrección, tal como la entiende Microsoft, significa <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\">manipular las "
-"Preferencias y archivos de los usuarios</a>, especialmente para «reparar» "
-"cualquier componente del sistema de actualización que los usuarios puedan "
-"haber desahabilitado intencionalmente, y así recuperar todo el control sobre 
"
-"ellos. Microsoft ha impulsado en repetidas ocasiones la instalación de "
-"versiones defectuosas de este programa en las máquinas de los usuarios, "
-"ocasionando numerosos problemas, algunos de ellos <a href=\"https://www.";
-"windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-"
-"due-to-critical-bugs/\">críticos</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-"Esto muestra la actitud arrogante y manipuladora que los desarrolladores de "
-"software privativo han aprendido a adoptar frente a la gente a cuyo servicio "
-"supuestamente están. ¡Cámbiese a un <a href=\"/distros/free-distros.html"
-"\">sistema operativo libre</a> si puede hacerlo!"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-"Si su patrón le hace utilizar Windows, dígale al departamento financiero la 
"
-"cantidad de tiempo que esto le hace perder con sus continuas conexiones y "
-"fallos prematuros del equipo."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -538,6 +508,57 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/";
+#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "
+#~ "&ldquo;remediation&rdquo; program</a> on computers running certain "
+#~ "versions of Windows 10. Remediation, in Microsoft's view, means <a href="
+#~ "\"https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-";
+#~ "versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with "
+#~ "users' settings and files</a>, notably to &ldquo;repair&rdquo; any "
+#~ "components of the updating system that users may have intentionally "
+#~ "disabled, and thus regain full power over them. Microsoft repeatedly "
+#~ "pushed faulty versions of this program to users' machines, causing "
+#~ "numerous problems, some of which <a href=\"https://www.windowsmode.com/";
+#~ "microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-"
+#~ "bugs/\"> critical</a>."
+#~ msgstr ""
+#~ "Microsoft ha estado instalando <a href=\"https://borncity.com/";
+#~ "win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/\">a la "
+#~ "fuerza un programa de «corrección»</a> en ordenadores con ciertas "
+#~ "versiones de Windows 10. La corrección, tal como la entiende Microsoft, "
+#~ "significa <a href=\"https://support.microsoft.com/en-us/help/4023057/";
+#~ "update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"
+#~ "\">manipular las Preferencias y archivos de los usuarios</a>, "
+#~ "especialmente para «reparar» cualquier componente del sistema de "
+#~ "actualización que los usuarios puedan haber desahabilitado "
+#~ "intencionalmente, y así recuperar todo el control sobre ellos. Microsoft "
+#~ "ha impulsado en repetidas ocasiones la instalación de versiones "
+#~ "defectuosas de este programa en las máquinas de los usuarios, ocasionando 
"
+#~ "numerosos problemas, algunos de ellos <a href=\"https://www.windowsmode.";
+#~ "com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-"
+#~ "critical-bugs/\">críticos</a>."
+
+#~ msgid ""
+#~ "This exemplifies the arrogant and manipulative attitude that proprietary "
+#~ "software developers have learned to adopt toward the people they are "
+#~ "supposedly serving. Migrate to a <a href=\"/distros/free-distros.html"
+#~ "\">free operating system</a> if you can!"
+#~ msgstr ""
+#~ "Esto muestra la actitud arrogante y manipuladora que los desarrolladores "
+#~ "de software privativo han aprendido a adoptar frente a la gente a cuyo "
+#~ "servicio supuestamente están. ¡Cámbiese a un <a href=\"/distros/free-"
+#~ "distros.html\">sistema operativo libre</a> si puede hacerlo!"
+
+#~ msgid ""
+#~ "If your employer makes you run Windows, tell the financial department how "
+#~ "this wastes your time dealing with endless connections and premature "
+#~ "hardware failures."
+#~ msgstr ""
+#~ "Si su patrón le hace utilizar Windows, dígale al departamento financiero 
"
+#~ "la cantidad de tiempo que esto le hace perder con sus continuas "
+#~ "conexiones y fallos prematuros del equipo."
+
+#~ msgid ""
 #~ "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 #~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 #~ "Environmental Protection Agency's emission tests</a>, and run dirty the "

Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.199
retrieving revision 1.200
diff -u -b -r1.199 -r1.200
--- proprietary/po/proprietary.fr.po    8 May 2019 12:31:45 -0000       1.199
+++ proprietary/po/proprietary.fr.po    8 May 2019 15:01:37 -0000       1.200
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-04-28 15:33+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -158,6 +158,14 @@
 "\"#f3\">3</a>)"
 
 #. type: Content of: <table><tr><td><ul><li>
+# | <a [-href=\"/proprietary/proprietary-addictions.html\">Addictions</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-addictions.html\">Addiction</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 
@@ -295,6 +303,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -406,58 +428,6 @@
 "building-a-better-period-tracking-app-podcast\">une autre est en "
 "développement</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-"Depuis quelque temps, Microsoft <a href=\"https://borncity.com/";
-"win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/\">installe "
-"de force un programme de « remédiation »</a> sur les ordinateurs 
utilisant "
-"certaines versions de Windows 10. La remédiation, dans l'interprétation de "
-"Microsoft, consiste à <a href=\"https://support.microsoft.com/en-us/";
-"help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-"
-"for-up\">trafiquer les paramètres et les fichiers de l'utilisateur</a>, "
-"entre autres pour « réparer » les composants du système de mise à jour 
que "
-"l'utilisateur pourrait avoir intentionnellement désactivés, et regagner "
-"ainsi la totalité de son pouvoir sur lui. Microsoft a poussé à plusieurs "
-"reprises des versions défectueuses de ce programme sur les machines des "
-"utilisateurs, ce qui a causé de nombreux problèmes, parfois <a href="
-"\"https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-";
-"update-rollout-due-to-critical-bugs/\">critiques</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-"Voilà un exemple de l'attitude arrogante et manipulatrice que les "
-"développeurs de logiciel privateur ont appris à adopter envers les gens "
-"qu'ils sont censés servir. Migrez vers un <a href=\"/distros/free-distros."
-"html\">système d'exploitation libre</a> si vous le pouvez !"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-"Si votre employeur vous oblige à utiliser Windows, dites au service "
-"financier combien de temps cela vous fait perdre en connexions interminables "
-"et pannes matérielles prématurées."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -533,6 +503,57 @@
 msgstr "Dernière mise à jour :"
 
 #~ msgid ""
+#~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/";
+#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "
+#~ "&ldquo;remediation&rdquo; program</a> on computers running certain "
+#~ "versions of Windows 10. Remediation, in Microsoft's view, means <a href="
+#~ "\"https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-";
+#~ "versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with "
+#~ "users' settings and files</a>, notably to &ldquo;repair&rdquo; any "
+#~ "components of the updating system that users may have intentionally "
+#~ "disabled, and thus regain full power over them. Microsoft repeatedly "
+#~ "pushed faulty versions of this program to users' machines, causing "
+#~ "numerous problems, some of which <a href=\"https://www.windowsmode.com/";
+#~ "microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-"
+#~ "bugs/\"> critical</a>."
+#~ msgstr ""
+#~ "Depuis quelque temps, Microsoft <a href=\"https://borncity.com/";
+#~ "win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"
+#~ "\">installe de force un programme de « remédiation »</a> sur les "
+#~ "ordinateurs utilisant certaines versions de Windows 10. La remédiation, "
+#~ "dans l'interprétation de Microsoft, consiste à <a 
href=\"https://support.";
+#~ "microsoft.com/en-us/help/4023057/update-to-windows-10-"
+#~ "versions-1507-1511-1607-1703-1709-and-1803-for-up\">trafiquer les "
+#~ "paramètres et les fichiers de l'utilisateur</a>, entre autres pour "
+#~ "« réparer » les composants du système de mise à jour que 
l'utilisateur "
+#~ "pourrait avoir intentionnellement désactivés, et regagner ainsi la "
+#~ "totalité de son pouvoir sur lui. Microsoft a poussé à plusieurs 
reprises "
+#~ "des versions défectueuses de ce programme sur les machines des "
+#~ "utilisateurs, ce qui a causé de nombreux problèmes, parfois <a href="
+#~ "\"https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-";
+#~ "update-rollout-due-to-critical-bugs/\">critiques</a>."
+
+#~ msgid ""
+#~ "This exemplifies the arrogant and manipulative attitude that proprietary "
+#~ "software developers have learned to adopt toward the people they are "
+#~ "supposedly serving. Migrate to a <a href=\"/distros/free-distros.html"
+#~ "\">free operating system</a> if you can!"
+#~ msgstr ""
+#~ "Voilà un exemple de l'attitude arrogante et manipulatrice que les "
+#~ "développeurs de logiciel privateur ont appris à adopter envers les gens "
+#~ "qu'ils sont censés servir. Migrez vers un <a 
href=\"/distros/free-distros."
+#~ "html\">système d'exploitation libre</a> si vous le pouvez !"
+
+#~ msgid ""
+#~ "If your employer makes you run Windows, tell the financial department how "
+#~ "this wastes your time dealing with endless connections and premature "
+#~ "hardware failures."
+#~ msgstr ""
+#~ "Si votre employeur vous oblige à utiliser Windows, dites au service "
+#~ "financier combien de temps cela vous fait perdre en connexions "
+#~ "interminables et pannes matérielles prématurées."
+
+#~ msgid ""
 #~ "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 #~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 #~ "Environmental Protection Agency's emission tests</a>, and run dirty the "

Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary.it-diff.html     8 May 2019 12:31:45 -0000       
1.103
+++ proprietary/po/proprietary.it-diff.html     8 May 2019 15:01:37 -0000       
1.104
@@ -40,10 +40,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
@@ -101,19 +101,20 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -184,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
@@ -243,32 +255,6 @@
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft has been  &lt;a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
-    force-installing a &ldquo;remediation&rdquo;
-    program&lt;/a&gt; on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
-    may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
-    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
-    critical&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a &lt;a
-    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
-    can!&lt;/p&gt;
-
-    &lt;p&gt;If your employer makes you run Windows, tell the financial
-    department how this wastes your time dealing with endless connections
-    and premature hardware failures.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -329,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/08 12:31:45 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary/po/proprietary.it.po    8 May 2019 12:31:45 -0000       1.142
+++ proprietary/po/proprietary.it.po    8 May 2019 15:01:37 -0000       1.143
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -196,6 +196,14 @@
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotaggio</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">Inganni</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotaggio</a>"
 
@@ -435,6 +443,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -507,37 +529,6 @@
 "app-podcast\"> a new one is being developed</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary/po/proprietary.ja-diff.html     8 May 2019 12:31:45 -0000       
1.104
+++ proprietary/po/proprietary.ja-diff.html     8 May 2019 15:01:37 -0000       
1.105
@@ -42,8 +42,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -109,6 +109,7 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -181,6 +182,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
@@ -240,32 +252,6 @@
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft has been  &lt;a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
-    force-installing a &ldquo;remediation&rdquo;
-    program&lt;/a&gt; on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
-    may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
-    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
-    critical&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a &lt;a
-    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
-    can!&lt;/p&gt;
-
-    &lt;p&gt;If your employer makes you run Windows, tell the financial
-    department how this wastes your time dealing with endless connections
-    and premature hardware failures.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -326,7 +312,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/08 12:31:45 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary/po/proprietary.ja.po    8 May 2019 12:31:45 -0000       1.125
+++ proprietary/po/proprietary.ja.po    8 May 2019 15:01:37 -0000       1.126
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -170,6 +170,12 @@
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">妨害</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺き</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">妨害</a>"
 
@@ -355,6 +361,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -427,37 +447,6 @@
 "app-podcast\"> a new one is being developed</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary.nl-diff.html     8 May 2019 12:31:45 -0000       
1.103
+++ proprietary/po/proprietary.nl-diff.html     8 May 2019 15:01:37 -0000       
1.104
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,20 +101,21 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a
 href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
    &lt;/ul&gt;
@@ -184,6 +185,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
@@ -243,32 +255,6 @@
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft has been  &lt;a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
-    force-installing a &ldquo;remediation&rdquo;
-    program&lt;/a&gt; on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
-    may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
-    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
-    critical&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a &lt;a
-    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
-    can!&lt;/p&gt;
-
-    &lt;p&gt;If your employer makes you run Windows, tell the financial
-    department how this wastes your time dealing with endless connections
-    and premature hardware failures.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -329,7 +315,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/08 12:31:45 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/proprietary.nl.po    8 May 2019 12:31:45 -0000       1.114
+++ proprietary/po/proprietary.nl.po    8 May 2019 15:01:37 -0000       1.115
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -196,6 +196,14 @@
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">Oplichterij</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 
@@ -428,6 +436,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -500,37 +522,6 @@
 "app-podcast\"> a new one is being developed</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary.pl-diff.html     8 May 2019 12:31:45 -0000       
1.121
+++ proprietary/po/proprietary.pl-diff.html     8 May 2019 15:01:37 -0000       
1.122
@@ -27,9 +27,9 @@
 <span class="inserted"><ins><em>&lt;!--
 #skiplinks .button</em></ins></span> { float: <span 
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span 
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -111,6 +111,7 @@
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a 
href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
@@ -126,17 +127,17 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
@@ -182,6 +183,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
@@ -241,32 +253,6 @@
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft has been  &lt;a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
-    force-installing a &ldquo;remediation&rdquo;
-    program&lt;/a&gt; on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
-    may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
-    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
-    critical&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a &lt;a
-    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
-    can!&lt;/p&gt;
-
-    &lt;p&gt;If your employer makes you run Windows, tell the financial
-    department how this wastes your time dealing with endless connections
-    and premature hardware failures.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -327,7 +313,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/08 12:31:45 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/po/proprietary.pl.po    8 May 2019 12:31:45 -0000       1.109
+++ proprietary/po/proprietary.pl.po    8 May 2019 15:01:37 -0000       1.110
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -255,6 +255,15 @@
 msgstr "<a href=\"/philosophy/proprietary-sabotage.html\">Sabotaż</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+# | <a [-href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"/philosophy/proprietary-insecurity.html\">Insecurity</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr ""
+"<a href=\"/philosophy/proprietary-insecurity.html\">Brak zabezpieczenia</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 # | <a [-href=\"/philosophy/proprietary-sabotage.html\">Sabotage</a>-]
 # | {+href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>+}
 #, fuzzy
@@ -510,6 +519,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -582,37 +605,6 @@
 "app-podcast\"> a new one is being developed</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary/po/proprietary.pot      8 May 2019 12:31:45 -0000       1.106
+++ proprietary/po/proprietary.pot      8 May 2019 15:01:37 -0000       1.107
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -132,6 +132,10 @@
 msgstr ""
 
 #. type: Content of: <table><tr><td><ul><li>
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr ""
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr ""
 
@@ -245,6 +249,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a "
+"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+"company made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a "
 
"href=\"https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\";>
 "
 "near-complete access to the internal car network</a>. It is constantly "
@@ -317,38 +335,6 @@
 "a new one is being developed</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a "
-"href=\"https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/\";>
 "
-"force-installing a &ldquo;remediation&rdquo; program</a> on computers "
-"running certain versions of Windows 10. Remediation, in Microsoft's view, "
-"means <a "
-"href=\"https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up\";>
 "
-"tampering with users' settings and files</a>, notably to "
-"&ldquo;repair&rdquo; any components of the updating system that users may "
-"have intentionally disabled, and thus regain full power over them. Microsoft "
-"repeatedly pushed faulty versions of this program to users' machines, "
-"causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/\";>
 "
-"critical</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary/po/proprietary.pt-br.po 8 May 2019 12:31:45 -0000       1.159
+++ proprietary/po/proprietary.pt-br.po 8 May 2019 15:01:37 -0000       1.160
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-04-28 11:36-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -159,6 +159,12 @@
 "\"#f3\">3</a>)"
 
 #. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-addictions.html\">Vícios</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotagem</a>"
 
@@ -293,6 +299,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -401,57 +421,6 @@
 "building-a-better-period-tracking-app-podcast\"> um novo está sendo "
 "desenvolvido</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-"A Microsoft tem <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\">instalado forçadamente um programa 
"
-"de “remediação”</a> em computadores que executam determinadas versões 
do "
-"Windows 10. Remediação, na visão da Microsoft, significa <a 
href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> adulteração das "
-"configurações e arquivos dos usuários</a>, notadamente para 
“consertar” "
-"quaisquer componentes do sistema de atualização que os usuários possam ter 
"
-"desativado intencionalmente e, assim, recuperar o poder total sobre eles. A "
-"Microsoft repetidamente pressionou as versões defeituosas desse programa "
-"para as máquinas dos usuários, causando inúmeros problemas, alguns dos 
quais "
-"foram <a href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\">críticos</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-"Isso exemplifica a atitude arrogante e manipuladora que desenvolvedores de "
-"software proprietários aprenderam a adotar em relação às pessoas que "
-"supostamente estão servindo. Migre para um <a href=\"/distros/free-distros."
-"html\">sistema operacional livre</a> se puder!"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-"Se o seu empregador lhe forçar o uso do Windows, diga ao departamento "
-"financeiro como isso desperdiça seu tempo lidando com conexões 
intermináveis "
-"e falhas prematuras de hardware."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -527,6 +496,56 @@
 msgstr "Última atualização:"
 
 #~ msgid ""
+#~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/";
+#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "
+#~ "&ldquo;remediation&rdquo; program</a> on computers running certain "
+#~ "versions of Windows 10. Remediation, in Microsoft's view, means <a href="
+#~ "\"https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-";
+#~ "versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with "
+#~ "users' settings and files</a>, notably to &ldquo;repair&rdquo; any "
+#~ "components of the updating system that users may have intentionally "
+#~ "disabled, and thus regain full power over them. Microsoft repeatedly "
+#~ "pushed faulty versions of this program to users' machines, causing "
+#~ "numerous problems, some of which <a href=\"https://www.windowsmode.com/";
+#~ "microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-"
+#~ "bugs/\"> critical</a>."
+#~ msgstr ""
+#~ "A Microsoft tem <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
+#~ "update-kb4023057-re-released-1-16-2019/\">instalado forçadamente um "
+#~ "programa de “remediação”</a> em computadores que executam 
determinadas "
+#~ "versões do Windows 10. Remediação, na visão da Microsoft, significa <a 
"
+#~ "href=\"https://support.microsoft.com/en-us/help/4023057/update-to-";
+#~ "windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up\"> "
+#~ "adulteração das configurações e arquivos dos usuários</a>, 
notadamente "
+#~ "para “consertar” quaisquer componentes do sistema de atualização que 
os "
+#~ "usuários possam ter desativado intencionalmente e, assim, recuperar o "
+#~ "poder total sobre eles. A Microsoft repetidamente pressionou as versões "
+#~ "defeituosas desse programa para as máquinas dos usuários, causando "
+#~ "inúmeros problemas, alguns dos quais foram <a href=\"https://www.";
+#~ "windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-"
+#~ "due-to-critical-bugs/\">críticos</a>."
+
+#~ msgid ""
+#~ "This exemplifies the arrogant and manipulative attitude that proprietary "
+#~ "software developers have learned to adopt toward the people they are "
+#~ "supposedly serving. Migrate to a <a href=\"/distros/free-distros.html"
+#~ "\">free operating system</a> if you can!"
+#~ msgstr ""
+#~ "Isso exemplifica a atitude arrogante e manipuladora que desenvolvedores "
+#~ "de software proprietários aprenderam a adotar em relação às pessoas 
que "
+#~ "supostamente estão servindo. Migre para um <a href=\"/distros/free-"
+#~ "distros.html\">sistema operacional livre</a> se puder!"
+
+#~ msgid ""
+#~ "If your employer makes you run Windows, tell the financial department how "
+#~ "this wastes your time dealing with endless connections and premature "
+#~ "hardware failures."
+#~ msgstr ""
+#~ "Se o seu empregador lhe forçar o uso do Windows, diga ao departamento "
+#~ "financeiro como isso desperdiça seu tempo lidando com conexões "
+#~ "intermináveis e falhas prematuras de hardware."
+
+#~ msgid ""
 #~ "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 #~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 #~ "Environmental Protection Agency's emission tests</a>, and run dirty the "

Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary/po/proprietary.ru.po    8 May 2019 12:31:45 -0000       1.234
+++ proprietary/po/proprietary.ru.po    8 May 2019 15:01:37 -0000       1.235
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2019-03-18 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -162,6 +162,14 @@
 "\"#f3\">3</a>)"
 
 #. type: Content of: <table><tr><td><ul><li>
+# | <a [-href=\"/proprietary/proprietary-addictions.html\">Addictions</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a 
href=\"/proprietary/proprietary-addictions.html\">Зависимость</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\"> Саботаж</a>"
 
@@ -299,6 +307,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -408,58 +430,6 @@
 "news/audio/2019-04-10/building-a-better-period-tracking-app-podcast\"> "
 "разрабатывается новая программа</a>."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-"Компания Microsoft <a 
href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> принудительно 
устанавливала "
-"программу &ldquo;исправления&rdquo;</a> на 
компьютеры, работающие под "
-"управлением определенных версий Windows 10. 
Исправление, с точки зрения "
-"Microsoft, означает <a href=\"https://support.microsoft.com/en-us/";
-"help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-"
-"for-up\"> копание в настройках и файлах 
пользователя</a>, особенно для "
-"&ldquo;ремонта&rdquo; любых компонентов системы 
обновления, которые "
-"пользователи могли преднамеренно 
отключить; таким образом, компания "
-"восстанавливала полный контроль над ними. 
Microsoft неоднократно насаждала "
-"неисправные версии этой программы на 
машинах пользователей, что приводило ко "
-"множеству проблем, в том числе <a 
href=\"https://www.windowsmode.com/";
-"microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-"
-"bugs/\"> критичных</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-"Этот пример иллюстрирует наглость и 
манипулятивное отношение, которое "
-"усвоили разработчики несвободных 
программ в отношении людей, которых они "
-"якобы обслуживают. Переходите на <a 
href=\"/distros/free-distros.html"
-"\">свободную операционную систему</a>, если 
можете!"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-"Если ваш работодатель заставляет вас 
работать под Windows, расскажите в "
-"экономическом отделе, как это убивает 
ваше рабочее время, заставляя "
-"сражаться с бесконечными соединениями и 
преждевременными сбоями аппаратуры."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -539,6 +509,57 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/";
+#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "
+#~ "&ldquo;remediation&rdquo; program</a> on computers running certain "
+#~ "versions of Windows 10. Remediation, in Microsoft's view, means <a href="
+#~ "\"https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-";
+#~ "versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with "
+#~ "users' settings and files</a>, notably to &ldquo;repair&rdquo; any "
+#~ "components of the updating system that users may have intentionally "
+#~ "disabled, and thus regain full power over them. Microsoft repeatedly "
+#~ "pushed faulty versions of this program to users' machines, causing "
+#~ "numerous problems, some of which <a href=\"https://www.windowsmode.com/";
+#~ "microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-"
+#~ "bugs/\"> critical</a>."
+#~ msgstr ""
+#~ "Компания Microsoft <a href=\"https://borncity.com/win/2019/01/17/";
+#~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> 
принудительно "
+#~ "устанавливала программу 
&ldquo;исправления&rdquo;</a> на компьютеры, "
+#~ "работающие под управлением определенных
 версий Windows 10. Исправление, с "
+#~ "точки зрения Microsoft, означает <a 
href=\"https://support.microsoft.com/";
+#~ "en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-"
+#~ "and-1803-for-up\"> копание в настройках и файлах 
пользователя</a>, "
+#~ "особенно для &ldquo;ремонта&rdquo; любых 
компонентов системы обновления, "
+#~ "которые пользователи могли 
преднамеренно отключить; таким образом, "
+#~ "компания восстанавливала полный 
контроль над ними. Microsoft неоднократно "
+#~ "насаждала неисправные версии этой 
программы на машинах пользователей, что "
+#~ "приводило ко множеству проблем, в том 
числе <a href=\"https://www.";
+#~ "windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-"
+#~ "due-to-critical-bugs/\"> критичных</a>."
+
+#~ msgid ""
+#~ "This exemplifies the arrogant and manipulative attitude that proprietary "
+#~ "software developers have learned to adopt toward the people they are "
+#~ "supposedly serving. Migrate to a <a href=\"/distros/free-distros.html"
+#~ "\">free operating system</a> if you can!"
+#~ msgstr ""
+#~ "Этот пример иллюстрирует наглость и 
манипулятивное отношение, которое "
+#~ "усвоили разработчики несвободных 
программ в отношении людей, которых они "
+#~ "якобы обслуживают. Переходите на <a 
href=\"/distros/free-distros.html"
+#~ "\">свободную операционную систему</a>, 
если можете!"
+
+#~ msgid ""
+#~ "If your employer makes you run Windows, tell the financial department how "
+#~ "this wastes your time dealing with endless connections and premature "
+#~ "hardware failures."
+#~ msgstr ""
+#~ "Если ваш работодатель заставляет вас 
работать под Windows, расскажите в "
+#~ "экономическом отделе, как это убивает 
ваше рабочее время, заставляя "
+#~ "сражаться с бесконечными соединениями и 
преждевременными сбоями "
+#~ "аппаратуры."
+
+#~ msgid ""
 #~ "Volkswagen programmed its car engine computers to <a href=\"https://www.";
 #~ "petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
 #~ "Environmental Protection Agency's emission tests</a>, and run dirty the "

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/po/proprietary.zh-tw-diff.html  8 May 2019 12:31:45 -0000       
1.81
+++ proprietary/po/proprietary.zh-tw-diff.html  8 May 2019 15:01:37 -0000       
1.82
@@ -40,19 +40,19 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
 --&gt;
 &lt;/style&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
55em;</em></ins></span> }
-<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
-<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
+#TOC { width: 55em; }
+&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
@@ -101,19 +101,20 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html"&gt;Addictions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-manipulation.html"&gt;Manipulation&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -128,16 +129,16 @@
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
     &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
    &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -185,6 +186,17 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201904260"&gt;
+    &lt;p&gt;The Jibo robot toys were tethered to the manufacturer's server,
+    and &lt;a 
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"&gt;
+    the company made them all cease to work&lt;/a&gt; by shutting down that
+    server.&lt;/p&gt;
+
+    &lt;p&gt;The shutdown might ironically be good for their users, since the
+    product was designed to manipulate people by presenting a phony
+    semblance of emotions, and was most certainly spying on them.&lt;/p&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201902011"&gt;
     &lt;p&gt;The FordPass Connect feature of some Ford vehicles has &lt;a
     
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html"&gt;
@@ -244,32 +256,6 @@
     
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"&gt;
     a new one is being developed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201904041"&gt;
-    &lt;p&gt;Microsoft has been  &lt;a
-    
href="https://borncity.com/win/2019/01/17/windows-10-update-kb4023057-re-released-1-16-2019/"&gt;
-    force-installing a &ldquo;remediation&rdquo;
-    program&lt;/a&gt; on computers running certain
-    versions of Windows 10. Remediation, in Microsoft's view, means &lt;a
-    
href="https://support.microsoft.com/en-us/help/4023057/update-to-windows-10-versions-1507-1511-1607-1703-1709-and-1803-for-up"&gt;
-    tampering with users' settings and files&lt;/a&gt;, notably to
-    &ldquo;repair&rdquo; any components of the updating system that users
-    may have intentionally disabled, and thus regain full power over
-    them. Microsoft repeatedly pushed faulty versions of this program to
-    users' machines, causing numerous problems, some of which &lt;a
-    
href="https://www.windowsmode.com/microsoft-suspends-windows-10-october-2018-update-rollout-due-to-critical-bugs/"&gt;
-    critical&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;This exemplifies the arrogant and manipulative attitude
-    that proprietary software developers have learned to adopt
-    toward the people they are supposedly serving. Migrate to a &lt;a
-    href="/distros/free-distros.html"&gt;free operating system&lt;/a&gt; if you
-    can!&lt;/p&gt;
-
-    &lt;p&gt;If your employer makes you run Windows, tell the financial
-    department how this wastes your time dealing with endless connections
-    and premature hardware failures.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -330,7 +316,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/05/08 12:31:45 $
+$Date: 2019/05/08 15:01:37 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary/po/proprietary.zh-tw.po 8 May 2019 12:31:45 -0000       1.92
+++ proprietary/po/proprietary.zh-tw.po 8 May 2019 15:01:37 -0000       1.93
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-08 12:26+0000\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -165,6 +165,12 @@
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">破壞</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺騙</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">破壞</a>"
 
@@ -344,6 +350,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The FordPass Connect feature of some Ford vehicles has <a href=\"https://www.";
 "myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html\"> near-"
 "complete access to the internal car network</a>. It is constantly connected "
@@ -416,37 +436,6 @@
 "app-podcast\"> a new one is being developed</a>."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/windows-10-";
-"update-kb4023057-re-released-1-16-2019/\"> force-installing a &ldquo;"
-"remediation&rdquo; program</a> on computers running certain versions of "
-"Windows 10. Remediation, in Microsoft's view, means <a href=\"https://";
-"support.microsoft.com/en-us/help/4023057/update-to-windows-10-"
-"versions-1507-1511-1607-1703-1709-and-1803-for-up\"> tampering with users' "
-"settings and files</a>, notably to &ldquo;repair&rdquo; any components of "
-"the updating system that users may have intentionally disabled, and thus "
-"regain full power over them. Microsoft repeatedly pushed faulty versions of "
-"this program to users' machines, causing numerous problems, some of which <a "
-"href=\"https://www.windowsmode.com/microsoft-suspends-windows-10-";
-"october-2018-update-rollout-due-to-critical-bugs/\"> critical</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This exemplifies the arrogant and manipulative attitude that proprietary "
-"software developers have learned to adopt toward the people they are "
-"supposedly serving. Migrate to a <a href=\"/distros/free-distros.html\">free "
-"operating system</a> if you can!"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If your employer makes you run Windows, tell the financial department how "
-"this wastes your time dealing with endless connections and premature "
-"hardware failures."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/pt-br.po     8 May 2019 12:31:45 -0000       1.107
+++ proprietary/po/pt-br.po     8 May 2019 15:01:37 -0000       1.108
@@ -519,12 +519,6 @@
 
 #. type: Content of: <div><ul><li>
 #, fuzzy
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"/proprietary/proprietary-deception.html\">Engano</a>"
-
-#. type: Content of: <div><ul><li>
-#, fuzzy
 #| msgid ""
 #| "<em>Digital restrictions management, or &ldquo;DRM&rdquo;:</em>&nbsp; "
 #| "functionalities designed to restrict what users can do with the data in "
@@ -565,6 +559,12 @@
 msgstr "<em>Prisões:</em>&nbsp; sistemas queimpõem cenura a programas."
 
 #. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-addictions.html\">Vícios</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr ""
 
@@ -642,25 +642,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr ""
 
@@ -946,6 +927,25 @@
 msgstr ""
 
 #. type: Content of: <h3>
+msgid "Apple Manipulation"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr ""
 
@@ -1347,6 +1347,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -6725,6 +6739,12 @@
 "\"#f3\">3</a>)"
 
 #. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-addictions.html\">Vícios</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotagem</a>"
 
@@ -7813,6 +7833,11 @@
 "processors will have tyrant software built in</a>."
 msgstr ""
 
+#, fuzzy
+#~| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"/proprietary/proprietary-deception.html\">Engano</a>"
+
 #~ msgid ""
 #~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/";
 #~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "

Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary/po/ru.po        8 May 2019 12:31:45 -0000       1.177
+++ proprietary/po/ru.po        8 May 2019 15:01:38 -0000       1.178
@@ -629,10 +629,6 @@
 msgstr "<a href=\"#censorship\"> Цензура</a>"
 
 #. type: Content of: <div><ul><li>
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"#deception\"> Обман</a>"
-
-#. type: Content of: <div><ul><li>
 msgid ""
 "<a href=\"#drm\">Digital restrictions management</a> or &ldquo;DRM&rdquo;"
 "&mdash;functionalities designed to restrict what users can do with the data "
@@ -658,6 +654,14 @@
 "<a href=\"#jails\">Тюрьмы</a>&nbsp;&mdash; системы, 
которые налагают цензуру "
 "на прикладные программы."
 
+# | <a [-href=\"#deception\">Deception</a>-]
+# | {+href=\"#manipulation\">Manipulation</a>+}
+#. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#deception\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"#deception\"> Обман</a>"
+
 #. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr "<a href=\"#pressuring\"> Давление</a>"
@@ -748,32 +752,6 @@
 "\">Тюрьмы</a>."
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr "Обман"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-"&ldquo;Темные тактики&rdquo; представляют <a 
href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">элементы интерфейса пользователя, 
спроектированные так, чтобы вводить "
-"пользователей в заблуждение или 
затруднить нахождение настроек</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-"Это позволяет таким компаниям как Apple 
заявлять: &ldquo;Мы позволяем "
-"пользователям отключить это&rdquo;, 
гарантируя в то же время, что мало кто "
-"поймет, как же это отключить."
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr "Цифровое управление ограничениями"
 
@@ -1202,6 +1180,35 @@
 "отклонения Apple <a 
href=\"http://mashable.com/2014/02/07/apple-app-tracks-";
 "drone-strikes/\">признала, что это цензура 
приложения по тематике</a>."
 
+# | Apple [-Deception-] {+Manipulation+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Apple Deception"
+msgid "Apple Manipulation"
+msgstr "Обман"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+"&ldquo;Темные тактики&rdquo; представляют <a 
href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">элементы интерфейса пользователя, 
спроектированные так, чтобы вводить "
+"пользователей в заблуждение или 
затруднить нахождение настроек</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+"Это позволяет таким компаниям как Apple 
заявлять: &ldquo;Мы позволяем "
+"пользователям отключить это&rdquo;, 
гарантируя в то же время, что мало кто "
+"поймет, как же это отключить."
+
 #. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr "Давление"
@@ -1793,6 +1800,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -8940,6 +8961,14 @@
 "<a href=\"/proprietary/proprietary-jails.html\">Тюрьмы</a>&nbsp;(<a 
href="
 "\"#f3\">3</a>)"
 
+# | <a [-href=\"/proprietary/proprietary-addictions.html\">Addictions</a>-]
+# | {+href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>+}
+#. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-addictions.html\">Addictions</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a 
href=\"/proprietary/proprietary-addictions.html\">Зависимость</a>"
+
 #. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\"> Саботаж</a>"
@@ -10236,6 +10265,12 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";> В "
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"#deception\"> Обман</a>"
+
+#~ msgid "Apple Deception"
+#~ msgstr "Обман"
+
 #~ msgid ""
 #~ "Microsoft has been <a href=\"https://borncity.com/win/2019/01/17/";
 #~ "windows-10-update-kb4023057-re-released-1-16-2019/\"> force-installing a "

Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/zh-tw.po     8 May 2019 12:31:45 -0000       1.82
+++ proprietary/po/zh-tw.po     8 May 2019 15:01:38 -0000       1.83
@@ -487,12 +487,6 @@
 
 #. type: Content of: <div><ul><li>
 #, fuzzy
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
-msgid "<a href=\"#deception\">Deception</a>"
-msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺騙</a>"
-
-#. type: Content of: <div><ul><li>
-#, fuzzy
 #| msgid ""
 #| "<a href=\"/proprietary/proprietary-drm.html\">Digital restrictions "
 #| "management</a> or &ldquo;DRM&rdquo; means functionalities designed to "
@@ -532,6 +526,12 @@
 "查應用程式的系統。"
 
 #. type: Content of: <div><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"#manipulation\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺騙</a>"
+
+#. type: Content of: <div><ul><li>
 msgid "<a href=\"#pressuring\">Pressuring</a>"
 msgstr ""
 
@@ -610,25 +610,6 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Apple Deception"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
-"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
-"you\">user interfaces designed to mislead users, or make option settings "
-"hard to find</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This allows a company such as Apple to say, &ldquo;We allow users to turn "
-"this off&rdquo; while ensuring that few will understand how to actually turn "
-"it off."
-msgstr ""
-
-#. type: Content of: <h3>
 msgid "Apple DRM"
 msgstr ""
 
@@ -914,6 +895,25 @@
 msgstr ""
 
 #. type: Content of: <h3>
+msgid "Apple Manipulation"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a href=\"http://www.theverge.";
+"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
+"you\">user interfaces designed to mislead users, or make option settings "
+"hard to find</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+
+#. type: Content of: <h3>
 msgid "Apple Pressuring"
 msgstr ""
 
@@ -1311,6 +1311,20 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
+"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the company "
+"made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www.";
 "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
 "hacking/507470932/\"> two vulnerabilities that affect several models of "
@@ -6191,6 +6205,12 @@
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">破壞</a>"
 
 #. type: Content of: <table><tr><td><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+msgid "<a href=\"/proprietary/proprietary-manipulation.html\">Manipulation</a>"
+msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺騙</a>"
+
+#. type: Content of: <table><tr><td><ul><li>
 msgid "<a href=\"/proprietary/proprietary-sabotage.html\">Sabotage</a>"
 msgstr "<a href=\"/proprietary/proprietary-sabotage.html\">破壞</a>"
 
@@ -7303,6 +7323,11 @@
 msgstr ""
 
 #, fuzzy
+#~| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
+#~ msgid "<a href=\"#deception\">Deception</a>"
+#~ msgstr "<a href=\"/proprietary/proprietary-deception.html\">欺騙</a>"
+
+#, fuzzy
 #~| msgid ""
 #~| "As of April, 2017, the files in this directory list around 300 instances "
 #~| "of malicious functionalities, but there are surely thousands more we "

Index: proprietary/po/proprietary-manipulation.pot
===================================================================
RCS file: proprietary/po/proprietary-manipulation.pot
diff -N proprietary/po/proprietary-manipulation.pot
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary/po/proprietary-manipulation.pot 8 May 2019 15:01:37 -0000       
1.1
@@ -0,0 +1,135 @@
+# LANGUAGE translation of 
https://www.gnu.org/proprietary/proprietary-manipulation.html
+# Copyright (C) YEAR Free Software Foundation, Inc.
+# This file is distributed under the same license as the original article.
+# FIRST AUTHOR <address@hidden>, YEAR.
+#
+#, fuzzy
+msgid ""
+msgstr ""
+"Project-Id-Version: proprietary-manipulation.html\n"
+"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
+"Last-Translator: FULL NAME <address@hidden>\n"
+"Language-Team: LANGUAGE <address@hidden>\n"
+"Language: \n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Transfer-Encoding: 8bit\n"
+
+#. type: Content of: <title>
+msgid "Proprietary Manipulation - GNU Project - Free Software Foundation"
+msgstr ""
+
+#. type: Content of: <h2>
+msgid "Proprietary Manipulation"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Nonfree (proprietary) software is very often malware (designed to mistreat "
+"the user). Nonfree software is controlled by its developers, which puts them "
+"in a position of power over the users; <a "
+"href=\"/philosophy/free-software-even-more-important.html\">that is the "
+"basic injustice</a>. The developers often exercise that power to the "
+"detriment of the users they ought to serve."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"This page reports instances where proprietary software takes advantage of "
+"human psychology to manipulate users."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"If you know of an example that ought to be in this page but isn't here, "
+"please write to <a "
+"href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to inform "
+"us. Please include the URL of a trustworthy reference or two to serve as "
+"specific substantiation."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The Jibo robot toys were tethered to the manufacturer's server, and <a "
+"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\";> the "
+"company made them all cease to work</a> by shutting down that server."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The shutdown might ironically be good for their users, since the product was "
+"designed to manipulate people by presenting a phony semblance of emotions, "
+"and was most certainly spying on them."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"&ldquo;Dark patterns&rdquo; are <a "
+"href=\"http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you\";>user
 "
+"interfaces designed to mislead users, or make option settings hard to "
+"find</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This allows a company such as Apple to say, &ldquo;We allow users to turn "
+"this off&rdquo; while ensuring that few will understand how to actually turn "
+"it off."
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
+#. type: Content of: <div>
+msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
+"Please send general FSF &amp; GNU inquiries to <a "
+"href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a>.  There are also <a "
+"href=\"/contact/\">other ways to contact</a> the FSF.  Broken links and "
+"other corrections or suggestions can be sent to <a "
+"href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a>."
+msgstr ""
+
+#.  TRANSLATORS: Ignore the original text in this paragraph,
+#.         replace it with the translation of these two:
+#
+#.         We work hard and do our best to provide accurate, good quality
+#.         translations.  However, we are not exempt from imperfection.
+#.         Please send your comments and general suggestions in this regard
+#.         to <a href="mailto:address@hidden";>
+#
+#.         &lt;address@hidden&gt;</a>.</p>
+#
+#.         <p>For information on coordinating and submitting translations of
+#.         our web pages, see <a
+#.         href="/server/standards/README.translations.html">Translations
+#.         README</a>. 
+#. type: Content of: <div><div><p>
+msgid ""
+"Please see the <a "
+"href=\"/server/standards/README.translations.html\">Translations README</a> "
+"for information on coordinating and submitting translations of this article."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid "Copyright &copy; 2019 Free Software Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"This page is licensed under a <a rel=\"license\" "
+"href=\"http://creativecommons.org/licenses/by-nd/4.0/\";>Creative Commons "
+"Attribution-NoDerivatives 4.0 International License</a>."
+msgstr ""
+
+#. TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.
+#. type: Content of: <div><div>
+msgid "*GNUN-SLOT: TRANSLATOR'S CREDITS*"
+msgstr ""
+
+#.  timestamp start 
+#. type: Content of: <div><p>
+msgid "Updated:"
+msgstr ""

Index: proprietary/po/proprietary-manipulation.translist
===================================================================
RCS file: proprietary/po/proprietary-manipulation.translist
diff -N proprietary/po/proprietary-manipulation.translist
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ proprietary/po/proprietary-manipulation.translist   8 May 2019 15:01:37 
-0000       1.1
@@ -0,0 +1,10 @@
+<!-- begin translist file -->
+<!--#set var="TRANSLATION_LIST"
+value='<div id="translations">
+<p>
+<span dir="ltr" class="original"><a lang="en" hreflang="en" 
href="/proprietary/proprietary-manipulation.en.html">English</a>&nbsp;[en]</span>
 &nbsp;
+</p>
+</div>' -->
+<link rel="alternate" type="text/html" 
href="/proprietary/proprietary-manipulation.html" hreflang="x-default" />
+<link rel="alternate" type="text/html" lang="en" hreflang="en" 
href="/proprietary/proprietary-manipulation.en.html" title="English" />
+<!-- end translist file -->



reply via email to

[Prev in Thread] Current Thread [Next in Thread]